Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

A reactive algorithm for deducing nodal forwarding behavior in a multihop ad-hoc wireless network in the presence of errors

Treść / Zawartość
Warianty tytułu
Języki publikacji
A novel algorithm is presented to deduce individual nodal forwarding behavior from standard end-to-end acknowledgments. The algorithm is based on a well-established mathematical method and is robust to network related errors and nodal behavior changes. The proposed solution was verified in a network simulation, during which it achieved sound results in a challenging multihop ad-hoc network environment.
Słowa kluczowe
Opis fizyczny
Bibliogr. 21 poz., schem., tab., wykr.
  • Faculty of Electronics, Telecommunications and Informatics, Gdańsk University of Technology, Gdańsk, Poland
  • Faculty of Electronics, Telecommunications and Informatics, Gdańsk University of Technology, Gdańsk, Poland
  • [1] Z. Li and H. Shen, “Analysis the cooperation strategies in mobile ad hoc networks”, Proceedings MASS 2008, Atlanta, GA, Oct. 2008. DOI: 10.1109/MAHSS.2008.4660129.
  • [2] L. Buttyan and J-P. Hubaux, “Stimulating Cooperation in SelfOrganizing Mobile Ad Hoc Networks”, ACM J. Mobile Networks (MONET), special issue on Mobile Ad Hoc Networks, 2002. DOI: 10.1023/A:1025146013151
  • [3] K. Hoffman, D. Zage and C. Nita-Rotaru, “A survey of attack and defense techniques for reputation systems”, ACM Computing Surveys, vol. 42, issue 1, Dec. 2009. DOI: 10.1145/1592451.1592452
  • [4] J. Konorski and K. Rydzewski, “Guessing Intrinsic Forwarding Trustworthiness of MANET Nodes from End-to-End Packet Delivery”, 11th EAI International Conference, ADHOCNETS 2019, Queenstown, New Zealand, Nov. 18–21, 2019.
  • [5] S. Buchegger and J.-Y. L. Boudec, “Performance analysis of the CONFIDANT protocol”, Proc. 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing, Lausanne, Switzerland, pp. 226-236, 2002.
  • [6] P. Michiardi and R. Molva, “CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks,” Proc. 6th IFIP Communication and Multimedia Security Conference, Portoroz, Slovenia, pp. 107-121, 2002.
  • [7] S. Gupta and C. Kumar, “An intelligent efficient secure routing protocol for MANET”, Int. J. Future Generation Communication and Networking, vol. 6, no. 1, pp. 111-131, Feb. 2013.
  • [8] M. T. Refaei, L. A. DaSilva, M. Eltoweissy, and T. Nadjem, “Adaptation of reputation management systems to dynamic network conditions in ad hoc networks”, IEEE Transactions Computers, vol. 59, no. 5, pp. 707-719, May 2010.
  • [9] E. Chiejina, H. Xiao and B. Christianson, “A Dynamic Reputation Management System for Mobile Ad Hoc Networks”, Computers 4(2): 87-112, 2015. DOI: 10.3390/computers4020087
  • [10] J. H. Saltzer, D. P. Reed, and D. D. Clark, ”End-to-End Arguments in System Design”, ACM Transactions on Computer Systems 2.4, pp. 277-288, 1984.
  • [11] M.A. Paracha, S. Ahmad, A. Akram and M.W. Anwar, “Cooperative Reputation Index Based Selfish Node Detection and Prevention System for Mobile Ad hoc Networks”, Research Journal of Applied Sciences, Engineering and Technology 4(3): 201-205, Apr. 2012.
  • [12] K. Gopalakrishnan and V.R. Uthariaraj, “Acknowledgment based Reputation Mechanism to Mitigate the Node Misbehavior in Mobile Ad Hoc Networks”, Journal of Computer Science 7 (8): 1157-1166, 2011. DOI: 10.3844/jcssp.2011.1157.1166
  • [13] Y. Zhang, L. Lazos and W.J. Kozma, “AMD: Audit-Based Misbehavior Detection in Wireless Ad Hoc Networks”, IEEE Transactions on Mobile Computing, vol. 15, no. 8, Aug. 2016. DOI: 10.1109/TMC.2012.257
  • [14] K. Graffi, P. S. Mogre, M. Hollick, and R. Steinmetz, “Detection of colluding misbehaving nodes in mobile ad hoc and wireless mesh networks”, Proceedings IEEE GLOBECOM, Washington DC, Nov. 2007. DOI: 10.1109/GLOCOM.2007.966
  • [15] S. Sivanantham, K. Kirankumar and V. Akshaya, “Detection and Avoidance of Intrusion, Packet Drop and Modification in WSN”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 2, Issue 11, Nov. 2013.
  • [16] S. Tan, X. Li and Q. Dong, “A Trust Management System for Securing Data Plane of Ad-Hoc Networks”, IEEE Transactions on Vehicular Technology, vol. 65, no. 9, Sep. 2016. DOI: 10.1109/TVT.2015.2495325
  • [17] J. Konorski and R. Orlikowski, “A reputation system for MANETs and WSNs using traffic shedding”, : 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies, Rome, Italy, Nov. 2010. DOI: 10.1109/isabel.2010.5702858
  • [18] D. Johnson, D. Maltz, and J. Broch, ”DSR: The Dynamic Source Routing Protocol for Multi-hop Wireless Ad Hoc Networks”, Boston, MA: Addison-Wesley, 2001.
  • [19] K. J. Ray Liu and B. Wang, “Repeated games and learning for packet forwarding”, Cognitive Radio Networking and Security A GameTheoretic View, Cambridge University Press, pp. 270-296, Oct. 2010. DOI: 10.1017/CBO9780511778773
  • [20] OpenSim.Ltd,
  • [21] J. Nagle, “Congestion Control in IP/TCP Internetworks”, Request for Comments 896, IETF, Jan. 1984. DOI: 10.17487/RFC0896
Typ dokumentu
Identyfikator YADDA
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.