Ad hoc Network Cooperation Enforcement Model Based on Game Theory
Li Tian-ze①② Wu Mu-qing①② Li Pei-zhe①② Liao Wen-xing①② Ma Wei③
①(School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China) ②(Beijing Key Laboratory of Network System Architecture and Convergence, Beijing 100876, China) ③(Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China)
In order to solve the selfishness problem that forwarding nodes in the wireless ad hoc network refuse to cooperation due to the limit of energy and storage space, a wireless ad hoc network cooperation enhancement model combined with the game theory is proposed, which is based on the incentive mechanism of virtual currency, analysis the benefit and overhead characteristics of the source nodes and forwarding nodes. In this model, the network cooperation problem is transformed into a game equilibrium problem about the benefit of source node and forwarding nodes in the data forwarding path, promoting the cooperation of communication. Furthermore, in order to avoid the congestion and maximizing network lifetime, the model makes some certain constraint about the energy and storage space for the forwarding nodes.
李添泽, 武穆清,李沛哲,廖文星,马伟. 基于博弈理论的无线自组织网增强协作模型研究[J]. 电子与信息学报, 2015, 37(12): 2802-2807.
Li Tian-ze, Wu Mu-qing, Li Pei-zhe, Liao Wen-xing, Ma Wei. Ad hoc Network Cooperation Enforcement Model Based on Game Theory. JEIT, 2015, 37(12): 2802-2807.
Marti S and Giuli T J. Mitigating routing misbehavior in mobile Ad hoc networks[C]. MibiCOM 2000, USA, Boston, 2000: 255-265.
[2]
Michiardi P and Molva R. Simulation-based analysis of security exposures in mobile Ad hoc networks[C]. Proceedings of European Wireless Conference, Firenze, Italy, 2002: 275-281.
[3]
Malnar M Z and Neskovic N J. An analysis of performances of multi-channel routing protocol based on different link quality
metrics[C]. International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services, Nis, Serbia, 2011: 737-740.
[4]
Buchegger S and Boudec J Y L. Performance analysis of the Confidant protocol: cooperation of nodes-fairness in dynamic Ad-hoc networks[C]. MobiHOC, Lausanne, Switzerland, 2002: 226-236.
[5]
Michiardi P and Molva R. A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks[C]. Conference on Communications and Multimedia Security, Portoroz, 2002: 107-121.
Wang Yang, Lin Chuang, Li Xue-lin, et al.. Non-cooperation game based research on routing schemes for wireless networks[J]. Chinese Journal of Computers, 2009, 32(1): 54-68.
[7]
Akkarajitsakul K. Game theoretic approaches for multiple access in wireless networks: a survey[J]. IEEE Communications Surveys and Tutorials, 2012, 13(3): 372-395.
[8]
Brown D R and Fazel F. A game theoretic study of energy efficient cooperative wireless networks[J]. Journal of Communications and Networks, 2011, 13(3): 266-276.
[9]
Alizadeh Y, Sabaei M, and Tavallaie O. Game theoretic modeling of joint topology control and forwarding in MANET based on local information[C]. Computational Intelligence and Communication Networks (CICN), Mathura, India, 2013: 510-515.
[10]
Sarkar S and Datta R. A game theoretic model for stochastic routing in self-organized MANETs[C]. Wireless Communications and Networking Conference (WCNC), Shanghai, China, 2013: 1962-1967.
[11]
Rong C. Cooperative game based relay vehicle selection algorithm for VANETs[C]. Communications and Information Technologies (ISCIT), Seoul, Korea, 2014: 30-34.
[12]
Anderegg L and Eidenbenz S. Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents[C]. International Conference on Mobile Computing and Networking, California, USA, 2003: 245-259.
[13]
Buttyan L and Hubaux J P. Enforcing service availability in mobile Ad hoc WANs[C]. MobiHOC, Boston, USA, 2000: 87-96.
[14]
Zhong S, Chen J, and Yang Y R. Sprite: a simple cheat proof credit-base system for mobile ad hoc networks[C]. INFOCOM, San Francisco, USA, 2003: 1987-1997.
Zheng Hui-fang, Jiang Ting, and Zhou Zheng. Theoretical study with the model for MANET cooperation enforcement[J]. Journal of Beijing University of Posts and Telecommunications, 2008, 31(10): 21-14.
[16]
Akkarajitsakul K, Hossain E, and Niyato D. Coalition-based cooperative packet delivery under uncertainty: a dynamic Bayesian coalitional game[J]. IEEE Transactions on Mobile Computing, 2013, 12(2): 371-385.
[17]
Li Z and Shen H. Game-theoretic analysis of cooperation incentive strategies in mobile Ad hoc networks[J]. IEEE Transactions on Mobile Computing, 2012, 11(8): 1287-1303.
[18]
Naserian M and Tepe K. Dynamic probabilistic forwarding in wireless Ad hoc networks based on game theory[C]. Vehicular Technology Conference (VTC Spring), Seoul, Korea, 2014: 1-5.
Zhang Hua-peng and Zhang Hong-bin. Cooperative forwarding model based on repeated game in Ad hoc networks[J]. Jourenal of Electronics & Information Technology, 2014, 36(3): 703-707.
Huang Kai-zhi, Hong Ying, and Luo Wen-yu. A method for physical layer security cooperation based on evolutionary game[J]. Journal of Electronics & Information Technology, 2015, 37(1): 193-197.
[21]
Tang Chang-bing, Li Ang, and Li Xiang. When reputation enforces evolutionary cooperation in unreliable MANETs[J]. IEEE Transactions on Cybernetics, 2014, PP(99): 1-1.
[22]
Safaei Z, Sabaei M, and Torgheh F. An efficient reputation-based mechanism to enforce cooperation in MANETs[C]. Application of Information and Communication Technologies, Venice, Italy, 2009: 1-6.
[23]
Sengathir J, Manoharan R, and Kumar R. Markovian process based reputation mechanisms for detecting selfish nodes in MANETs: A survey[C]. Advanced Computing (ICoAC), Madras, India, 2013: 217-222.
Jiang Xiao-jie, Rui Lan-lan, Guo Shao-yong, et al.. A Reputation-based service differentiated incentive mechanism for MANETs[J]. Journal of Electronics & Information Technology, 2012, 29(7): 1299-1303.
[25]
Liu L, Guo Y, and Yin L. Analyzing asking/bidding price in dynamic game for cooperative authentication[C]. Computer Communications Workshops (INFOCOM WKSHPS), Toronto, Canada, 2014: 165-166.
[26]
Liu Li-cai, Yin Li-hua, Guo Yun-chuan, et al.. Bargaining-based dynamic decision for cooperative authentication in MANETs[C]. Trust, Security and Privacy in Computing and Communications (TrustCom), Beijing, China, 2014: 212-220.