A Game for Ad Hoc Network Connectivity in the Presence of Malicious Users

نویسندگان

  • George Theodorakopoulos
  • John S. Baras
چکیده

Ad hoc network users are resource constrained: Before transmitting data, they have to take into account the energy expenditure involved. Even if a user is, in principle, willing to spend energy to improve network connectivity, his actual decision will be heavily influenced by the decisions of his neighboring users, since they act as relay nodes for him. Moreover, some of the neighbors may not be as benign as he is; in fact, they could be outright malicious. We are abstracting the tradeoff between spending energy and increasing connectivity by modeling the interaction of a user with his one-hop neighbors in a game theoretic fashion. Two types of users exist: Good users willingly trade energy for connectivity, but only if they expect their neighbors to do the same; Bad users try to destroy connectivity, but also lure the Good users to waste energy. Within our model for user behavior and sophistication, we explore outcomes that can arise in this graphical game.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Evolutionary Computing Assisted Wireless Sensor Network Mining for QoS-Centric and Energy-efficient Routing Protocol

The exponential rise in wireless communication demands and allied applications have revitalized academia-industries to develop more efficient routing protocols. Wireless Sensor Network (WSN) being battery operated network, it often undergoes node death-causing pre-ma...

متن کامل

Improving Vehicular Ad-Hoc Network Stability Using Meta-Heuristic Algorithms

Vehicular ad-hoc network (VANET) is an important component of intelligent transportation systems, in which vehicles are equipped with on-board computing and communication devices which enable vehicle-to-vehicle communication. Consequently, with regard to larger communication due to the greater number of vehicles, stability of connectivity would be a challenging problem. Clustering technique as ...

متن کامل

BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms

Mobile ad hoc networks (MANETs) are multi-hop wireless networks of mobile nodes constructed dynamically without the use of any fixed network infrastructure. Due to inherent characteristics of these networks, malicious nodes can easily disrupt the routing process. A traditional approach to detect such malicious network activities is to build a profile of the normal network traffic, and then iden...

متن کامل

Optimized Multicast Routing Scheme for Mobile Ad Hoc Networks

Mobile Ad hoc Network is the indivisible part of wireless network. In the past few years, the popularity of MANET grows unlimitedly. Due to the presence of mobility and infrastructure less topology, the vulnerability of ad hoc networks is introduced unconditionally. So the failures of link, path and node may occur which leads to lack of communication between the users. Sometimes the malicious a...

متن کامل

A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks

Nodes in a mobile ad hoc network need to thwart various attacks and malicious activities. This is especially true for the ad hoc environment where there is a total lack of centralized or third-party authentication and security architectures. This paper presents a game-theoretic model to analyze intrusion detection in mobile ad hoc networks. We use game theory to model the interactions between t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006