Skip to main content
Log in

Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

In military and rescue applications of mobile ad hoc networks, all the nodes belong to the same authority; therefore, they are motivated to cooperate in order to support the basic functions of the network. In this paper, we consider the case when each node is its own authority and tries to maximize the benefits it gets from the network. More precisely, we assume that the nodes are not willing to forward packets for the benefit of other nodes. This problem may arise in civilian applications of mobile ad hoc networks. In order to stimulate the nodes for packet forwarding, we propose a simple mechanism based on a counter in each node. We study the behavior of the proposed mechanism analytically and by means of simulations, and detail the way in which it could be protected against misuse.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. E. Adar and B. Huberman, Free riding on Gnutella, First Monday 5(10) (October 2000).

  2. R. Anderson and M. Kuhn, Tamper resistance û a cautionary note, in: tiProceedings of the Second Usenix Workshop on Electronic Commerce, Oakland, CA (November 1996).

  3. L. Blažević, L. Buttyán, S. Čapkun, S. Giordano, J.-P. Hubaux and J.-Y. Le Boudec, Self-organization in mobile ad hoc networks: The approach of terminodes, IEEE Communications Magazine (June 2001).

  4. L. Blažević, S. Giordano and J.-Y. Le Boudec, Self-organizing widearea routing, in: tiProceedings of SCI 2000/ISAS 2000, Orlando (July 2000).

  5. J. Broch, D. Maltz, D. Johnson, Y.C. Hu and J. Jetcheva, A performance comparison of multi-hop wireless ad hoc network routing protocols, in: tiProceedings of the ACM/IEEE International Conference on Mobile Computing and Networking (Mobicom), Dallas (1998).

  6. S. Buchegger and J.-Y. Le Boudec, Performance analysis of the CONFIDANT protocol (Cooperation Of Nodes û Fairness In Distributed Adhoc NeTworks), in: tiProceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), Lausanne, Switzerland (June 2002).

  7. L. Buttyán and J.-P. Hubaux, Enforcing service availability in mobile ad-hoc WANs, in: tiProceedings of the IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), Boston, MA (August 2000).

  8. S. Corson, J. Freebersyser and A. Sastry (eds.), Mobile Networks and Applications (MONET), Special Issue on Mobile Ad Hoc Networking (October 1999).

  9. P. Gupta and P.R. Kumar, The capacity of wireless networks, IEEE Transactions on Information Theory (March 2000).

  10. J.-P. Hubaux, L. Buttyán and S. Čapkun, The quest for security in mobile ad hoc networks, in: tiProceedings of the 2nd IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), Long Beach, CA (October 2001).

  11. J.-P. Hubaux, T. Gross, J.-Y. Le Boudec and M. Vetterli, Towards selforganized mobile ad hoc networks: The Terminodes project, IEEE Communications Magazine (January 2001).

  12. IBM, IBM 4758 PCI Cryptographic Coprocessor, Secure Way Cryptographic Products (June 1997).

  13. L. Libman and A. Orda, The designer's perspective to atomic noncooperative networks, IEEE/ACM Transactions on Networking 7(6) (1999) 875–884.

    Google Scholar 

  14. S. Marti, T.J. Giuli, K. Lai and M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in: tiProceedings of the ACM/IEEE International Conference on Mobile Computing and Networking (Mobicom), Boston, MA (August 2000).

  15. A. Menezes, P. van Oorschot and S. Vanstone, tiHandbook of Applied Cryptography (CRC Press, Boca Raton, FL, 1997).

  16. C. Perkins (ed.), tiAd Hoc Networking (Addison-Wesley, Reading, MA, 2001).

  17. A. Pfitzmann, B. Pfitzmann and M. Waidner, Trusting mobile user devices and security modules, IEEE Computer (February 1997).

  18. G.J. Pottie and W.J. Kaiser, Wireless integrated sensor networks, Communications of the ACM (May 2000).

  19. H. Yaïche, R. Mazumdar and C. Rosenberg, A game theoretic framework for bandwidth allocation and pricing in broadband networks, IEEE/ACM Transactions on Networking 8(5) (2000) 667–678.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Buttyán, L., Hubaux, JP. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks. Mobile Networks and Applications 8, 579–592 (2003). https://doi.org/10.1023/A:1025146013151

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/A:1025146013151

Navigation