Skip to main content

Perspectives of Selfish Behaviour in Mobile Ad Hoc Networks

  • Conference paper
Book cover Numerical Methods and Applications (NMA 2010)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 6046))

Included in the following conference series:

  • 2690 Accesses

Abstract

This paper investigates the conditions in which trust-based cooperation on packet forwarding is unlikely to be developed in mobile ad hoc networks. The analysis is performed by combining genetic algorithms and replicator equation dynamics. We demonstrate that in the presence of a large number of unconditionally cooperative nodes a selfish permanent defection forwarding strategy is more successful than a forgiving version of reciprocal tit-for-tat.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Corson, S., Macker, J.: Mobile ad hoc networking (manet): Routing protocol performance issues and evaluation considerations. IETF RFC 2501 (1999)

    Google Scholar 

  2. Buchegger, S., Boudec, J.Y.L.: Performance analysis of the confidant protocol. In: Proc. 3rd International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2002), pp. 226–236 (2002)

    Google Scholar 

  3. Michiardi, P., Molva, R.: Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proc. 6th Conference on Security Communications, and Multimedia (CMS 2002), pp. 107–121 (2002)

    Google Scholar 

  4. Buchegger, S., Boudec, J.Y.L.: The effect of rumor spreading in reputation systems for mobile ad-hoc networks. In: Proc. Workshop on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt 2003), pp. 131–140 (2003)

    Google Scholar 

  5. He, Q., Dapeng, W., Khosla, P.: Sori: a secure and objective reputation-based incentive scheme for ad-hoc networks. In: Proc. Wireless Communications and Networking Conference (WCNC 2004), vol. 2, pp. 825–830 (2004)

    Google Scholar 

  6. Buchegger, S., Boudec, J.Y.L.: Self-policing mobile ad hoc networks by reputation systems. IEEE Communications Magazine, Special Topic on Advances in Self-Organizing Networks 43(7), 101–107 (2005)

    Google Scholar 

  7. Seredynski, M., Bouvry, P.: Evolutionary game theoretical analysis of reputation-based packet forwarding in civilian mobile ad hoc networks. In: Proc. The 22th IEEE International Parallel and Distributed Processing Symposium, NIDISC Workshop (May 2009)

    Google Scholar 

  8. Yan, L., Hailes, S.: Cooperative packet relaying model for wireless ad hoc networks. In: Proc. 1st ACM International Workshop on Foundations of Wireless Ad Hoc and Sensor Networking and Computing, pp. 93–100. ACM, New York (2008)

    Google Scholar 

  9. Milan, F., Jaramillo, J., Srikant, R.: Achieving cooperation in multihop wireless networks of selfish nodes. In: Proc. Workshop on Game Theory for Communications and Networks. ACM, New York (2006)

    Google Scholar 

  10. Yan, L., Hailes, S.: Designing incentive packet relaying strategies for wireless ad hoc networks with game theory. In: Wireless Sensor and Actor Networks II, pp. 137–148. Springer, Boston (2008)

    Chapter  Google Scholar 

  11. Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proc. ACM/IEEE 6th International Conference on Mobile Computing and Networking (MobiCom 2000), pp. 255–265 (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Seredynski, M., Bouvry, P. (2011). Perspectives of Selfish Behaviour in Mobile Ad Hoc Networks. In: Dimov, I., Dimova, S., Kolkovska, N. (eds) Numerical Methods and Applications. NMA 2010. Lecture Notes in Computer Science, vol 6046. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-18466-6_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-18466-6_35

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-18465-9

  • Online ISBN: 978-3-642-18466-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics