Abstract
In military and rescue applications of mobile ad hoc networks, all the nodes belong to the same authority; therefore, they are motivated to cooperate in order to support the basic functions of the network. In this paper, we consider the case when each node is its own authority and tries to maximize the benefits it gets from the network. More precisely, we assume that the nodes are not willing to forward packets for the benefit of other nodes. This problem may arise in civilian applications of mobile ad hoc networks. In order to stimulate the nodes for packet forwarding, we propose a simple mechanism based on a counter in each node. We study the behavior of the proposed mechanism analytically and by means of simulations, and detail the way in which it could be protected against misuse.
Similar content being viewed by others
References
E. Adar and B. Huberman, Free riding on Gnutella, First Monday 5(10) (October 2000).
R. Anderson and M. Kuhn, Tamper resistance û a cautionary note, in: tiProceedings of the Second Usenix Workshop on Electronic Commerce, Oakland, CA (November 1996).
L. Blažević, L. Buttyán, S. Čapkun, S. Giordano, J.-P. Hubaux and J.-Y. Le Boudec, Self-organization in mobile ad hoc networks: The approach of terminodes, IEEE Communications Magazine (June 2001).
L. Blažević, S. Giordano and J.-Y. Le Boudec, Self-organizing widearea routing, in: tiProceedings of SCI 2000/ISAS 2000, Orlando (July 2000).
J. Broch, D. Maltz, D. Johnson, Y.C. Hu and J. Jetcheva, A performance comparison of multi-hop wireless ad hoc network routing protocols, in: tiProceedings of the ACM/IEEE International Conference on Mobile Computing and Networking (Mobicom), Dallas (1998).
S. Buchegger and J.-Y. Le Boudec, Performance analysis of the CONFIDANT protocol (Cooperation Of Nodes û Fairness In Distributed Adhoc NeTworks), in: tiProceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), Lausanne, Switzerland (June 2002).
L. Buttyán and J.-P. Hubaux, Enforcing service availability in mobile ad-hoc WANs, in: tiProceedings of the IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), Boston, MA (August 2000).
S. Corson, J. Freebersyser and A. Sastry (eds.), Mobile Networks and Applications (MONET), Special Issue on Mobile Ad Hoc Networking (October 1999).
P. Gupta and P.R. Kumar, The capacity of wireless networks, IEEE Transactions on Information Theory (March 2000).
J.-P. Hubaux, L. Buttyán and S. Čapkun, The quest for security in mobile ad hoc networks, in: tiProceedings of the 2nd IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), Long Beach, CA (October 2001).
J.-P. Hubaux, T. Gross, J.-Y. Le Boudec and M. Vetterli, Towards selforganized mobile ad hoc networks: The Terminodes project, IEEE Communications Magazine (January 2001).
IBM, IBM 4758 PCI Cryptographic Coprocessor, Secure Way Cryptographic Products (June 1997).
L. Libman and A. Orda, The designer's perspective to atomic noncooperative networks, IEEE/ACM Transactions on Networking 7(6) (1999) 875–884.
S. Marti, T.J. Giuli, K. Lai and M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in: tiProceedings of the ACM/IEEE International Conference on Mobile Computing and Networking (Mobicom), Boston, MA (August 2000).
A. Menezes, P. van Oorschot and S. Vanstone, tiHandbook of Applied Cryptography (CRC Press, Boca Raton, FL, 1997).
C. Perkins (ed.), tiAd Hoc Networking (Addison-Wesley, Reading, MA, 2001).
A. Pfitzmann, B. Pfitzmann and M. Waidner, Trusting mobile user devices and security modules, IEEE Computer (February 1997).
G.J. Pottie and W.J. Kaiser, Wireless integrated sensor networks, Communications of the ACM (May 2000).
H. Yaïche, R. Mazumdar and C. Rosenberg, A game theoretic framework for bandwidth allocation and pricing in broadband networks, IEEE/ACM Transactions on Networking 8(5) (2000) 667–678.
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Buttyán, L., Hubaux, JP. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks. Mobile Networks and Applications 8, 579–592 (2003). https://doi.org/10.1023/A:1025146013151
Issue Date:
DOI: https://doi.org/10.1023/A:1025146013151