Results 1 - 10
of
484
Ad hoc-VCG: A truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents
, 2003
"... We introduce a game-theoretic setting for routing in a mobile ad hoc network that consists of greedy, selfish agents who accept payments for forwarding data for other agents if the payments cover their individual costs incurred by forwarding data. In this setting, we propose Ad hoc-VCG, a reactive r ..."
Abstract
-
Cited by 234 (8 self)
- Add to MetaCart
(Show Context)
We introduce a game-theoretic setting for routing in a mobile ad hoc network that consists of greedy, selfish agents who accept payments for forwarding data for other agents if the payments cover their individual costs incurred by forwarding data. In this setting, we propose Ad hoc-VCG, a reactive routing protocol that achieves the design objectives of truthfulness (i.e., it is in the agents ’ best interest to reveal their true costs for forwarding data) and cost-efficiency (i.e., it guarantees that routing is done along the most costefficient path) in a game-theoretic sense by paying to the intermediate nodes a premium over their actual costs for forwarding data packets. We show that the total overpayment (i.e., the sum of all premiums paid) is relatively small by giving a theoretical upper bound and by providing experimental evidence. Our routing protocol implements a variation of the well-known mechanism by Vickrey, Clarke, and Groves in a mobile network setting. Finally, we analyze a very natural routing protocol that is an adaptation of the Packet Purse Model [8] with auctions in our setting and show that, unfortunately, it does not achieve cost-efficiency or truthfulness
A Charging and Rewarding Scheme for Packet Forwarding in Multi-hop Cellular Networks
, 2003
"... In multi-hop cellular networks, data packets have to be relayed hop by hop from a given mobile station to a base station and vice-versa. This means that the mobile stations must accept to forward information for the benefit of other stations. In this paper, we propose an incentive mechanism that is ..."
Abstract
-
Cited by 148 (13 self)
- Add to MetaCart
In multi-hop cellular networks, data packets have to be relayed hop by hop from a given mobile station to a base station and vice-versa. This means that the mobile stations must accept to forward information for the benefit of other stations. In this paper, we propose an incentive mechanism that is based on a charging/rewarding scheme and that makes collaboration rational for selfish nodes. We base our solution on symmetric cryptography to cope with the limited resources of the mobile stations. We provide a set of protocols and study their robustness with respect to various attacks. By leveraging on the relative stability of the routes, our solution leads to a very moderate overhead.
A Micro-Payment Scheme Encouraging Collaboration in Multi-Hop Cellular Networks
, 2003
"... We propose a micro-payment scheme for multi-hop cellular networks that encourages collaboration in packet forwarding by letting users benefit from relaying others' packets. At the same time as proposing mechanisms for detecting and rewarding collaboration, we introduce appropriate mechanism ..."
Abstract
-
Cited by 143 (9 self)
- Add to MetaCart
(Show Context)
We propose a micro-payment scheme for multi-hop cellular networks that encourages collaboration in packet forwarding by letting users benefit from relaying others' packets. At the same time as proposing mechanisms for detecting and rewarding collaboration, we introduce appropriate mechanisms for detecting and punishing various forms of abuse. We show that the resulting scheme -- which is exceptionally lightweight -- makes collaboration rational and cheating undesirable.
On Designing Incentive-Compatible Routing and Forwarding Protocols in Wireless Ad-Hoc Networks --An Integrated Approach Using Game Theoretical and Cryptographic Techniques
, 2005
"... In many applications, wireless ad-hoc networks are formed by devices belonging to independent users. Therefore, a challenging problem is how to provide incentives to stimulate cooperation. In this paper, we study ad-hoc games—the routing and packet forwarding games in wireless ad-hoc networks. Unlik ..."
Abstract
-
Cited by 126 (12 self)
- Add to MetaCart
(Show Context)
In many applications, wireless ad-hoc networks are formed by devices belonging to independent users. Therefore, a challenging problem is how to provide incentives to stimulate cooperation. In this paper, we study ad-hoc games—the routing and packet forwarding games in wireless ad-hoc networks. Unlike previous work which focuses either on routing or on forwarding, this paper investigates both routing and forwarding. We first uncover an impossibility result—there does not exist a protocol such that following the protocol to always forward others’ traffic is a dominant action. Then we define a novel solution concept called cooperation optimal protocols. We present Corsac, a cooperation-optimal protocol consisting of a routing protocol and a forwarding protocol. The routing protocol of Corsac integrates VCG with a novel cryptographic technique to address the challenge in wireless ad-hoc networks
Nash Equilibria of Packet Forwarding Strategies in Wireless Ad Hoc Networks
, 2006
"... In self-organizing ad hoc networks, all the networking functions rely on the contribution of the participants. As a basic example, nodes have to forward packets for each other in order to enable multihop communication. In recent years, incentive mechanisms have been proposed to give nodes incentive ..."
Abstract
-
Cited by 101 (10 self)
- Add to MetaCart
(Show Context)
In self-organizing ad hoc networks, all the networking functions rely on the contribution of the participants. As a basic example, nodes have to forward packets for each other in order to enable multihop communication. In recent years, incentive mechanisms have been proposed to give nodes incentive to cooperate, especially in packet forwarding. However, the need for these mechanisms was not formally justified. In this paper, we address the problem of whether cooperation can exist without incentive mechanisms. We propose a model based on game theory and graph theory to investigate equilibrium conditions of packet forwarding strategies. We prove theorems about the equilibrium conditions for both cooperative and noncooperative strategies. We perform simulations to estimate the probability that the conditions for a cooperative equilibrium hold in randomly generated network scenarios. As the problem is involved, we deliberately restrict ourselves to a static configuration. We conclude that in static ad hoc networks— where the relationships between the nodes are likely to be stable—cooperation needs to be encouraged.
SORI: A Secure and Objective Reputation-based Incentive Scheme for Ad-hoc Networks
- In IEEE Wireless Communications and Neworking Conference (WCNC 2004
, 2004
"... In an ad-hoc network, intermediate nodes on a communication path are expected to forward packets of other nodes so that the mobile nodes can communicate beyond their wireless transmission range. However, because wireless mobile nodes are usually constrained by limited power and computation resources ..."
Abstract
-
Cited by 92 (1 self)
- Add to MetaCart
(Show Context)
In an ad-hoc network, intermediate nodes on a communication path are expected to forward packets of other nodes so that the mobile nodes can communicate beyond their wireless transmission range. However, because wireless mobile nodes are usually constrained by limited power and computation resources, a selfish node may be unwilling to spend its resources in forwarding packets which are not of its direct interest, even though it expects other nodes to forward its packets to the destination. It has been shown that the presence of such selfish nodes degrades the overall performance of a non-cooperative ad hoc network.
Denial of Service Resilience in Ad Hoc Networks
- In Proc. of ACM MobiCom
, 2004
"... Significant progress has been made towards making ad hoc networks secure and DoS resilient. However, little attention has been focused on quantifying DoS resilience: Do ad hoc networks have sufficiently redundant paths and counter-DoS mechanisms to make DoS attacks largely ineffective? Or are there ..."
Abstract
-
Cited by 82 (4 self)
- Add to MetaCart
(Show Context)
Significant progress has been made towards making ad hoc networks secure and DoS resilient. However, little attention has been focused on quantifying DoS resilience: Do ad hoc networks have sufficiently redundant paths and counter-DoS mechanisms to make DoS attacks largely ineffective? Or are there attack and system factors that can lead to devastating effects? In this paper, we design and study DoS attacks in order to assess the damage that difficultto -detect attackers can cause. The first attack we study, called the JellyFish attack, is targeted against closed-loop flows such as TCP; although protocol compliant, it has devastating effects. The second is the Black Hole attack, which has effects similar to the JellyFish, but on open-loop flows. We quantify via simulations and analytical modeling the scalability of DoS attacks as a function of key performance parameters such as mobility, system size, node density, and counter-DoS strategy. One perhaps surprising result is that such DoS attacks can increase the capacity of ad hoc networks, as they starve multi-hop flows and only allow one-hop communication, a capacity-maximizing, yet clearly undesirable situation.
Overcoming Free-riding Behavior in Peer-to-Peer Systems
- ACM Sigecom Exchanges
, 2005
"... While the fundamental premise of peer-to-peer (P2P) systems is that of voluntary resource sharing among individual peers, there is an inherent tension between individual rationality and collective welfare that threatens the viability of these systems. This paper surveys recent research at the inters ..."
Abstract
-
Cited by 76 (0 self)
- Add to MetaCart
(Show Context)
While the fundamental premise of peer-to-peer (P2P) systems is that of voluntary resource sharing among individual peers, there is an inherent tension between individual rationality and collective welfare that threatens the viability of these systems. This paper surveys recent research at the intersection of economics and computer science that targets the design of distributed systems consisting of rational participants with diverse and selfish interests. In particular, we discuss major findings and open questions related to free-riding in P2P systems: factors affecting the degree of free-riding, incentive mechanisms to encourage user cooperation, and challenges in the design of incentive mechanisms for P2P systems.
Sustaining Cooperation in Multi-Hop Wireless Networks
- In Proc. of NSDI
, 2005
"... Abstract- Multi-hop wireless networks are vul-nerable to free-riders because they require nodes to forward packets for each other. Deployed routing protocolsignore this issue while proposed solutions incorporate complicated mechanisms with the intent of making free-riding impossible. We present Catc ..."
Abstract
-
Cited by 70 (4 self)
- Add to MetaCart
(Show Context)
Abstract- Multi-hop wireless networks are vul-nerable to free-riders because they require nodes to forward packets for each other. Deployed routing protocolsignore this issue while proposed solutions incorporate complicated mechanisms with the intent of making free-riding impossible. We present Catch, a protocol that falls between these extremes. It achieves nearly the low mech-anism requirements of the former while imposing nearly as effective barriers to free-riding as the latter. Catch ismade possible by novel techniques based on anonymous messages. These techniques enable cooperative nodesto detect nearby free-riders and disconnect them from the rest of the network. Catch has low overhead andis broadly applicable across routing protocols and traffic workloads. We evaluate it on an 802.11 wireless testbedas well as through simulation.
Market Sharing Games Applied to Content Distribution in Ad-Hoc Networks
- MOBIHOC'04
, 2004
"... ..."