Skip to main content

Analysis of Distributed Packet Forwarding Strategies in Ad Hoc Networks

  • Conference paper
Parallel Processing and Applied Mathematics (PPAM 2007)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4967))

Abstract

Battery energy conservation and preventing selfish behavior are important, closely related issues in ad hoc networks. In this paper we demonstrate how using a strategy based packet forwarding approach can increase throughput in such a networks and at the same time can minimize the usage of resources of participating nodes. Each node is asked to use a strategy that defines conditions under which packets are being forwarded. Such strategy is based on the notion of trust and activity of the source node of the packet. We demonstrate that nodes applying such strategy use the network in more efficient way comparing to nodes not using such a reputation based packet forwarding. A genetic algorithm (GA) is applied to evolve good strategies, while for evaluation purposes of the strategies a game theoretical model of the ad hoc network is used.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ilyas, M., Mahgoub, I. (eds.): Mobile Computing Handbook. Auerbach Publications (2005)

    Google Scholar 

  2. Buttyan, L., Hubaux, J.P.: Nuglets: a virtual currency to stimulate cooperation in self-organized mobile ad hoc networks. Technical Report DSC/2001/001, Swiss Federal Institute of Technology (2001)

    Google Scholar 

  3. Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proc. ACM/IEEE 6th International Conference on Mobile Computing and Networking (MobiCom 2000), pp. 255–265 (2000)

    Google Scholar 

  4. Michiardi, P., Molva, R.: Simulation-based analysis of security exposures in mobile ad hoc networks. In: Proc. European Wireless Conference (2002)

    Google Scholar 

  5. Buchegger, S., Boudec, J.Y.L.: The effect of rumor spreading in reputation systems for mobile ad-hoc networks. In: Proc. Workshop on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt 2003), pp. 131–140 (2000)

    Google Scholar 

  6. Buchegger, S., Boudec, J.Y.L.: Performance analysis of the confidant protocol. In: ACM 3rd International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2002), pp. 226–236 (2002)

    Google Scholar 

  7. Buchegger, S., Boudec, J.Y.L.: Self-policing mobile ad-hoc networks by reputation systems. IEEE Communications Magazine, Special Topic on Advances in Self-Organizing Networks 43(7) (July 2005)

    Google Scholar 

  8. Giordano, S., Urpi, A.: A self-organized and cooperative ad hoc networking. In: Basagni, S., Conti, M., Giordano, S., Stojmenovic, I. (eds.) Mobile Ad Hoc Networking, Wiley-IEEE Press (2004)

    Google Scholar 

  9. Michiardi, P., Molva, R.: Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proc. IFIP 6th Conference on Security Communications, and Multimedia (CMS 2002), pp. 107–121 (2002)

    Google Scholar 

  10. Feeney, L., Nilsson, M.: Investigating the energy consumption of a wireless network interface in an ad hoc networking environment. In: Proc. The IEEE Conference on Computer Communications (INFOCOM 2001), pp. 1548–1557 (2001)

    Google Scholar 

  11. Felegyhazi, M., Hubaux, J.P.: Game theory in wireless networks: A tutorial. Technical report, EPFL - Switzerland (2006)

    Google Scholar 

  12. MacKenzie, A., DaSilva, L.A.: Game Theory for Wireless Engineers. Morgan & Claypool Publishers (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Roman Wyrzykowski Jack Dongarra Konrad Karczewski Jerzy Wasniewski

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Seredynski, M., Bouvry, P., Klopotek, M.A. (2008). Analysis of Distributed Packet Forwarding Strategies in Ad Hoc Networks. In: Wyrzykowski, R., Dongarra, J., Karczewski, K., Wasniewski, J. (eds) Parallel Processing and Applied Mathematics. PPAM 2007. Lecture Notes in Computer Science, vol 4967. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-68111-3_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-68111-3_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-68105-2

  • Online ISBN: 978-3-540-68111-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics