Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Game-theoretic analysis of cooperation incentive strategies in mobile ad hoc networks
Li Z., Shen H. IEEE Transactions on Mobile Computing11 (8):1287-1303,2012.Type:Article
Date Reviewed: Dec 3 2012

The topic of the paper is the distribution of tasks in mobile ad hoc networks (MANETs), where tasks are performed by the cooperating nodes. Node computing resources are limited by assumption, and selfish nodes are not interested in cooperation. To enforce node cooperation, the authors implemented an estimation system using the reputations of the nodes and the price for package transfer. Reputation ratings classify nodes as trustworthy and untrustworthy. Virtual money is used to measure the cost of packet-forwarding services. The game theory approach (see [1] for various applications of this methodology in computer science) is used to investigate the effectiveness of the system of incentives, compared to solutions without such motivation methods. The results are based on the simulation of the network equipped with the proposed reputation evaluation methods and information about the cost charged by the nodes for the transfer of packets. From this, the authors argue that a clever, rich, or selfish node can manipulate the operation of the network. Theoretical and simulation studies of the interaction of nodes show the superiority of the proposed integrated system in finding a solution using individual assessments of reputation and valuation of node services.

The game theory approach to the analysis of packet forwarding in MANETs is the subject of many research projects [2,3]. The main aim of existing models is to construct the strategy of individual nodes based on payoffs for service--their own and that of others. This paper tries to solve the challenge of encouraging the nodes to cooperate in order to maximize the overall system benefit.

Reviewer:  Krzysztof Szajowski Review #: CR140712 (1303-0228)
1) Alpcan, T.; Basar, T. Network security: a decision and game-theoretic approach. Cambridge University Press, Cambridge, UK, 2011.
2) Felegyhazi, M.; Buttyan, L.; Hubaux, J. P. Nash equilibria ofpacket forwarding strategies in wireless ad hoc networks. IEEE Trans. Mobile Computing 5, 5(2006), 463–476.
3) Kameda, H.; Altman, E. Inefficient noncooperation innetworking games of common-pool resources. IEEE J. Selected Areas in Comm. 26, 7(2008), 1260–1268.
Bookmark and Share
  Reviewer Selected
 
 
Wireless Communication (C.2.1 ... )
 
 
Distributed Systems (C.2.4 )
 
 
Performance of Systems (C.4 )
 
Would you recommend this review?
yes
no
Other reviews under "Wireless Communication": Date
Mobile power management for wireless communication networks
Rulnick J., Bambos N. Wireless Networks 3(1): 3-14, 1997. Type: Article
Aug 1 1998
New call blocking versus handoff blocking in cellular networks
Sidi M., Starobinski D. Wireless Networks 3(1): 15-27, 1997. Type: Article
Sep 1 1998
The wireless Net
Fowler D. netWorker: The Craft of Network Computing 1(2): 24-34, 1997. Type: Article
Sep 1 1998
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy