Abstract
Mobile ad hoc networks (MANETs) are formed by a set of mobile nodes without relying on a preexisting infrastructure. In MANETs, ad hoc nodes should count on intermediate nodes to relay messages between two distant nodes. However, due to the inherent dynamicity of such networks, secure and reliable packet forwarding is difficult to achieve. Besides, considering the scarcity of nodes’ power and computational resources, different nodes might find it economically rational to act selfishly in order to maximize their own welfare during their lifecycle. Therefore, in order to keep the network functional we need a mechanism to enforce nodes’ contribution to network operations despite their internal characteristics and willingness.
In this paper we propose a reputation-based schema to foster cooperation amongst ad hoc nodes in the packet forwarding game and isolate selfish behaviours within the MANETs. In the proposed approach, each node is equipped with a security mechanism to estimate the credibility of its neighbouring nodes as well as adaptive measures to compute the cooperation and defection payoffs in order to strategically choose the most profitable behaviour toward its partners. Experimental results indicate the efficacy of our approach in identifying selfish nodes and promote the adoption of a strategic behaviour determination mechanism in a dynamic network in which different nodes with conflicting tendencies participate.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Buchegger, S., Le Boudec, J.-Y.: Performance analysis of the CONFIDANT protocol. In: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing, MobiHoc 2002, pp. 226–236. ACM, New York (2002)
Buttyán, L., Hubaux, J.-P.: Enforcing service availability in mobile ad-hoc WANs. In: Proceedings of the 1st ACM International Symposium on Mobile Ad Hoc Networking & Computing, MobiHoc 2000, pp. 87–96. IEEE Press, Piscataway (2000)
Carter, J., Bitting, E., Ghorbani, A.A.: Reputation formalization for an information-sharing multi-agent system. Computational Intelligence 18(4), 515–534 (2002)
Hang, C.-W., Wang, Y., Singh, M.P.: An adaptive probabilistic trust model and its evaluation. In: AAMAS (3), pp. 1485–1488 (2008)
He, Q., Wu, D., Khosla, P.: SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks. In: IEEE Wireless Communications and Neworking Conference (WCNC 2004), pp. 825–830 (2004)
Jakobsson, M., Hubaux, J.-P., Buttyán, L.: A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 15–33. Springer, Heidelberg (2003)
Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, MobiCom 2000, pp. 255–265. ACM (2000)
Michiardi, P., Molva, R.: CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security, pp. 107–121. Kluwer, B.V. (2002)
Noorian, Z., Marsh, S., Fleming, M.: Multi-layer cognitive filtering by behavioral modeling. In: Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011). ACM (2011)
Noorian, Z., Marsh, S., Fleming, M.: Prob-Cog: An Adaptive Filtering Model for Trust Evaluation. In: Wakeman, I., Gudes, E., Jensen, C.D., Crampton, J. (eds.) Trust Management V. IFIP AICT, vol. 358, pp. 206–222. Springer, Heidelberg (2011)
Smith, M.J., Desjardins, M.: Learning to trust in the competence and commitment of agents. Autonomous Agents and Multi-Agent Systems 18, 36–82 (2009)
Vidal, J.M.: Fundamentals of multiagent systems with NetLogo examples. MIT Press (2001)
Wang, Y., Singh, M.P.: Formal trust model for multiagent systems. In: IJCAI (2007)
Yu, H., Shen, Z., Miao, C., Leung, C., Niyato, D.: A survey of trust and reputation management systems in wireless communications. Proceedings of the IEEE 98(10), 1755–1772 (2010)
Zhong, S., Chen, J., Yang, Y.R.: Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: INFOCOM (2003)
Zouridaki, C., Mark, B.L., Hejmo, M., Thomas, R.K.: A quantitative trust establishment framework for reliable data packet delivery in MANETs. In: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN 2005, pp. 1–10. ACM, New York (2005)
Zouridaki, C., Mark, B.L., Hejmo, M., Thomas, R.K.: Robust cooperative trust establishment for MANETs. In: Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN 2006, pp. 23–34. ACM (2006)
Zviling, M., Leonov, H., Arkin, I.T.: Genetic algorithm-based optimization of hydrophobicity tables. Bioinformatics 21(11), 2651–2656
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Noorian, Z., Noorian, M., Fleming, M., Marsh, S. (2012). A Strategic Reputation-Based Mechanism for Mobile Ad Hoc Networks. In: Kosseim, L., Inkpen, D. (eds) Advances in Artificial Intelligence. Canadian AI 2012. Lecture Notes in Computer Science(), vol 7310. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30353-1_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-30353-1_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-30352-4
Online ISBN: 978-3-642-30353-1
eBook Packages: Computer ScienceComputer Science (R0)