scispace - formally typeset
Open AccessJournal ArticleDOI

Modelling incentives for collaboration in mobile ad hoc networks

Reads0
Chats0
TLDR
The model incorporates incentives for users to act as transit nodes on multi-hop paths and to be rewarded with their own ability to send traffic and illustrates the way in which network resources are allocated to users according to their geographical position.
Abstract
This paper explores a model for the operation of an ad hoc mobile network. The model incorporates incentives for users to act as transit nodes on multi-hop paths and to be rewarded with their own ability to send traffic. The paper explores consequences of the model by means of fluid-level simulations of a network and illustrates the way in which network resources are allocated to users according to their geographical position.

read more

Content maybe subject to copyright    Report

Citations
More filters
Posted Content

Analysis of a Reputation System for Mobile Ad-Hoc Networks with Liars

TL;DR: This work provides a first step to the analysis of a reputation system based on a deviation test and obtains conditions for the deviation test to make the reputation system robust and provide guidelines for a good choice of parameters.
Journal ArticleDOI

Reputed Packet Delivery Using Efficient Audit Misbehaviour Detection and Monitoring Method in Mobile Ad Hoc Networks

TL;DR: This research work integrates an identification of misbehaving nodes as well as the reputation management and trustworthy route discovery based on the behavioral audits into an effective and efficient Audit Misbehaviour Detection and Monitoring Method.
Journal ArticleDOI

Proximity based trust-advisor using encounters for mobile societies: Analysis of four filters

TL;DR: This paper addresses the issue of trust advisory and its establishment in mobile networks, with application to ad hoc networks, including delay tolerant (DTNs), and introduces four new trust advisor filters, largely undo the effect of selfishness on the unreachability in a network.
Proceedings ArticleDOI

Key Agreement for Heterogeneous Mobile Ad-Hoc Groups

TL;DR: An efficient key agreement protocol suite for heterogeneous mobile ad-hoc groups, whose members use mobile devices with different performance limitations, e.g., laptops, PDAs, and mobile phones is proposed.
Journal ArticleDOI

Adaptive Energy Aware Cooperation Strategy in Heterogeneous Multi-domain Sensor Networks

TL;DR: The Adaptive Energy Aware strategy, a novel algorithm that is based on TIT-FOR-TAT, starts with generosity and ends up with conservative behaviour is presented and simulation results showed that this algorithm could prolong its network lifetime in competition with other networks.
References
More filters

Ad hoc On-Demand Distance Vector (AODV) Routing

TL;DR: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Journal ArticleDOI

The capacity of wireless networks

TL;DR: When n identical randomly located nodes, each capable of transmitting at W bits per second and using a fixed range, form a wireless network, the throughput /spl lambda/(n) obtainable by each node for a randomly chosen destination is /spl Theta/(W//spl radic/(nlogn)) bits persecond under a noninterference protocol.
Journal ArticleDOI

Rate control for communication networks: shadow prices, proportional fairness and stability

TL;DR: This paper analyses the stability and fairness of two classes of rate control algorithm for communication networks, which provide natural generalisations to large-scale networks of simple additive increase/multiplicative decrease schemes, and are shown to be stable about a system optimum characterised by a proportional fairness criterion.
Journal ArticleDOI

Mobility increases the capacity of ad hoc wireless networks

TL;DR: The per-session throughput for applications with loose delay constraints, such that the topology changes over the time-scale of packet delivery, can be increased dramatically under this assumption, and a form of multiuser diversity via packet relaying is exploited.
Related Papers (5)