Cross-Layer Design to Solve Cooperation Problem in Ad Hoc Network

Article Preview

Abstract:

A wireless ad hoc network is a self-configuring infrastructurelessh network of mobile devices connected by wireless. In order to support the basal networking functions like routing and packet forwarding, the nodes in wireless ad hoc network should be cooperate with each other due to the limited range of wireless transmission. However, nodes are unwilling to relay packets for others considering the poor energy and bandwidth especially in the open community environment. Some approaches to stimulate nodes cooperation have been introduced recently. In this paper, we provide a novel method based on cross-layer design to solve the cooperation issues both in Mac and network layer. The method with the help of reputation mechanism and utility function based on game theoretical approach can promote nodes to cooperate and make the whole network to reach Nash equilibrium.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 756-759)

Pages:

1067-1071

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] S. Marti, T. Giuli, K. Lai, and M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, Proc. ACM MOBICOM, pp.255-265, (2000).

DOI: 10.1145/345910.345955

Google Scholar

[2] P. Michiardi and R. Molva, Simulation-based analysis of security exposures in mobile ad hoc networks, , Proc. European Wireless Conference, (2002).

Google Scholar

[3] L. Buttyan and J.P. Hubaux, Stimulating cooperation in self-organizing mobile ad hoc networks, ACM/Kluwer Mobile Networks and Applications (MONET), Vol. 8, pp.579-592, October (2003).

Google Scholar

[4] S. Zhong, J. Chen and Y.R. Yang, Sprite: a simple, cheat proof, credit-based system for mobile ad-hoc networks", Proc. IEEE INFOCOM, 03, San Francisco, pp.1987-1997, March (2003).

DOI: 10.1109/infcom.2003.1209220

Google Scholar

[5] J. Crowcroft, R. Gibbens, F. Kelly, and S. Ostrring, Modelling incentives for collaboration in mobile ad hoc networks", Proc. WiOpt, 03, Sophia-Antipolis, pp.427-439, March (2003).

DOI: 10.1016/j.peva.2004.03.003

Google Scholar

[6] S. Buchegger and T.Y. Le Boudec, Performance analysis of the CONFIDANT protocol, in Proc ACM International Symposium on Mobile Ad Hoc Networking and Computing, Lausanne, pp.226-236, June (2002).

DOI: 10.1145/513800.513828

Google Scholar

[7] P. Michiaridi and R. Molva, CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks, in Pro. of Communication and Multimedia Security 2002 Conference, pp.107-121, September (2002).

DOI: 10.1007/978-0-387-35612-9_9

Google Scholar

[8] P. Kyasanur and N. Vaidya, Detection and handling of MAC layer misbehavior in wireless networks, Dependable Systems and Networks, pp.173-182, June (2003).

DOI: 10.1109/dsn.2003.1209928

Google Scholar

[9] M. Raya, J.P. Hubaux and I. Aad, DOMINO: a system to detect greedy behavior in IEEE 802. 11 hotspots", Proc. MobiSYS, 04, pp.84-97, June 6-9, (2004).

DOI: 10.1145/990064.990077

Google Scholar

[10] P. Michiardi, and R. Molva, A game theoretical approach to evaluate cooperation enforcement mechanisms in mobile ad hoc networks, Proc. WiOpt 2003: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, France, March 3-5, (2003).

DOI: 10.1016/j.adhoc.2004.07.006

Google Scholar

[11] M. Conti, E. Gregori and G. Maselli, Cooperation issues in mobile ad hoc networks, , Proc. 24th International Conference on Distributed Computing Systems Workshops, (2004).

DOI: 10.1109/icdcsw.2004.1284125

Google Scholar