Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing)
Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing)
Achieving cooperation in multihop wireless networks of selfish nodes
GameNets '06 Proceeding from the 2006 workshop on Game theory for communications and networks
A Cooperative MAC Protocol for Ad Hoc Wireless Networks
PERCOMW '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops
ICIMP '07 Proceedings of the Second International Conference on Internet Monitoring and Protection
DARWIN: distributed and adaptive reputation mechanism for wireless ad-hoc networks
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Struggling against selfishness and black hole attacks in MANETs
Wireless Communications & Mobile Computing
IEEE Transactions on Communications
A survey of security issues in mobile ad hoc and sensor networks
IEEE Communications Surveys & Tutorials
An analytical approach to the study of cooperation in wireless ad hoc networks
IEEE Transactions on Wireless Communications
Opportunistic cooperation by dynamic resource allocation
IEEE Transactions on Wireless Communications
Sequential detection of targets in multichannel systems
IEEE Transactions on Information Theory
Self-policing mobile ad hoc networks by reputation systems
IEEE Communications Magazine
IEEE Communications Magazine
Pricing for enabling forwarding in self-configuring ad hoc networks
IEEE Journal on Selected Areas in Communications
CoopMAC: A Cooperative MAC for Wireless LANs
IEEE Journal on Selected Areas in Communications
Robust Detection of Selfish Misbehavior in Wireless Networks
IEEE Journal on Selected Areas in Communications
Computers and Electrical Engineering
Hi-index | 0.01 |
CoopMAC has been recently proposed as a possible implementation of cooperation protocols in the medium access control (MAC) layer of a wireless network. However, some nodes may refrain from cooperation for selfish purposes, e.g. in order to save energy, in what is called selfish behavior or misbehavior. This protocol violation worsens other nodes' performance and can be avoided if other nodes detect and punish (e.g. banning from the network) misbehaving nodes. However, fading and interference may prevent nodes from cooperating even if they are willing, therefore it is not trivial to identify misbehaving nodes. In a fading scenario where an automatic repeat request (ARQ) protocol is used, we propose a mechanism that allows to detect misbehaving nodes. Two approaches, either based on the uniformly most powerful (UMP) test or on the sequential probability ratio test (SPRT) are considered. The two techniques are characterized and compared in terms of their average detection delay and resulting network performance.