Abstract
A mobile ad hoc network (MANET) station acts both as a source packet generator and transit packet forwarder. With selfish stations and the absence of administrative cooperation enforcement, the lack of forwarding incentives has long been recognized as a serious design problem in MANETs. Reputation systems discourage selfishness by having past cooperation increase the present source packet throughput. We describe a simple watchdog-controlled first-hand reputation system and point to a form of selfishness not addressed by existing research, arising from packet anonymity. If the watchdog at a station cannot tell a nearby station’s source packets from transit packets, that station is tempted to admit more source packet traffic than a fair local admittance control (LAC) scheme permits. We analyze a related noncooperative LAC game and characterize three types of its Nash equilibria. Next we propose a simple packet forwarding protocol by the name Decline and Force (D&F) and using an approximate performance model show that, when properly configured, D&F leads to a fair and efficient game outcome.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Agnew, G.B., Mark, J.W.: Performance Modeling for Communication Networks at a Switching Node. IEEE Trans. Comm. COM-32, 902–910 (1984)
Bansal S., Baker M.: Observation-based Cooperation Enforcement in Ad hoc Networks (2003), http://arxiv.org/abs/cs.NI/0307012
Ben Salem, N., Buttyan, L., Hubaux, J.-P., Jakobsson, M.: A Charging and Rewarding Scheme for Packet Forwarding in Multi-hop Cellular Networks. In: Proc. ACM Symposium on Mobile Ad Hoc Networking and Computing MobiHoc 2003, Annapolis MD (2003)
Broch, J., Johnsonn, D., Maltz, D.: The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks, IETF Internet Draft (1998)
Buchegger, S., Le Boudec, J.-Y.: Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes Fairness In Dynamic Ad-hoc NeTworks), Tech. Rep. IC/2002/01, Swiss Federal Institute of Technology (2002)
Buttyan, L., Hubaux, J.-P.: Nuglets: A Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad-Hoc Networks, Tech. Rep. DSC/2001/001, Swiss Federal Institute of Technology (2001)
Buttyan, L., Hubaux, J.-P.: Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks. J. Mobile Networks and Applications 8, 579–592 (2003)
Cheng, Y., Agrawal, D.P.: Distributed Anonymous Secure Routing Protocol in Wireless Mobile Ad Hoc Networks, http://www.ececs.uc.edu/~cdmc/OPNETWORK_Yi.pdf
Felegyhazi, M., Hubaux, J.-P., Buttyan, L.: Nash Equilibria of Packet Forwarding Strategies in Wireless Ad Hoc Networks. IEEE Trans. Mobile Computing 5, 1–14 (2006)
Feller, W.: An Introduction to Probability Theory and its Applications. J. Wiley and Sons, New York (1966)
Fratkin, E., Vijayaraghavan, V., Liu, Y., Gutierez, D., Li, T.M., Baker, M.: Participation Incentives for Ad Hoc Networks, www.stanford.edu/#yl314/adhoc
Fudenberg, D., Tirole, J.: Game Theory. MIT Press, Cambridge (1991)
Ileri, O., Mau, S.-C., Mandayam, N.B.: Pricing for Enabling Forwarding in Self-Configuring Ad Hoc Networks. IEEE J. Selected Areas Commun. 23, 151–162 (2005)
Kamoun, F.: A Drop-and-Throttle Flow Control Policy for Computer Networks. IEEE Trans. Comm. COM-29, 444–452 (1981)
Marbach, P.: Cooperation in Wireless Ad Hoc Networks: A MArket-BasedApproach. IEEE/ACM Trans. Networking 13, 1325–1338 (2005)
Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In: Proc. 6th Annual Conf. on Mobile Computing and Networking MobiCom 2000, Boston MA (2000)
Michiardi, P., Molva, R.: Making Greed Work in Mobile Ad Hoc Networks, Res. Rep. RR-02-069, Institut Eurecom, Sophia-Antipolis (2002)
Michiardi, P., Molva, R.: CORE: A Collaborative Reputation Mechanism to enforce node cooperation in Mobile Ad hoc Networks. In: Proc. 6th IFIP Conf. on Security Comm. and Multimedia (CMS 2002), Portoroz, Slovenia (2002)
Srinivasan, V., Nuggehalli, P., Chiasserini, C.F., Rao, R.R.: An Analytical Approach to the Study of Cooperation in Wireless Ad Hoc Networks. IEEE Trans. Wireless Commun. 4, 722–733 (2005)
Wang, Y., Giruka, V.C., Singhal, M.: A Fair Distributed Solution for Selfish Nodes Problem in Wireless Ad Hoc Networks. In: Nikolaidis, I., Barbeau, M., Kranakis, E. (eds.) ADHOC-NOW 2004. LNCS, vol. 3158, Springer, Heidelberg (2004)
Zhong, S., Chen, J., Yang, Y.R.: Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks. In: Proc. INFOCOM 2003, San Francisco (2003)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Konorski, J. (2007). An Incentive-Based Forwarding Protocol for Mobile Ad Hoc Networks with Anonymous Packets. In: Koucheryavy, Y., Harju, J., Sayenko, A. (eds) Next Generation Teletraffic and Wired/Wireless Advanced Networking. NEW2AN 2007. Lecture Notes in Computer Science, vol 4712. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74833-5_27
Download citation
DOI: https://doi.org/10.1007/978-3-540-74833-5_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74832-8
Online ISBN: 978-3-540-74833-5
eBook Packages: Computer ScienceComputer Science (R0)