Skip to main content

Data Caching in Selfish MANETs

  • Conference paper
Networking and Mobile Computing (ICCNMC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3619))

Included in the following conference series:

Abstract

There are a lot of cooperative cache algorithms in Mobile Ad hoc Network (MANET) environment today. However, little attention was paid to the case that the mobile clients within a MANET are non-cooperative. These non-cooperative behaviors include selfish, faulty and malicious ones. In this paper, we focus on the selfish behavior and study it thoroughly. The essential of our cache algorithm within a selfish MANET is that service provider can be paid for its caching service. We adopt game theory in this paper and theoretically prove that the proposed cache algorithm within a selfish MANET can run into an equilibrium status after several steps. Some useful conclusions are drawn, and experiment results are given to show the validity and efficiency of our work.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Jones, J.: Game Theory: Mathematical Models of Conflict. Albion/Horwood Publishing House (2000)

    Google Scholar 

  2. Nash, J.: Non-Cooperative Games. Annals of Mathematics 54(2), 286–295 (1951)

    Article  MathSciNet  Google Scholar 

  3. Saraydar, N.M., Goodman, D.: Efficient Power Control via Pricing in Wireless Data Networks. IEEE Transaction on Communications 50(2), 291–303 (2002)

    Article  Google Scholar 

  4. Bestavros, Jin, S.: OSMOSIS: Scalable Delivery of Real-Time Streaming Media in Ad-Hoc Overlay Networks. In: Proc. of the IEEE Int’l Conf. on Distributed Computing Systems (ICDCS 2003), Rhode Island, USA, May 2003. IEEE Press, Los Alamitos (2003)

    Google Scholar 

  5. Lau, W.H.O., Kumar, M., Venkatesh, S.: Mobile Ad Hoc Networks: A cooperative cache architecture in support of caching multimedia objects in MANETs. In: Proc. 5th ACM int’l workshop on Wireless mobile multimedia, September 2002. ACM Press, New York (2002)

    Google Scholar 

  6. Loo, F.Y.: Ad Hoc Network: Prospects and Challenges. Technical Report D1, AML, University of Tokyo, Japan (2004)

    Google Scholar 

  7. Miranda, H., Rodrigues, L.: Preventing selfishness in open mobile ad hoc networks. In: Proceedings of the 7th CaberNet Radicals Workshop, Bertinoro, Italy, October 13-16, 2002. IEEE Press, Los Alamitos (2002)

    Google Scholar 

  8. Srinivasan, V., Nuggehalli, P., Chiasserini, C.F., Rao, R.R.: Energy Efficiency of Ad Hoc Wireless Networks with Selfish Users. In: Proc. of European Wireless conference (EW 2002), Florence, Italy, February 26-28, 2002. IEEE Press, Los Alamitos (2002)

    Google Scholar 

  9. Hatzis, K.P., Pentaris, G.P., Spirakis, P.G., Tampakas, V.T., Tan, R.B.: Fundamental Control Algorithms in Mobile Networks. In: Proc. 11th Annual Symposium on Parallel Algorithms and Architectures (SPAA 1999), Saint-Malo, France, June 1999. ACM Press, New York (1999)

    Google Scholar 

  10. Chatzigiannakis, Nikoletseas, S.: An Adaptive Compulsory Protocol for Basic Communication in Highly Changing Ad-hoc Mobile Networks. In: Proc. 2nd Int’l Workshop on Parallel and Distributed Computing Issues in Wireless networks and Mobile Computing (PDCIWNMC 2002), Marriott Marina, Florida, USA, April 15-19, 2002. IEEE Press, Los Alamitos (2002)

    Google Scholar 

  11. Chen, K., Nahrstedt, K.: iPass: an Incentive Compatible Auction Scheme to Enable Packet Forwarding Service in MANET. In: Proceedings of the 24th IEEE International Conference on Distributed Computing Systems (ICDCS 2004), Tokyo, Japan, March 23-26, 2004. IEEE Press, Los Alamitos (2004)

    Google Scholar 

  12. Ma, T.B., Lee, C.M., Lui, C.S., Yau, K.Y.: Incentive P2P Networks: A Protocol to Encourage Information Sharing and Contribution. ACM SIGMETRICS Performance Evaluation Review 31(2), 23–25 (2003); Special issue on the fifth workshop on MAthematical performance Modeling and Analysis (MAMA 2003)

    Article  MATH  Google Scholar 

  13. Montet, Serra, D.: Game Theory and Economics. Palgrave Macmillan, NewYork (2003)

    Google Scholar 

  14. Chandra, K., Hirschberg, D.S., Wong, C.K.: Approximate Algorithms for Some Generalized Knapsack Problems. Theoretical Computer Science 3(3), 293–304 (1976)

    Article  MathSciNet  Google Scholar 

  15. Buttyan, L., Hubaux, J.: Nuglets: a virtual currency to stimulate cooperation in self-organized ad hoc networks. Technical Report EPFL, DSC (2001)

    Google Scholar 

  16. Zhong, S., Yang, Y.R., Chen, J.: Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-hoc Networks. In: Proceedings of the INFOCOM conference (INFOCOM 2003), San Francisco, USA, March 30-April 3, 2003. IEEE Press, Los Alamitos (2003)

    Google Scholar 

  17. http://www.ietf.org/rfc/rfc1321.txt

  18. Ke, Q., Maltz, D., Johnson, D.B.: Emulation of Multi-Hop Wireless Ad Hoc Networks. In: Proceedings of the 7th International Workshop on Mobile Multimedia Communications (MoMuC 2000), Tokyo, Japan, October 23-26, 2000. IEEE Press, Los Alamitos (2000)

    Google Scholar 

  19. Janssen, M., Verbraeck, A., Sol, H.G.: Agent-based Simulation for Evaluating Intermediation Roles in Electronic Commerce. In: Proceedings of the 1st Agent-Based Simulation (ABS 2000), Passau, Germany, May 2-3 (2000)

    Google Scholar 

  20. http://www.hkws.org/appendix.doc

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhai, J., Li, Q., Li, X. (2005). Data Caching in Selfish MANETs. In: Lu, X., Zhao, W. (eds) Networking and Mobile Computing. ICCNMC 2005. Lecture Notes in Computer Science, vol 3619. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11534310_24

Download citation

  • DOI: https://doi.org/10.1007/11534310_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28102-3

  • Online ISBN: 978-3-540-31868-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics