DIRECT RECIPROCITY-BASED COOPERATION IN MOBILE AD HOC NETWORKS

2012 ◽  
Vol 23 (02) ◽  
pp. 501-521 ◽  
Author(s):  
MARCIN SEREDYNSKI ◽  
PASCAL BOUVRY

A distributed nature of a wireless mobile ad hoc network, lack of a single authority, and limited battery resources of participating devices may lead its users to be reluctant to packet relaying duties. This paper investigates potential networking conditions that could lead to a direct reciprocity-based cooperation on packet relaying. Simulation of behaviour of the network is carried out using an evolutionary game-theoretical approach. A game-based model of nodes' interactions coupled with a genetic algorithm is used to find successful relaying strategies for various networking conditions. Computational experiments demonstrate that the reciprocity-based packet relaying is an efficient way to overcome the social dilemma present in such a network. However, in the presence of a large number of unconditionally cooperatives nodes a selfish permanent defection strategy is more efficient than a reciprocal tit-for-tat strategy. Nevertheless the switch from cooperative to selfish behaviour among some users does not change significantly the overall performance of the network as the negative consequences of the switch are compensated by the generous packet relaying contribution of unconditionally cooperative nodes.

Author(s):  
Anthony Krzesinski

Consider a mobile ad hoc network (MANET) where the nodes belong todifferent authorities. The nodes must be given incentives to spend theirresources (battery energy, transmission bandwidth, buffer space) inforwarding packets that originate at nodes belonging to anotherauthority.  This can be done by assigning a credit balance to each node:when a node acts as an originating node it uses its credits to pay forthe costs of sending its own traffic; when a node acts as a transit nodeit earns credits by forwarding traffic from other nodes.  This paperpresents a credit-based incentive scheme which assists nodes thatpersistently lack the credits necessary to transmit their data, andprotects nodes from using too large a proportion of their resources toforward traffic that originated from other nodes.  We first present twobasic incentive schemes: the first scheme free-for-all does not regulatethe willingness of the nodes to forward packets on behalf of othernodes; the second scheme tit-for-tat contains such a regulatorymechanism.  Next we present the origin pays and the destination paysprotocol which contain a decentralised credit redistribution mechanismto destroy (create) credit at over (under) provisioned nodes.  Bothconstant and congestion-dependent resource prices are investigated.Congestion pricing is also used to reward (penalise) the destinationnode for receiving packets on under (over) utilised routes.  Initialexperiments indicate that the origin pays protocol with congestionpricing offers a substantial improvement over the free-for-all protocolthat is currently used in MANETs.


2017 ◽  
Vol 2 (7) ◽  
pp. 5-8
Author(s):  
Neeraj Verma ◽  
Kuber Mohan

Energy is a critical issue in Mobile Ad-hoc Network. Nodes in Network are working in presence of limited or less energy due to dynamic nature of nodes or infrastructure less network. MANET has no infrastructure so nodes in MANET work on dynamic routing. In this way, energy proficient routing is required for reducing energy utilization. Energy proficient routing plans can extraordinarily reduce energy utilization and augments the lifetime of the networks. Scalability of Ad Hoc Networks can be enhanced by using land data, for example, in LAR, GPSR etc. They utilize physical area data; regularly from GPS (Global Positioning System).GPS empowers a gadget to decide their position as in longitude, Latitude and Altitude by getting this data from the satellites. There has been significant effort in proposing energy efficient routing protocols with the help of GAGAN (GPS Aided GEO Augmented Navigation) which have accuracy to approx One meter in India or its neighbor countries. GAGAN is a route framework which is helped by both GPS and nearby telemetry information to possibly give quicker and more exact situating and navigational information.


2011 ◽  
Vol 403-408 ◽  
pp. 2415-2419 ◽  
Author(s):  
Yuan Ming Ding ◽  
Chang Hong Sun ◽  
Lin Song ◽  
Wan Qi Kong

Simulation environment of the mobile Ad Hoc network is built by applying NS2 simulation software. The simulation data indicates that AODV routing protocol is better than DSDV in throughput, fairness and stability. In the underwater network environment where the nodes are in Low-Speed movement, the data transfer rate of AODV routing protocol is higher than AOMDV. To a certain extent, AODV is more suitable for application in underwater environments.


2021 ◽  
Author(s):  
Altaf Hussain ◽  
Muhammad Rafiq Khan

Abstract Mobile Ad-hoc Network (MANET) is the most emerging and fast expanding technology since the last two decades. One of the major issue and challenging area in MANET is the process of routing due to dynamic topologies and high mobility of mobile nodes. The exchange of information from source to a destination is known as the process of routing. Spectacular amount of attention has been paid by researchers to reliable routing in ad-hoc networks. Efficiency and accuracy of a protocol depends on many parameters in these networks. In addition to other parameters node velocity and propagation models are among them. Calculating signal strength at receiver is the responsibility of a propagation model while mobility of nodes is responsible for topology of the network. A huge amount of loss in performance is occurred due to variation of signal strength at receiver and obstacles between transmissions. Simulation tools are developed to analyze the weakness and strength of protocols along with different parameters that may impact the performance. The choice of a propagation models have an abundant effect on performance on routing protocols in MANET. In this research, it has been analyzed to check the impact of different propagation models on the performance of Optimized Link State Routing (OLSR) in Sparse and Dense scenarios in MANET. The simulation has been carried out in NS-2 by using performance metrics as average Throughput, average packet drop and average latency. The results predicted that propagation models and mobility has a strong impact on the performance of OLSR in considered scenarios.


2012 ◽  
Vol 224 ◽  
pp. 520-523
Author(s):  
Hyun Jong Cha ◽  
Jin Mook Kim ◽  
Hwang Bin Ryou

A mobile ad-hoc network is a method of communication between different nodes (mobile devices) without the use of base stations, which are used in wired networks. In a Mobile ad-hoc network, nodes can play the role of a receiver, sender, or a relay. As movement is flexible in Mobile ad-hoc networks and nodes have limited resources, nodes may join the communication or exit it at any time. Therefore, for Mobile ad-hoc networks, routing techniques - selecting communication routes and maintaining them – is considered important in an environment of constantly changing network topology. To overcome this problem, this paper proposes a reliable routing protocol based on MP-AOMDV, which monitors changes in signal strength not only for GPS signals but reception signals as well. Although MP-AOMDV was researched under the assumption of fixed movement direction and speed, this paper proposes a routing technique that works with changing movement direction or speed of nodes.


2014 ◽  
Vol 2014 ◽  
pp. 1-9 ◽  
Author(s):  
Huang Qiong ◽  
Yin Pengfei ◽  
Chen Qianbin ◽  
Gong Pu ◽  
Yang Xiaolong

Traditional mobile Ad Hoc network routing protocols are mainly based on the Shortest Path, which possibly results in many congestion nodes that incur routing instability and rerouting. To mitigate the side-efforts, this paper proposed a new bioinspired adaptive routing protocol (ATAR) based on a mathematics biology model ARAS. This paper improved the ARAS by reducing the randomness and by introducing a new routing-decision metric “the next-hop fitness” which was denoted as the congestion level of node and the length of routing path. In the route maintenance, the nodes decide to forward the data to next node according to a threshold value of the fitness. In the recovery phase, the node will adopt random manner to select the neighbor as the next hop by calculation of the improved ARAS. With this route mechanism, the ATAR could adaptively circumvent the congestion nodes and the rerouting action is taken in advance. Theoretical analysis and numerical simulation results show that the ATAR protocol outperforms AODV and MARAS in terms of delivery ratio, ETE delay, and the complexity. In particular, ATAR can efficiently mitigate the congestion.


Author(s):  
DWEEPNA GARG ◽  
PARTH GOHIL

A Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes forming a temporary network without using centralized access points, infrastructure, or centralized administration. Routing means the act of moving information across an internet work from a source to a destination. The biggest challenge in this kind of networks is to find a path between the communication end points, what is aggravated through the node mobility. In this paper we present a new routing algorithm for mobile, multi-hop ad-hoc networks. The protocol is based on swarm intelligence. Ant colony algorithms are a subset of swarm intelligence and consider the ability of simple ants to solve complex problems by cooperation. The introduced routing protocol is well adaptive, efficient and scalable. The main goal in the design of the protocol is to reduce the overhead for routing. We refer to the protocol as the Ant Colony Optimization Routing (ACOR).


2020 ◽  
Vol 1 (1) ◽  
pp. 7-14
Author(s):  
Chen Chao ◽  
Liang Jun ◽  
Sun Xin

Mobile ad hoc networks use the wireless network and have wider applications especially in emergency situation, military combat zones, and the mobility vehicles. The mobile ad hoc network especially poses the problem of security and efficiency as the network is often subject to internal and external attacks. To overcome such problems, different protocols are proposed. In this study, an improved protocol is proposed which makes use of hexacol cluster method and thus provide greater efficiency and security to the network. For validating the proposed method, a stimulation was performed and results were compared with other protocols. The results indicate that the proposed method showed improved performance compare to the other protocol.


2021 ◽  
Vol 9 (1) ◽  
pp. 191-197
Author(s):  
Omar Faruque, Tadiwa Elisha Nyamasvisva, Abdullahi Mujaheed Saleh, Hasliza Binti Hashim

Wireless technology has brought a very advanced change in the field of the internet. It has given rise to many new applications. In recent years, a lot of work has been done in the field of Mobile Ad hoc Networks (MANET) which makes it so popular in the area of research work. MANET is an infrastructure-less, dynamic network that consists of a collection of wireless mobile nodes, and the communication between these nodes has been carried out without any centralized authority. There are several network performance metrics, Packet Loss and End-to-End Delay which can be taken into account, for getting a general idea about the performance of the Geographical Routing Protocol in Mobile Ad-Hoc Networks. The proposed research will evaluate the parameters which affect the communication in the Geographical Routing Protocol in Mobile Ad-Hoc Networks.


Author(s):  
Sunil Kumar ◽  
Kamlesh Dutta

A Mobile Ad hoc NETwork (MANET) is a self-organizing, infrastructure-less network of mobile nodes connecting by wireless links. In operation, the nodes of MANETs do not have a central control mechanism. It is known for its properties of routable network, where each node acts as a router to forward packets to other specific nodes in the network. The unique properties of MANET have made it useful for large number of applications and led to a number of security challenges. Security in the mobile ad hoc network is a very critical job and requires the consideration of different security issues on all the layers of communication. The countermeasures are the functions that reduce or eliminate security vulnerabilities and attacks. This chapter provides a comprehensive study of all prominent attacks in Mobile Ad Hoc Networks described in the literature. It also provides various proactive and reactive approaches proposed to secure the MANETs. Moreover, it also points to areas of research that need to be investigated in the future.


Sign in / Sign up

Export Citation Format

Share Document