Browse > Article
http://dx.doi.org/10.6109/jicce.2012.10.2.141

A Simple but Efficient Scheme for Reliable Connectivity and High Performance in Ad-hoc Wireless Networks  

Tak, Sung-Woo (School of Computer Science and Engineering, Pusan National University)
Abstract
This paper presents a simple but efficient scheme incorporating a reputation-based approach and a cross-layer approach, called the SIM scheme, for maintaining reliable connectivity and high performance in ad-hoc wireless networks. The SIM scheme incorporates the following two things: an ad-hoc routing scheme with a reputation-based approach exploiting the game theory concept based on an evolutionarily stable strategy, and a cross-layer approach between the network layer and the transport layer employing a reputation-based approach.
Keywords
Reliable connectivity; Ad-hoc wireless networks; High performance; Trust-based ad-hoc routing;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Seredynski, P. Bouvry, and M. A. Klopotek, "Modelling the evolution of cooperative behavior in ad hoc networks using a game based model," Proceedings of IEEE Symposium on Computational Intelligence and Games, Honolulu, HI, pp. 96-103, 2007.
2 J. S. Baras and T. Jiang, "Cooperation, trust and games in wireless networks," in Advances in Control, Communication Networks, and Transportation Systems, Boston, MA: Birkhauser, pp. 183-202, 2005.
3 J. M. Smith and G. R. Price, "The logic of animal conflict," Nature, vol. 246, no. 5427, pp. 15-18, 1973.   DOI
4 P. D. Straffin, Game Theory and Strategy, Washington, DC: Mathematical Association of America, 1993.
5 M. Allman, V. Paxson, and W. Stevens, "TCP congestion control," The Internet Engineering Task Force, Fremont, CA, RFC 2581, 2001.
6 T. Camp, J. Boleng, and V. Davies, "A survey of mobility models for ad hoc network research," Wireless Communications & Mobile Computing, vol. 2, no. 5, pp. 483-502, 2002.   DOI   ScienceOn
7 D. Johnson, Y. Hu, and D. Maltz, "The dynamic source routing protocol (DSR) for mobile ad hoc networks for IPv4," The Internet Engineering Task Force, Fremont, CA, RFC 4728, 2007.
8 C. Perkins, E. Belding-Royer, and S. Das, "Ad hoc on-demand distance vector (AODV) routing," The Internet Engineering Task Force, Fremont, CA, RFC 3561, 2003.
9 S. Buchegger and J. de Boudec, "Performance analysis of the CONFIDANT protocol," Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing, Lausanne, Switzerland, pp. 226-236, 2002.
10 P. Michiardi and R. Mova, "Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks," Proceedings of the 6th Joint Working Conference on Communications and Multimedia Security, Portoroz, Slovenia, pp. 107-121, 2002.
11 P. K. Dutta, Strategies and Games: Theory and Practice, Cambridge, MA: MIT Press, 1999.
12 S. R. Das, C. E. Perkins, and E. M. Royer, "Performance comparison of two on-demand routing protocols for ad hoc networks," Proceedings of the 9th Joint Conference of the IEEE Computer and Communications Societies, Tel Aviv, Israel, pp. 3- 12, 2000.
13 Q. He, D. Wu, and P. Khosla, "SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks," Proceedings of IEEE Wireless Communications and Networking Conference, Atlanta, GA, pp. 825-830, 2004.
14 F. Almenarez, A. Marin, D. Diaz, and J. Sanchez, "Developing a model for trust management in pervasive devices," Proceedings of the 4th IEEE International Conference on Pervasive Computing and Communications Workshop, Pisa, Italy, pp. 1-5, 2006.
15 A. Boukerch, L. Xu, and K. El-Khatib, "Trust-based security for wireless ad hoc and sensor networks," Computer Communications, vol. 30, no. 11-12, pp. 2413-2427, 2007.   DOI   ScienceOn
16 A. Ukil, "Secure trust management in distributed computing systems," Proceedings of the 6th IEEE International Conference on Electronic Design, Test and Application, Qeenstwon, New Zealand, pp. 116-121, 2011.