Incentives for Resource Sharing in Ad Hoc Networks

Author(s):  
Panayotis Antoniadis

The goal of this chapter is to analyze the incentive issues that arise in multi-hop ad hoc networks when their nodes are potentially mobile devices controlled by independent self-interested end-users. The author decomposes the problem into its economic and technological dimensions according to which he categorizes the numerous proposed solutions. He then analyzes certain drawbacks of the economics oriented approach and argues for the need to go beyond the rationality assumption. This is to exploit a variety of powerful more intrinsic, social, human motivations for encouraging participation and resource sharing in ad hoc networks. Existing successful online communities provide a good starting point for designing social software that can provide cross-layer social incentives for resource sharing. In this chapter, the author motivates this novel but challenging approach and provides some insights toward coming closer to its ambitious objective.

2019 ◽  
pp. 592-620
Author(s):  
Poonam Saini ◽  
Awadhesh Kumar Singh

Resource sharing is the most attractive feature of distributed computing. Information is also a kind of resource. The portable computing devices and wireless networks are playing a dominant role in enhancing the information sharing and thus in the advent of many new variants of distributed computing viz. ubiquitous, grid, cloud, pervasive and mobile. However, the open and distributed nature of Mobile Ad Hoc Networks (MANETs), Vehicular Ad Hoc Networks (VANETs) and cloud computing systems, pose a threat to information that may be coupled from one user (or program) to another. The chapter illustrates the general characteristics of ad hoc networks and computing models that make obligatory to design secure protocols in such environments. Further, we present a generic classification of various threats and attacks. In the end, we describe the security in MANETs, VANETs and cloud computing. The chapter concludes with a description of tools that are popularly used to analyze and access the performance of various security protocols.


Author(s):  
Poonam Saini ◽  
Awadhesh Kumar Singh

Resource sharing is the most attractive feature of distributed computing. Information is also a kind of resource. The portable computing devices and wireless networks are playing a dominant role in enhancing the information sharing and thus in the advent of many new variants of distributed computing viz. ubiquitous, grid, cloud, pervasive and mobile. However, the open and distributed nature of Mobile Ad Hoc Networks (MANETs), Vehicular Ad Hoc Networks (VANETs) and cloud computing systems, pose a threat to information that may be coupled from one user (or program) to another. The chapter illustrates the general characteristics of ad hoc networks and computing models that make obligatory to design secure protocols in such environments. Further, we present a generic classification of various threats and attacks. In the end, we describe the security in MANETs, VANETs and cloud computing. The chapter concludes with a description of tools that are popularly used to analyze and access the performance of various security protocols.


Author(s):  
Varun G. Menon

Opportunistic routing uses the broadcasting nature of the wireless medium to increase the number of potential forwarding nodes in the network. This, in turn improves the delivery rate and reliability of data transmission in the network. Compared to all previous classes of protocols, opportunistic routing offers numerous advantages which is exploited by the latest applications for efficient communication and resource sharing in dynamic ad hoc networks. The objective of this research work is to review and classify all the major opportunistic routing protocols proposed for dynamic ad hoc networks. Further the issues and challenges with each of these existing protocol is discussed and future research directions are put forward.


Author(s):  
Varun G Menon

Opportunistic routing is the latest technique that uses the broadcasting nature of the wireless medium to increase the number of potential forwarding nodes in the network. This, in turn improves the delivery rate and reliability of data transmission in the network. Compared to all previous classes of routing protocols, opportunistic routing offers numerous advantages which is exploited by the latest applications for efficient communication and resource sharing in dynamic ad hoc networks. These applications provide dynamic communication in disaster recovery environments. The objective of this research work is to review and classify all the major opportunistic routing protocols proposed for dynamic ad hoc networks. Further the issues and challenges with each of these existing protocol is discussed and future research directions are put forward


2010 ◽  
Vol 18 (1) ◽  
pp. 190-201 ◽  
Author(s):  
B.A. Rezaei ◽  
N. Sarshar ◽  
V.P. Roychowdhury

Sign in / Sign up

Export Citation Format

Share Document