Game-Theoretic Analysis of Cooperation Incentive Strategies in Mobile Ad Hoc Networks

被引:94
|
作者
Li, Ze [1 ]
Shen, Haiying [1 ]
机构
[1] Clemson Univ, Dept Elect & Comp Engn, Clemson, SC 29631 USA
基金
美国国家科学基金会;
关键词
MANET; distributed network; reputation system; price-based system; game theory; POWER-CONTROL; ALLOCATION; MECHANISM; SYSTEM;
D O I
10.1109/TMC.2011.151
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In mobile ad hoc networks (MANETs), tasks are conducted based on the cooperation of nodes in the networks. However, since the nodes are usually constrained by limited computation resources, selfish nodes may refuse to be cooperative. Reputation systems and price-based systems are two main solutions to the node noncooperation problem. A reputation system evaluates node behaviors by reputation values and uses a reputation threshold to distinguish trustworthy nodes and untrustworthy nodes. A price-based system uses virtual cash to control the transactions of a packet forwarding service. Although these two kinds of systems have been widely used, very little research has been devoted to investigating the effectiveness of the node cooperation incentives provided by the systems. In this paper, we use game theory to analyze the cooperation incentives provided by these two systems and by a system with no cooperation incentive strategy. We find that the strategies of using a threshold to determine the trustworthiness of a node in the reputation system and of rewarding cooperative nodes in the price-based system may be manipulated by clever or wealthy but selfish nodes. Illumined by the investigation results, we propose and study an integrated system. Theoretical and simulation results show the superiority of the integrated system over an individual reputation system and a price-based system in terms of the effectiveness of cooperation incentives and selfish node detection.
引用
收藏
页码:1287 / 1303
页数:17
相关论文
共 50 条
  • [1] GMAC: A game-theoretic MAC protocol for mobile ad hoc networks
    Wang, Fan
    Younis, Ossama
    Krunz, Marwan
    [J]. 2006 4TH INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC AND WIRELESS NETWORKS, VOLS 1 AND 2, 2006, : 173 - +
  • [2] A game-theoretic intrusion detection model for mobile ad hoc networks
    Otrok, Hadi
    Mohammed, Noman
    Wang, Lingyu
    Debbabi, Mourad
    Bhattacharya, Prabir
    [J]. COMPUTER COMMUNICATIONS, 2008, 31 (04) : 708 - 721
  • [3] A game-theoretic analysis on the conditions of cooperation in a wireless ad hoc network
    Bandyopadhyay, S
    Bandyopadhyay, S
    [J]. PROCEEDINGS OF THE THIRD INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC, AND WIRELESS NETWORKS, 2005, : 54 - 58
  • [4] Game theoretic analysis of cooperation stimulation and security in autonomous mobile ad hoc networks
    Yu, Wei
    Liu, K. J. Ray
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2007, 6 (05) : 459 - 473
  • [5] A game-theoretic approach to compute stable topologies in mobile ad hoc networks
    Bulling, Nils
    Popovici, Matei
    [J]. JOURNAL OF LOGIC AND COMPUTATION, 2015, 25 (03) : 639 - 667
  • [6] Analysis the Cooperation Strategies in Mobile Ad hoc Networks
    Li, Ze
    Shen, Haiying
    [J]. 2008 FIFTH IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS, VOLS 1 AND 2, 2008, : 880 - 885
  • [7] Secure cooperation in autonomous mobile ad-hoc networks under noise and imperfect monitoring: A game-theoretic approach
    Yu, Wei
    Liu, K. J. Ray
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (02) : 317 - 330
  • [8] Throughput-oriented MAC for mobile ad hoc networks: A game-theoretic approach
    Wang, Fan
    Younis, Ossama
    Krunz, Marwan
    [J]. AD HOC NETWORKS, 2009, 7 (01) : 98 - 117
  • [9] A Game-Theoretic Framework for Interference Avoidance in Ad hoc Networks
    Menon, R.
    MacKenzie, A. B.
    Buehrer, R. M.
    Reed, J. H.
    [J]. GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
  • [10] A Game-Theoretic Analysis of Cooperation in Anonymity Networks
    Yang, Mu
    Sassone, Vladimiro
    Hamadou, Sardaouna
    [J]. PRINCIPLES OF SECURITY AND TRUST, POST 2012, 2012, 7215 : 269 - 289