Emergency Connectivity in Ad-hoc Networks with Selfish Nodes

被引:0
|
作者
George Karakostas
Euripides Markou
机构
[1] McMaster University,Department of Computing & Software, School of Computational Engineering & Science
[2] University of Central Greece,Department of Computer Science and Biomedical Informatics
来源
Algorithmica | 2014年 / 68卷
关键词
Nash Equilibrium; Decision Variable; Boolean Variable; Outgoing Edge; Selfish Node;
D O I
暂无
中图分类号
学科分类号
摘要
Inspired by the CONFIDANT protocol (Buchegger and Boudec in Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing, pp. 226–236, 2002), we define and study a basic reputation-based protocol in multihop wireless networks with selfish nodes. Its reputation mechanism is implemented through the ability of any node to define a threshold of tolerance for any of its neighbors, and to cut the connection to any of these neighbors that refuse to forward an amount of flow above that threshold. The main question we would like to address is whether one can set the initial conditions so that the system reaches an equilibrium state where a non-zero amount of every commodity is routed. This is important in emergency situations, where all nodes need to be able to communicate even with a small bandwidth. Following a standard approach, we model this protocol as a game, and we give necessary and sufficient conditions for the existence of non-trivial Nash equilibria. Then we enhance these conditions with extra conditions that give a set of necessary and sufficient conditions for the existence of connected Nash equilibria. We note that it is not always necessary for all the flow originating at a node to reach its destination at equilibrium. For example, a node may be using unsuccessful flow in order to effect changes in a distant part of the network that will prove quite beneficial to it. We show that we can decide in polynomial time whether there exists a (connected) equilibrium without unsuccessful flows. In that case we calculate (in polynomial time) initial values that impose such an equilibrium on the network. On the negative side, we prove that it is NP-hard to decide whether a connected equilibrium exists in general (i.e., with some nodes using unsuccessful flows at equilibrium).
引用
收藏
页码:358 / 389
页数:31
相关论文
共 50 条
  • [21] Identification of Selfish Attack in Cognitive Radio Ad-Hoc Networks
    Wagh, Sharad
    More, Avinash
    Khavnekar, Aditya
    2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2015, : 666 - 669
  • [22] Advanced detection of selfish or malicious nodes in ad hoc networks
    Kargl, F
    Klenk, A
    Schlott, S
    Weber, M
    SECURITY IN AD-HOC AND SENSOR NETWORKS, 2005, 3313 : 152 - 165
  • [23] Truthful multipath routing for ad hoc networks with selfish nodes
    Wang, Yongwei
    Giruka, Venkata C.
    Singhal, Mukesh
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2008, 68 (06) : 778 - 789
  • [24] Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks
    Jo, Minho
    Han, Longzhe
    Kim, Dohoon
    In, Hoh Peter
    IEEE NETWORK, 2013, 27 (03): : 46 - 50
  • [25] On the Connectivity of Vehicular Ad-Hoc Networks in Highway Scenarios
    Minea, Marius
    Gheorghiu, Razvan Andrei
    2016 22ND INTERNATIONAL CONFERENCE ON APPLIED ELECTROMAGNETICS AND COMMUNICATIONS (ICECOM), 2016,
  • [26] A Study of Connectivity in MIMO Fading Ad-Hoc Networks
    Yousefi'zadeh, H.
    Jafarkhani, H.
    Kazemitabar, J.
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2009, 11 (01) : 47 - 56
  • [27] Critical transmission range for connectivity in ad-hoc networks
    Ajorloo, Hossein
    Maddah-Hosseini, S. -Hashem
    Yazdani, Nasser
    Lakdashti, Abolfazl
    NEW TECHNOLOGIES, MOBILITY AND SECURITY, 2007, : 1 - +
  • [28] A Probabilistic Energy-Efficient Approach for Monitoring and Detecting Malicious/Selfish Nodes in Mobile Ad-hoc Networks
    Lupia, Andrea
    De Rango, Floriano
    2016 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, 2016,
  • [29] A Service Negotiation Model for Selfish nodes in the Mobile Ad hoc networks
    Yang, Yang
    Guo, Shao-yong
    Qiu, Xue-song
    Meng, Luo-ming
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [30] New approach for selfish nodes detection in mobile ad hoc networks
    Djenouri, Djamel
    Badache, Nadjib
    2005 WORKSHOP OF THE 1ST INTL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATION NETWORKS - SECURECOMM, 2005, : 288 - 294