Advanced Search
Volume 37 Issue 12
Jan.  2016
Turn off MathJax
Article Contents
Li Tian-ze, Wu Mu-qing, Li Pei-zhe, Liao Wen-xing, Ma Wei. Ad hoc Network Cooperation Enforcement Model Based on Game Theory[J]. Journal of Electronics & Information Technology, 2015, 37(12): 2802-2807. doi: 10.11999/JEIT150356
Citation: Li Tian-ze, Wu Mu-qing, Li Pei-zhe, Liao Wen-xing, Ma Wei. Ad hoc Network Cooperation Enforcement Model Based on Game Theory[J]. Journal of Electronics & Information Technology, 2015, 37(12): 2802-2807. doi: 10.11999/JEIT150356

Ad hoc Network Cooperation Enforcement Model Based on Game Theory

doi: 10.11999/JEIT150356
Funds:

The Director Funds of Laboratory of Network System Architecture and Convergence (2015BKL-NSAC-ZJ-06)

  • Received Date: 2015-03-25
  • Rev Recd Date: 2015-08-28
  • Publish Date: 2015-12-19
  • In order to solve the selfishness problem that forwarding nodes in the wireless ad hoc network refuse to cooperation due to the limit of energy and storage space, a wireless ad hoc network cooperation enhancement model combined with the game theory is proposed, which is based on the incentive mechanism of virtual currency, analysis the benefit and overhead characteristics of the source nodes and forwarding nodes. In this model, the network cooperation problem is transformed into a game equilibrium problem about the benefit of source node and forwarding nodes in the data forwarding path, promoting the cooperation of communication. Furthermore, in order to avoid the congestion and maximizing network lifetime, the model makes some certain constraint about the energy and storage space for the forwarding nodes.
  • loading
  • Marti S and Giuli T J. Mitigating routing misbehavior in mobile Ad hoc networks[C]. MibiCOM 2000, USA, Boston, 2000: 255-265.
    Michiardi P and Molva R. Simulation-based analysis of security exposures in mobile Ad hoc networks[C]. Proceedings of European Wireless Conference, Firenze, Italy, 2002: 275-281.
    Malnar M Z and Neskovic N J. An analysis of performances of multi-channel routing protocol based on different link quality
    metrics[C]. International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services, Nis, Serbia, 2011: 737-740.
    Buchegger S and Boudec J Y L. Performance analysis of the Confidant protocol: cooperation of nodes-fairness in dynamic Ad-hoc networks[C]. MobiHOC, Lausanne, Switzerland, 2002: 226-236.
    Michiardi P and Molva R. A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks[C]. Conference on Communications and Multimedia Security, Portoroz, 2002: 107-121.
    汪洋, 林闯, 李学林, 等. 基于非合作博弈的无线网络路由机制研究[J]. 计算机学报, 2009, 32(1): 54-68.
    Wang Yang, Lin Chuang, Li Xue-lin, et al.. Non-cooperation game based research on routing schemes for wireless networks[J]. Chinese Journal of Computers, 2009, 32(1): 54-68.
    Akkarajitsakul K. Game theoretic approaches for multiple access in wireless networks: a survey[J]. IEEE Communications Surveys and Tutorials, 2012, 13(3): 372-395.
    Brown D R and Fazel F. A game theoretic study of energy efficient cooperative wireless networks[J]. Journal of Communications and Networks, 2011, 13(3): 266-276.
    Alizadeh Y, Sabaei M, and Tavallaie O. Game theoretic modeling of joint topology control and forwarding in MANET based on local information[C]. Computational Intelligence and Communication Networks (CICN), Mathura, India, 2013: 510-515.
    Sarkar S and Datta R. A game theoretic model for stochastic routing in self-organized MANETs[C]. Wireless Communications and Networking Conference (WCNC), Shanghai, China, 2013: 1962-1967.
    Rong C. Cooperative game based relay vehicle selection algorithm for VANETs[C]. Communications and Information Technologies (ISCIT), Seoul, Korea, 2014: 30-34.
    Anderegg L and Eidenbenz S. Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents[C]. International Conference on Mobile Computing and Networking, California, USA, 2003: 245-259.
    Buttyan L and Hubaux J P. Enforcing service availability in mobile Ad hoc WANs[C]. MobiHOC, Boston, USA, 2000: 87-96.
    Zhong S, Chen J, and Yang Y R. Sprite: a simple cheat proof credit-base system for mobile ad hoc networks[C]. INFOCOM, San Francisco, USA, 2003: 1987-1997.
    郑慧芳, 蒋挺, 周正. MANET增强合作模型的理论研究[J]. 北京邮电大学学报, 2008, 31(10): 21-24.
    Zheng Hui-fang, Jiang Ting, and Zhou Zheng. Theoretical study with the model for MANET cooperation enforcement[J]. Journal of Beijing University of Posts and Telecommunications, 2008, 31(10): 21-14.
    Akkarajitsakul K, Hossain E, and Niyato D. Coalition-based cooperative packet delivery under uncertainty: a dynamic Bayesian coalitional game[J]. IEEE Transactions on Mobile Computing, 2013, 12(2): 371-385.
    Li Z and Shen H. Game-theoretic analysis of cooperation incentive strategies in mobile Ad hoc networks[J]. IEEE Transactions on Mobile Computing, 2012, 11(8): 1287-1303.
    Naserian M and Tepe K. Dynamic probabilistic forwarding in wireless Ad hoc networks based on game theory[C]. Vehicular Technology Conference (VTC Spring), Seoul, Korea, 2014: 1-5.
    张华鹏, 张宏斌. 基于重复博弈的Ad hoc网络合作转发模型[J]. 电子与信息学报, 2014, 36(3): 703-707.
    Zhang Hua-peng and Zhang Hong-bin. Cooperative forwarding model based on repeated game in Ad hoc networks[J]. Jourenal of Electronics Information Technology, 2014, 36(3): 703-707.
    黄开枝, 洪颖, 罗文宇. 基于演化博弈机制的物理层安全协作方法[J]. 电子与信息学报, 2015, 37(1): 193-197.
    Huang Kai-zhi, Hong Ying, and Luo Wen-yu. A method for physical layer security cooperation based on evolutionary game[J]. Journal of Electronics Information Technology, 2015, 37(1): 193-197.
    Tang Chang-bing, Li Ang, and Li Xiang. When reputation enforces evolutionary cooperation in unreliable MANETs[J]. IEEE Transactions on Cybernetics, 2014, PP(99): 1-1.
    Safaei Z, Sabaei M, and Torgheh F. An efficient reputation-based mechanism to enforce cooperation in MANETs[C]. Application of Information and Communication Technologies, Venice, Italy, 2009: 1-6.
    Sengathir J, Manoharan R, and Kumar R. Markovian process based reputation mechanisms for detecting selfish nodes in MANETs: A survey[C]. Advanced Computing (ICoAC), Madras, India, 2013: 217-222.
    蒋小杰, 芮兰兰, 郭少勇, 等. 一种基于信誉的移动自组网区分服务激励机制[J]. 电子与信息学报, 2012, 29(7): 1299-1303.
    Jiang Xiao-jie, Rui Lan-lan, Guo Shao-yong, et al.. A Reputation-based service differentiated incentive mechanism for MANETs[J]. Journal of Electronics Information Technology, 2012, 29(7): 1299-1303.
    Liu L, Guo Y, and Yin L. Analyzing asking/bidding price in dynamic game for cooperative authentication[C]. Computer Communications Workshops (INFOCOM WKSHPS), Toronto, Canada, 2014: 165-166.
    Liu Li-cai, Yin Li-hua, Guo Yun-chuan, et al.. Bargaining-based dynamic decision for cooperative authentication in MANETs[C]. Trust, Security and Privacy in Computing and Communications (TrustCom), Beijing, China, 2014: 212-220.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1314) PDF downloads(638) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return