Truthful topology control in Wireless Ad Hoc Networks with selfish nodes

被引:0
|
作者
Cai, Jianfeng [1 ]
Liu, Yunhuai [2 ]
Lian, Jie [3 ]
Li, Mo [2 ]
Pooch, Udo [1 ]
Ni, Lionel [2 ]
机构
[1] Texas A&M Univ, College Stn, TX 77843 USA
[2] Hong Kong Univ Sci & Technol, Hong Kong, Hong Kong, Peoples R China
[3] Univ Waterloo, Waterloo, ON, Canada
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In Wireless Mobile Ad Hoc Networks (MANETs), energy is a crucial resource. Topology control technology allows network nodes to reduce their transmission power while preserving the network connectivity. A MANET is a noncooperative system so that only when a node earns its payment, which can cover its cost, the cooperation can be stimulated. We design a Truthful Topology Control mechanism (TRUECON) for MANETs to induce the selfish, but rational, network nodes to collaborate. Truth-telling is a dominant strategy in TRUECON. A node needs to reveal its true value in order to obtain the maximum expected utility. We prove the overpayment of TRUECON has a bound depending on different radio propagation models.
引用
收藏
页码:203 / 210
页数:8
相关论文
共 50 条
  • [1] Energy-efficient topology control in wireless ad hoc networks with selfish nodes
    Zarifzadeh, Sajjad
    Yazdani, Nasser
    Nayyeri, Amir
    [J]. COMPUTER NETWORKS, 2012, 56 (02) : 902 - 914
  • [2] A Game Theoretical Approach for Topology Control in Wireless Ad Hoc Networks with Selfish Nodes
    Abdullah Waqas
    Hasan Mahmood
    [J]. Wireless Personal Communications, 2017, 96 : 249 - 263
  • [3] A Game Theoretical Approach for Topology Control in Wireless Ad Hoc Networks with Selfish Nodes
    Waqas, Abdullah
    Mahmood, Hasan
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (01) : 249 - 263
  • [4] Truthful multipath routing for ad hoc networks with selfish nodes
    Wang, Yongwei
    Giruka, Venkata C.
    Singhal, Mukesh
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2008, 68 (06) : 778 - 789
  • [5] Truthful and Secure Routing in Ad Hoc Networks with Malicious and Selfish Nodes
    Kargar, Mehdi
    Ghodsi, Mohammad
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2009, 3 (01): : 117 - 128
  • [6] Access control in ad hoc networks with selfish nodes
    Zhao, Dongmei
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2006, 6 (06): : 761 - 772
  • [7] A Low Overhead Truthful Energy-Efficient Routing Protocol in Wireless Mobile Ad hoc Networks with Selfish Nodes
    Yuan, Xinhui
    Chen, Songqiao
    Jiang, Xinhua
    [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 552 - 557
  • [8] On Collecting Underlying Topology in the Selfish Wireless Mobile ad hoc Networks
    Yuan, Xin Hui
    Chen, Song Qiao
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 2372 - 2376
  • [9] The COMMIT protocol for truthful and cost-efficient routing in ad hoc networks with selfish nodes
    Eidenbenz, Stephan
    Resta, Giovanni
    Santi, Paolo
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2008, 7 (01) : 19 - 33
  • [10] Topology Control in Wireless Ad Hoc Networks
    Yadav, Anil
    Singh, Raghuraj
    Shankar, Rama
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SOFT COMPUTING FOR PROBLEM SOLVING (SOCPROS 2011), VOL 1, 2012, 130 : 907 - +