Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Prisoner's Dilemma: John Von Neumann, Game Theory and the Puzzle of the Bomb
Prisoner's Dilemma: John Von Neumann, Game Theory and the Puzzle of the Bomb
Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security
DARWIN: distributed and adaptive reputation mechanism for wireless ad-hoc networks
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Optimal forwarding for wireless ad hoc networks with game theory
International Journal of Autonomous and Adaptive Communications Systems
Cooperation in ad hoc networks with noisy channels
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Coexistence with malicious nodes: a game theoretic approach
GameNets'09 Proceedings of the First ICST international conference on Game Theory for Networks
A global security architecture for operated hybrid WLAN mesh networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Multi-goal economic search using dynamic search structures
Autonomous Agents and Multi-Agent Systems
A proactive data security framework for mission-critical sensor networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
A novel reputation computation model based on subjective logic for mobile ad hoc networks
Future Generation Computer Systems
Sequential Multilateral Search for a Common Goal
WI-IAT '11 Proceedings of the 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Volume 02
RBC-OLSR: Reputation-based clustering OLSR protocol for wireless ad hoc networks
Computer Communications
Join Me with the Weakest Partner, Please
WI-IAT '12 Proceedings of the The 2012 IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technology - Volume 02
Sequential multi-agent exploration for a common goal
Web Intelligence and Agent Systems
Hi-index | 0.00 |
This paper focuses on the formal assessment of the properties of cooperation enforcement mechanisms used to detect and prevent selfish behavior of nodes forming a mobile ad hoc network. In the first part, we demonstrate the requirement for a cooperation enforcement mechanism using cooperative game theory that allows us to determine a lower bound on the size of coalitions of cooperating nodes. In the second part, using non-cooperative game theory, we compare our cooperation enforcement mechanism CORE to other popular mechanisms. Under the hypothesis of perfect monitoring of node behavior, CORE appears to be equivalent to a wide range of history-based strategies like tit-for-tat. Further, adopting a more realistic assumption taking into account imperfect monitoring due to probable communication errors, the non-cooperative model puts in evidence the superiority of CORE over other history-based schemes.