메뉴 건너뛰기




Volumn 31, Issue 4, 2008, Pages 446-471

Trust-based evolutionary game model assisting AODV routing against selfishness

Author keywords

Ad hoc network; Cooperation enforcement techniques; Genetic algorithm; Iterated prisoner's dilemma; Strategic game theory; Trust

Indexed keywords

DECISION MAKING; DYNAMIC MODELS; GAME THEORY; GENETIC ALGORITHMS; STANDARDS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 47949102142     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2008.02.002     Document Type: Article
Times cited : (39)

References (39)
  • 4
    • 0019480612 scopus 로고
    • The further evolution of cooperation
    • Axelrod R., and Dion D. The further evolution of cooperation. Science 211 (1988) 1390-1396
    • (1988) Science , vol.211 , pp. 1390-1396
    • Axelrod, R.1    Dion, D.2
  • 5
    • 47949092332 scopus 로고    scopus 로고
    • Bansal S, Baker M. Observation-based cooperation enforcement in ad hoc networks. 2003 〈http://arxiv.org/pdf/cs.NI/0307012〉.
    • Bansal S, Baker M. Observation-based cooperation enforcement in ad hoc networks. 2003 〈http://arxiv.org/pdf/cs.NI/0307012〉.
  • 6
    • 0029700344 scopus 로고    scopus 로고
    • Blaze M, Feigenbaum J, Lacy J. Decentralized trust management. In: Proceedings of the 1996 IEEE symposium on security and privacy, 1996. p. 164-73.
    • Blaze M, Feigenbaum J, Lacy J. Decentralized trust management. In: Proceedings of the 1996 IEEE symposium on security and privacy, 1996. p. 164-73.
  • 7
    • 47949124477 scopus 로고    scopus 로고
    • Buchegger S, Le Boudec JY. Performance analysis of the CONFIDANT protocol. In: Proceedings of the third ACM international symposium on mobile ad hoc networking and computing (MobiHoc'02), Lausanne, Switzerland, 2002. p. 80-91.
    • Buchegger S, Le Boudec JY. Performance analysis of the CONFIDANT protocol. In: Proceedings of the third ACM international symposium on mobile ad hoc networking and computing (MobiHoc'02), Lausanne, Switzerland, 2002. p. 80-91.
  • 8
    • 47949132264 scopus 로고    scopus 로고
    • Buchegger S, Le Boudec JY. The effect of rumor spreading in reputation systems for mobile ad-hoc networks. In: Proceedings of WiOpt '03: Modeling and optimization in mobile, ad hoc and wireless networks, 2003.
    • Buchegger S, Le Boudec JY. The effect of rumor spreading in reputation systems for mobile ad-hoc networks. In: Proceedings of WiOpt '03: Modeling and optimization in mobile, ad hoc and wireless networks, 2003.
  • 9
    • 47949091955 scopus 로고    scopus 로고
    • Buttyan L, Hubaux JP. Enforce service availability in mobile ad-hoc WANs. In: Proceedings of MobiHoc, 2000.
    • Buttyan L, Hubaux JP. Enforce service availability in mobile ad-hoc WANs. In: Proceedings of MobiHoc, 2000.
  • 10
    • 47949110997 scopus 로고    scopus 로고
    • Buttyan L, Hubaux JP. Stimulating cooperation in self organizing mobile ad hoc networks. Technical report no. DSC/2001/046. Lausanne: Swiss Federal Institute of Technology; 2001a.
    • Buttyan L, Hubaux JP. Stimulating cooperation in self organizing mobile ad hoc networks. Technical report no. DSC/2001/046. Lausanne: Swiss Federal Institute of Technology; 2001a.
  • 11
    • 47949116849 scopus 로고    scopus 로고
    • Buttyan L, Hubaux JP. Nuglets: a virtual currency to stimulate cooperation in self organized mobile ad hoc networks. Technical report no. DSC/2001/011. Lausanne: Swiss Federal Institute of Technology; 2001b.
    • Buttyan L, Hubaux JP. Nuglets: a virtual currency to stimulate cooperation in self organized mobile ad hoc networks. Technical report no. DSC/2001/011. Lausanne: Swiss Federal Institute of Technology; 2001b.
  • 13
    • 0031381841 scopus 로고    scopus 로고
    • Haas ZJ. A new routing protocol for the reconfigurable wireless network. In: Proceedings of the sixth IEEE international conference on universal personal communications record: bridging the way to the 21st century (ICUPC'97), 1997. p. 562-6.
    • Haas ZJ. A new routing protocol for the reconfigurable wireless network. In: Proceedings of the sixth IEEE international conference on universal personal communications record: bridging the way to the 21st century (ICUPC'97), 1997. p. 562-6.
  • 14
    • 0042515320 scopus 로고    scopus 로고
    • Jin Y, Kesidis G. Nash equilibria of a generic networking game with applications to circuit-switched networks. In: Proceedings of IEEE INFOCOM'03, San Francisco, 2003.
    • Jin Y, Kesidis G. Nash equilibria of a generic networking game with applications to circuit-switched networks. In: Proceedings of IEEE INFOCOM'03, San Francisco, 2003.
  • 15
    • 47949127657 scopus 로고    scopus 로고
    • Johnson DB, Maltz DA. The dynamic source routing protocol for mobile ad hoc networks. Internet draft, Mobile Ad Hoc Network (MANET) working group, IETF, 1999. 〈http://www.ietf.org/internet-drafts/draft-ietf-manet-dsr-10.txt〉.
    • Johnson DB, Maltz DA. The dynamic source routing protocol for mobile ad hoc networks. Internet draft, Mobile Ad Hoc Network (MANET) working group, IETF, 1999. 〈http://www.ietf.org/internet-drafts/draft-ietf-manet-dsr-10.txt〉.
  • 16
    • 46749153498 scopus 로고    scopus 로고
    • Komathy K, Narayanasamy P. A corrective approach to alleviate the selfishness of mobile nodes indulging in packet drop. In: Proceedings of the international symposium on ad-hoc & ubiquitous computing. IEEE Computer Society Press; 2006. p. 82-7.
    • Komathy K, Narayanasamy P. A corrective approach to alleviate the selfishness of mobile nodes indulging in packet drop. In: Proceedings of the international symposium on ad-hoc & ubiquitous computing. IEEE Computer Society Press; 2006. p. 82-7.
  • 17
    • 0032661702 scopus 로고    scopus 로고
    • Korilis Y, Orda A. Incentive compatible pricing strategies for qos routing. In: Proceedings of the IEEE INFOCOM'99, New York, 1999.
    • Korilis Y, Orda A. Incentive compatible pricing strategies for qos routing. In: Proceedings of the IEEE INFOCOM'99, New York, 1999.
  • 19
    • 85084162792 scopus 로고    scopus 로고
    • Levien R, Aiken A. Attack-resistant trust metrics for public key certification. In: Proceedings of the seventh USENIX security symposium, 1998. p. 229-42.
    • Levien R, Aiken A. Attack-resistant trust metrics for public key certification. In: Proceedings of the seventh USENIX security symposium, 1998. p. 229-42.
  • 20
    • 85177498469 scopus 로고    scopus 로고
    • Marti S, Giuli TJ, Lai K, Baker M. Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the ACM/IEEE international conference on mobile computing and networking (Mobicom'00), 2000. p. 255-65.
    • Marti S, Giuli TJ, Lai K, Baker M. Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the ACM/IEEE international conference on mobile computing and networking (Mobicom'00), 2000. p. 255-65.
  • 21
    • 47949113992 scopus 로고    scopus 로고
    • Michiardi P, Molva R. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of IFIP-Communication and Multimedia Security, 2002.
    • Michiardi P, Molva R. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of IFIP-Communication and Multimedia Security, 2002.
  • 22
    • 47949104017 scopus 로고    scopus 로고
    • Michiardi P, Molva R. Game theoretic analysis of security in mobile ad hoc networks. Research report RR-02-070, Institute Eurecom; 2005.
    • Michiardi P, Molva R. Game theoretic analysis of security in mobile ad hoc networks. Research report RR-02-070, Institute Eurecom; 2005.
  • 23
    • 47949115246 scopus 로고    scopus 로고
    • Miranda H, Rodrigues L. Preventing selfishness in open mobile ad hoc networks. In: Proceedings of the seventh CaberNet radicals workshop, 2002.
    • Miranda H, Rodrigues L. Preventing selfishness in open mobile ad hoc networks. In: Proceedings of the seventh CaberNet radicals workshop, 2002.
  • 24
    • 27144432401 scopus 로고    scopus 로고
    • Namikawa N, Ishibuchi H. Evolution of cooperative behavior in the iterated prisoner's dilemma under random pairing in game playing. In: Proceedings of the IEEE Press, Congress on Evolutionary Computation (CEC'05), 2005. p. 2637-44.
    • Namikawa N, Ishibuchi H. Evolution of cooperative behavior in the iterated prisoner's dilemma under random pairing in game playing. In: Proceedings of the IEEE Press, Congress on Evolutionary Computation (CEC'05), 2005. p. 2637-44.
  • 26
    • 0031353437 scopus 로고    scopus 로고
    • Park V, Corson M. A highly adaptive distributed routing algorithm for mobile wireless networks. In: Proceedings of INFOCOM'97, 1997.
    • Park V, Corson M. A highly adaptive distributed routing algorithm for mobile wireless networks. In: Proceedings of INFOCOM'97, 1997.
  • 27
    • 85031307530 scopus 로고    scopus 로고
    • Perkins CE, Bhagwat P. Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. In: Proceedings of ACM SIGCOMM'94, 1994. p. 234-44.
    • Perkins CE, Bhagwat P. Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. In: Proceedings of ACM SIGCOMM'94, 1994. p. 234-44.
  • 28
    • 34347349933 scopus 로고    scopus 로고
    • Perkins CE, Royer Elizabeth M. Ad hoc on-demand distance vector routing. In: Proceedings of the second IEEE workshop on mobile computing systems and applications, 1999. p. 90-100.
    • Perkins CE, Royer Elizabeth M. Ad hoc on-demand distance vector routing. In: Proceedings of the second IEEE workshop on mobile computing systems and applications, 1999. p. 90-100.
  • 29
    • 0042941501 scopus 로고    scopus 로고
    • Qiu Y, Marbach P. Bandwidth allocation in wireless ad hoc networks: a price-based approach. In: Proceedings of IEEE INFOCOM'03, San Francisco, 2003.
    • Qiu Y, Marbach P. Bandwidth allocation in wireless ad hoc networks: a price-based approach. In: Proceedings of IEEE INFOCOM'03, San Francisco, 2003.
  • 30
    • 47949111512 scopus 로고    scopus 로고
    • Roughgarden T. Selfish routing. PhD thesis, Cornell University, 2002.
    • Roughgarden T. Selfish routing. PhD thesis, Cornell University, 2002.
  • 31
    • 0041939831 scopus 로고    scopus 로고
    • Srinivasan V, Nuggehalli P, Chiasserini CF, Rao PR. Cooperation in wireless ad hoc networks. In: Proceedings of IEEE INFOCOM'03, San Francisco, 2003.
    • Srinivasan V, Nuggehalli P, Chiasserini CF, Rao PR. Cooperation in wireless ad hoc networks. In: Proceedings of IEEE INFOCOM'03, San Francisco, 2003.
  • 32
    • 11244333253 scopus 로고    scopus 로고
    • Theodorakopoulos G, Baras JS. Trust evaluation in ad hoc networks. In: Proceedings of ACM workshop on wireless security, 2004.
    • Theodorakopoulos G, Baras JS. Trust evaluation in ad hoc networks. In: Proceedings of ACM workshop on wireless security, 2004.
  • 33
    • 47949107663 scopus 로고    scopus 로고
    • Urpi A, Bonuccelli M, Giordano S. Modeling cooperation in mobile ad hoc networks: a formal description of selfishness. In: Proceedings of WiOpt'03: modeling and optimization in mobile, ad hoc and wireless networks. France: INRIA; 2003.
    • Urpi A, Bonuccelli M, Giordano S. Modeling cooperation in mobile ad hoc networks: a formal description of selfishness. In: Proceedings of WiOpt'03: modeling and optimization in mobile, ad hoc and wireless networks. France: INRIA; 2003.
  • 34
    • 35048865979 scopus 로고    scopus 로고
    • Wang Y, Giruka VC, Singhal M. A fair distributed solution for selfish nodes problem in wireless ad HOC networks, ad-hoc, mobile, and wireless networks. In: Proceedings of the third international conference, ADHOC-NOW, 2004, p. 211-24.
    • Wang Y, Giruka VC, Singhal M. A fair distributed solution for selfish nodes problem in wireless ad HOC networks, ad-hoc, mobile, and wireless networks. In: Proceedings of the third international conference, ADHOC-NOW, 2004, p. 211-24.
  • 35
    • 84939548725 scopus 로고    scopus 로고
    • Winsborough WH, Seamons KE, Jones VE. Automated trust negotiation. In: DARPA information survivability conference and exposition, 2000.
    • Winsborough WH, Seamons KE, Jones VE. Automated trust negotiation. In: DARPA information survivability conference and exposition, 2000.
  • 36
    • 0038664333 scopus 로고    scopus 로고
    • A utility-based power control scheme in wireless cellular systems
    • Xiao M., Schroff N.B., and Chong E.K.P. A utility-based power control scheme in wireless cellular systems. IEEE/ACM Transactions on Networking 11 10 (2003) 210-221
    • (2003) IEEE/ACM Transactions on Networking , vol.11 , Issue.10 , pp. 210-221
    • Xiao, M.1    Schroff, N.B.2    Chong, E.K.P.3
  • 37
    • 34547587401 scopus 로고    scopus 로고
    • Yau P, Mitchell CJ. Reputation methods for routing security for mobile ad hoc networks. In: Proceedings of joint IST workshop on mobile future and symposium on trends in communications SympoTIC '03. IEEE Press; 2003. p. 130-7.
    • Yau P, Mitchell CJ. Reputation methods for routing security for mobile ad hoc networks. In: Proceedings of joint IST workshop on mobile future and symposium on trends in communications SympoTIC '03. IEEE Press; 2003. p. 130-7.
  • 38
    • 0034297879 scopus 로고    scopus 로고
    • A game theoretical framework for bandwidth allocation and pricing in broadband networks
    • Yaïche H., Mazumdar R.R., and Rosenberg C. A game theoretical framework for bandwidth allocation and pricing in broadband networks. IEEE/ACM Transactions on Networking 8 5 (2000)
    • (2000) IEEE/ACM Transactions on Networking , vol.8 , Issue.5
    • Yaïche, H.1    Mazumdar, R.R.2    Rosenberg, C.3
  • 39
    • 0042933944 scopus 로고    scopus 로고
    • Zhong S, Chen J, Yang YR. Sprite: a simple, cheat-proof, credit-based system for mobile ad hoc networks. In: Proceedings of IEEE Infocom '03, April 2003.
    • Zhong S, Chen J, Yang YR. Sprite: a simple, cheat-proof, credit-based system for mobile ad hoc networks. In: Proceedings of IEEE Infocom '03, April 2003.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.