Stimulating cooperation in self-organizing mobile ad hoc networks
read more
Citations
Performance analysis of the CONFIDANT protocol
Mobile ad hoc networking: imperatives and challenges
Topology Control in Wireless Ad Hoc and Sensor Networks
Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks
Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes - Fairness In Dynamic Ad-hoc NeTworks
References
Handbook of Applied Cryptography
The capacity of wireless networks
A performance comparison of multi-hop wireless ad hoc network routing protocols
Mitigating routing misbehavior in mobile ad hoc networks
Wireless integrated network sensors
Related Papers (5)
Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks
Frequently Asked Questions (13)
Q2. What are the future works mentioned in the paper "Stimulating cooperation in self-organizing mobile ad hoc networks" ?
In their future work, the authors intend to study the behavior of the proposed mechanism, when these assumptions are weakened. In their future work, the authors intend to explore the way to generalize the proposed mechanism to these functions as well. The authors believe that, while modeling the problem as a game may be possible, the main tool to study this game will still be simulation. Finally, inspired by the work on pricing problems in non-cooperative networks [ 15, 19 ], one may be tempted to address the problem of selfishness in mobile ad hoc networks with a game theoretic approach.
Q3. What is the protocol used to establish security associations between the security modules?
The security associations between the security modules are established using some public-key cryptographic protocol, which is executed through the nodes that host the security modules.
Q4. How did the authors study the proposed stimulation mechanism in a more general setting?
In order to study the proposed stimulation mechanism in a more general setting, which is closer to the reality of mobile ad hoc networks, the authors conducted simulations of a full network written in plain C++ language.
Q5. How do the authors prevent the user from increasing its own nuglet counter?
In order to prevent the user from illegitimately increasing its own nuglet counter, the authors require that the nuglet counter is maintained by a trusted and tamper resistant hardware module in each node.
Q6. Why did packet drops occur in their simulations?
In their simulations, because of the rather high density and the rather low speed mobility of the nodes, packet drops of this kind almost never happened .
Q7. Why is there a small fluctuation in the ratio between the number of forwarding packets?
The reason is that, due to the random manner in which the packets arrive, there is always a small fluctuation in the ratio between the number of forwarding packets and the number of own packets.
Q8. What is the approach to limit the variation of the average nuglet level in the network?
An approach to limit the variation of the average nuglet level in the network would be to reset the nuglet counter to a reference value regularly.
Q9. What is the effect of using Rule 3’ on the average nuglet level in the network?
when more nodes use Rule 1’, packets are delivered with a higher probability, and thus, the average nuglet level increases more rapidly.
Q10. How many hops will be consumed by packet forwarding?
For instance, if the average number of hops from source to destination is around 5, then approximately 80% of the energy devoted to sending packets will be consumed by packet forwarding.
Q11. What is the main tool to study this game?
The authors believe that, while modeling the problem as a game may be possible, the main tool to study this game will still be simulation.
Q12. What does the model assume that there is no buffering of own packets?
the authors assume that there is no buffering of own packets, which means that an own packet that cannot be sent immediately (due to the low value of the nuglet counter) must be dropped.
Q13. Why does an intermediate node earn nuglets with packet forwarding?
This is because an intermediate node can earn nuglets with packet forwarding only if it passes the forwarding packet to its security module.