A Truthful Geographic Forwarding Algorithm for Ad-hoc Networks with Selfish Nodes

نویسندگان

  • Yongwei Wang
  • Venkata C. Giruka
  • Mukesh Singhal
چکیده

Geographic routing algorithms for ad-hoc networks exhibit better scalability compared to topology-based routing algorithms. However, geographic routing algorithms assume a cooperative network setting for ad-hoc networks. In this paper, we present TGF, a truthful geographic forwarding algorithm for ad-hoc networks that consist of selfish nodes. These selfish nodes forward data packets from other nodes, if they get enough payment to cover their individual forwarding cost. TGF stimulates node cooperation by using the concept of virtual money and prevents nodes from cheating over their cost. We introduce three auction schemes for forwarding packets to a next hop. In all schemes the next hop node is typically the winner of the auction. We show that TGF is a truthful geographic forwarding algorithm −an algorithm is truthful if it maximizes the utility of nodes only when they bid or claim their true cost. Furthermore, we show the effectiveness of TGF via extensive simulations under various network scenarios. To the best of our knowledge, TGF is the first truthful geographic forwarding algorithm for ad-hoc networks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cluster Based Cross Layer Intelligent Service Discovery for Mobile Ad-Hoc Networks

The ability to discover services in Mobile Ad hoc Network (MANET) is a major prerequisite. Cluster basedcross layer intelligent service discovery for MANET (CBISD) is cluster based architecture, caching ofsemantic details of services and intelligent forwarding using network layer mechanisms. The cluster basedarchitecture using semantic knowledge provides scalability and accuracy. Also, the mini...

متن کامل

Improved Selfish Node Detection Algorithm for Mobile Ad Hoc Network

Mobile Ad hoc network (MANET) suffers from different security issues. Ideally, not all nodes in MANET cooperate in forwarding packets because of non-malicious intention. This node is called selfish node and it behaves so due to its internal state such as limited energy concerns. Selfish nodes drop packets and that harms the process of routes establishment and relaying packets. Therefore, it is ...

متن کامل

Detection and Accusation of Packet Forwarding Misbehavior in Mobile Ad-Hoc Networks

Mobile Ad Hoc networks (MANETs) are susceptible to having their effective operation compromised by a variety of security attacks. For example, misbehaving nodes can cause general network disruption by not forwarding packets on behalf of other nodes in the network. Nodes may misbehave either because they are malicious and deliberately wish to disrupt the network, or because they are selfish and ...

متن کامل

RTC: A Reputation-based Technique for Cooperation Enforcement in Ad Hoc Networks based on TCP Congestion Control Mechanism

Multihop ad hoc networks were designed assuming trustworthiness and cooperation between all participating nodes; nodes in an ad-hoc network rely on one another in packet forwarding, detecting routes, etc. Thus, the performance of an ad hoc network degrades considerably with the presence of misbehaving nodes. Nodes’ misbehaviour includes, but is not limited to, refusing to relay data packets, co...

متن کامل

Pricing for Enabling Forwarding in Wireless Ad Hoc Networks

OF THE THESIS Pricing For Enabling Forwarding in Wireless Ad Hoc Networks by Omer Ileri Thesis Director: Professor Narayan Mandayam In wireless ad hoc networks, it is often assumed that all nodes cooperate to relay packets for each other. Although spontaneous forwarding is a plausible model for military or mission based networks, it may not be realistic for commercial networks and pervasive com...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • I. J. Network Security

دوره 5  شماره 

صفحات  -

تاریخ انتشار 2007