• Title/Summary/Keyword: Selfish

Search Result 149, Processing Time 0.019 seconds

A Reputation Compensation Protocol For Mobile Ad Hoc Networks (모바일 Ad hoc 네트워크를 위한 신용 평가 보상 프로토콜)

  • Lei, Zhu;Kang, Jeon-Il;Nyang, Dae-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.1
    • /
    • pp.35-44
    • /
    • 2006
  • The area of ad hoc networking has been receiving increasing attention among researchers in recent years and a variety of routing protocols targeted specifically at the ad hoc networking environment have been proposed. Selfish nodes are those which do not perform certain operations that the protocol specifies that they should, through a wish to conserve power. We propose a scheme as a mean to mitigate the detrimental effect of selfish nodes. We also propose a new area that might affect nodes' behavior - the environment's influence. In order to let nodes fairly be able to communicate in the networks we proposed solution to this problem. And our scheme can be applied to other reputation methods. We also contain the simulation results in our paper, and through the result, we can conclude that we can solve the problem by adding a little overhead.

A Statistical Detection Method to Detect Abnormal Cluster Head Election Attacks in Clustered Wireless Sensor Networks (클러스터 기반 WSN에서 비정상적인 클러스터 헤드 선출 공격에 대한 통계적 탐지 기법)

  • Kim, Sumin;Cho, Youngho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1165-1170
    • /
    • 2022
  • In WSNs, a clustering algorithm groups sensor nodes on a unit called cluster and periodically selects a cluster head (CH) that acts as a communication relay on behalf of nodes in each cluster for the purpose of energy conservation and relay efficiency. Meanwhile, attack techniques also have emerged to intervene in the CH election process through compromised nodes (inside attackers) and have a fatal impact on network operation. However, existing countermeasures such as encryption key-based methods against outside attackers have a limitation to defend against such inside attackers. Therefore, we propose a statistical detection method that detects abnormal CH election behaviors occurs in a WSN cluster. We design two attack methods (Selfish and Greedy attacks) and our proposed defense method in WSNs with two clustering algorithms and conduct experiments to validate our proposed defense method works well against those attacks.

Relationships between Guilty and Rule violation Acts (죄책감과 청소년의 규칙위반 행위와의 관계)

  • 하영희
    • Journal of Families and Better Life
    • /
    • v.18 no.1
    • /
    • pp.115-126
    • /
    • 2000
  • The purpose of hisstudy was to explore effects of adolescents age sex and parental types on the types guilty and correlations between the Rule violation types and guilty types. A All of 698 middle school students and high school students in Pusan were administered Questionaires. The major findings of this study were as follows: Younger adolescents reported more guilty feelings than older adolescents in all types of guilty. Female adolescents reported more in selfish type guilty than males. Parental induction induced adolescents reported lower rates of violation in all types of rule violation than older adolescents. Male adolescents reported more violation in public related rule violation and property damage rule violation than females. There were negative relation between all guilty types and all Rule violation, These results were discussed and its implication and following study were suggested.

  • PDF

An Ad-Hoc Network Routing Scheme based on Mechanism Design Approach (메커니즘 디자인 접근방식에 기반을 둔 애드혹 네트워크 라우팅 기법)

  • Lee, Jin-Hyung;Kim, Sung-Wook
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.3
    • /
    • pp.198-203
    • /
    • 2010
  • In this paper, a new routing protocol is proposed to manage selfish nodes which make a strategic choice to maximize only their own profits. To provide incentives to nodes on the path, VCG mechanism is introduced. Therefore, based on the collaborative actions among nodes, the entire network performance can be improved. With a simulation study, the proposed scheme can approximate an optimized solution while ensuring a well-balanced network performance under widely diverse network environments.

The Influence of the Social-demographic Variables and Familism on the Family-selfish Behavior (가족이기주의행동에 대한 사회인구학적 변인과 가족주의 가치관의 영향)

  • 조희순
    • Journal of Families and Better Life
    • /
    • v.13 no.2
    • /
    • pp.68-77
    • /
    • 1995
  • 본 연구는 급속한 산업화와 현대화 과정에서 파생괸 과소비 호화혼수, 재벌의 변칙 적인 부의 세습, 상류층내의 배타적인 결혼 지나친 교육열, 환경오염등과 같은 다양한 가족 이기주의 현상의 심각성을 재인식하고 이에 영향을 미치는 요인을 살펴봄으로써 가족이기주 의의 예방을 개선을 도모해 나갈 기본자료를 마련하는데 목적을 두고 있다 서울시에 거주하 는 기혼남녀 333명을 대상으로 가족이기주의 행동의 실태와 이에대한 사회인구학적 변인과 가족주의 가치관의 영향을 살펴본 결과 가정내에서의 가족이기주의 행동에 영향을 미치는 변인은 성별($\beta=.238$), 교육수준($\beta=.237$), 소득($\beta=.188$), 가족우선성의식($\beta=.156$), 형제자매 및 친척간 사회경제적 연대의식($\beta=-.155$)이었고, 교육에서의 가족이기주의 행동에 영향을 미치는 변인은 소득($\beta=.233$), 성별($\beta=.200$), 연령($\beta=.176$), 교육수준($\beta=.156$)이었으며, 환경에서의 가족이기주의 행동에 영향을 미치는 변인은 소득($\beta=.263$)인 것으로 나타났다.

  • PDF

Competitive Resource Sharing Based on Game Theory in Cooperative Relay Networks

  • Zhang, Guopeng;Cong, Li;Zhao, Liqiang;Yang, Kun;Zhang, Hailin
    • ETRI Journal
    • /
    • v.31 no.1
    • /
    • pp.89-91
    • /
    • 2009
  • This letter considers the problem of resource sharing among a relay and multiple user nodes in cooperative transmission networks. We formulate this problem as a sellers' market competition and use a noncooperative game to jointly consider the benefits of the relay and the users. We also develop a distributed algorithm to search the Nash equilibrium, the solution of the game. The convergence of the proposed algorithm is analyzed. Simulation results demonstrate that the proposed game can stimulate cooperative diversity among the selfish user nodes and coordinate resource allocation among the user nodes effectively.

  • PDF

The Effects of Cooperativeness and Information Redundancy on Team Performance : A Simulation Study (협동성과 정보 여분의 팀 성과에 대한 효과 : 시뮬레이션 연구)

  • Kang, Min-Cheol
    • Asia pacific journal of information systems
    • /
    • v.12 no.2
    • /
    • pp.197-216
    • /
    • 2002
  • Cooperativeness within an organization can be conceptualized as the degree of members' willingness to work with others. The simulation study investigates the relationships of cooperativeness with team performance at different levels of information redundancy by using a multi-agents model called Team-Soar. The model consists of a group of four individual Al agents situated in a network, which models a naval command and control team consisting of four members. The study used a $9{\times}3$ design in which agent cooperativeness was manipulated at nine levels by gradually replacing selfish team members with increasing numbers of neutral and cooperative members, while information redundancy was controlled at three different levels(i.e., low, medium, and high). Results of the Team-Soar simulation show that cooperation has positive impacts on team performance. Further, the results reveal that the impact of agent cooperativeness on team performance depends on the amount of information needed to be processed during the decision making process.

Information Propagation in Social Networks with Overlapping Community Structure

  • Zhao, Narisa;Liu, Xiaojun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.5927-5942
    • /
    • 2017
  • Many real networks exhibit overlapping community structures. Recent studies have been performed that analyze the impact of overlapping community structure on information propagation, but few of them concerned with individual behaviors. From this point of view, we propose a Markov process model to evaluate the performance of information propagation in social networks with overlapping community structures. In addition, many individual social behaviors are combined in the model. For example, individuals may exhibit selfish behaviors, such as individual and social selfishness, and people may discard the information after they have used it. The accuracy of the model is verified by simulation. Furthermore, the numerical results show that both overlapping community structure of the network and individual behaviors have a significant impact on the outbreak size and propagation speed of the information. Additionally, the overlapping community structure of the social network can reduce the impact of selfishness on information propagation.

D2D Power Control in the Cellular System: Non Cooperative Game Theoretic Approach

  • Oh, Changyoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.3
    • /
    • pp.25-31
    • /
    • 2018
  • In this paper, we consider the game theoretic approach to investigate the transmit power optimization problem where D2D users share the uplink of the cellular system. Especially, we formulate the transmit power optimization problem as a non cooperative power control game. In the user wide sense, each user may try to select its transmit power level so as to maximize its utility in a selfish way. In the system wide, the transmit power levels of all users eventually converge to the unique point, called Nash Equilibrium. We first formulate the transmit power optimization problem as a non cooperative power control game. Next, we examine the existence of Nash Equilibrium. Finally, we present the numerical example that shows the convergence to the unique transmit power level.

Customer Misbehavior in Retail Settings: The Retail Employee Perspective (유통환경에서의 고객 부정행동 고찰: 유통업체 종업원 관점)

  • Park, Kyung-Ae
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.34 no.7
    • /
    • pp.1220-1231
    • /
    • 2010
  • This study examined customer misbehaviors in retail settings by identifying behavioral patterns and exploring behavioral backgrounds and consequences from the employee's perspectives. Qualitative data were collected from an individual interview method, and 222 interviews were analyzed. Customer misbehavior was categorized into unethical returns, problem behaviors in service encounters, unreasonable demands, shoplifting/fraud, ill-mannered behaviors, and selfish behaviors. Behavioral backgrounds included dissatisfaction, unreasonable expectations, actively benefiting of service failures, taking advantage of service standards, illegitimate complaints, monetary gains, transferring responsibility, and demanding special treatment. Employees experienced stress facing misbehaving customers with no other choice except to accept misbehaviors and learned misbehaviors as customers themselves. The study further discusses the implications.