skip to main content
10.1145/1164783.1164807acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
Article

Evolution of cooperation in ad hoc networks under game theoretic model

Published: 02 October 2006 Publication History

Abstract

In this paper, we present a new approach to evolve a cooperative behavior in ad hoc networks. We propose an environment composed of four elements: a game theory based model of the network, trust evaluation mechanism, strategy that defines the behavior of each node and a genetic algorithm. Interaction between nodes is represented as in the Iterated Prisoner's Dilemma under the Random Pairing game. In such a game randomly chosen players receive payoffs that depend on the way they behave. Each node is using a strategy that defines when to drop or to forward packets coming from other nodes. Such strategy is based on the past behavior of the network and on the trust level in the source node of the packet. Using the genetic algorithm we show how such strategies evolve ensuring high level of cooperation in the network.

References

[1]
S. Buchegger and J.-Y. L. Boudec. The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-Hoc Networks. In Proc. Workshop on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt'03), pages 131--140, 2000.
[2]
S. Buchegger and J.-Y. L. Boudec. Performance analysis of the confidant protocol. In Proc. ACM 3rd International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'02), pages 226--236, 2002.
[3]
S. Buchegger and J.-Y. L. Boudec. Self-policing mobile ad-hoc networks by reputation systems. IEEE Communications Magazine, Special Topic on Advances in Self-Organizing Networks, 43(7), July 2005.
[4]
C. Camerer. Behavioral Game Theory: Experiments in Strategic Interaction. Princeton University Press, 2003.
[5]
S. Giordano and A. Urpi. Mobile Ad Hoc Networking, chapter 13. Wiley-IEEE Press, 2004.
[6]
M. Ilyas and I. Mahgoub, editors. Mobile Computing Handbook. Auerbach Publications, 2005.
[7]
L. Buttyan and J.-P. Hubaux. Nuglets: a virtual currency to stimulate cooperation in self-organized mobile ad hoc networks. Technical Report DSC/2001/001, Swiss Federal Institute of Technology, 2001.
[8]
S. Marti, T. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Proc. ACM/IEEE 6th International Conference on Mobile Computing and Networking (MobiCom'00), pages 255--265, 2000.
[9]
P. Michiardi and R. Molva. Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proc. IFIP 6th Conference on Security Communications, and Multimedia (CMS'02), pages 107--121, 2002.
[10]
P. Michiardi and R. Molva. Simulation-based analysis of security exposures in mobile ad hoc networks. In Proc. European Wireless Conference, 2002.
[11]
N. Namikawa and H. Ishibuchi. Evolution of cooperative behavior in the iterated prisoner's dilemma under random pairing in game playing. In Proc. IEEE Press Congress on Evolutionary Computation (CEC'05), pages 2637--2644, 2005.
[12]
C. Perkins, editor. Ad Hoc Networking. Addison-Wesley, 2001.

Cited By

View all
  • (2018)Self-Optimization and Self-Stabilization in Autonomic CloudsConcurrency and Computation: Practice & Experience10.1002/cpe.190624:9(1015-1034)Online publication date: 29-Dec-2018
  • (2009)Performance analysis of trust-based node evaluation schemes in wireless and mobile ad hoc networksProceedings of the 2009 IEEE international conference on Communications10.5555/1817770.1818301(5535-5539)Online publication date: 14-Jun-2009
  • (2009)Performance Analysis of Trust-Based Node Evaluation Schemes in Wireless and Mobile Ad Hoc Networks2009 IEEE International Conference on Communications10.1109/ICC.2009.5305933(1-5)Online publication date: Jun-2009
  • Show More Cited By

Index Terms

  1. Evolution of cooperation in ad hoc networks under game theoretic model

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    MobiWac '06: Proceedings of the 4th ACM international workshop on Mobility management and wireless access
    October 2006
    206 pages
    ISBN:159593488X
    DOI:10.1145/1164783
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 02 October 2006

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. ad hoc networks
    2. cooperation
    3. game theory
    4. selfish behavior

    Qualifiers

    • Article

    Conference

    MSWiM06
    Sponsor:

    Acceptance Rates

    MobiWac '06 Paper Acceptance Rate 18 of 60 submissions, 30%;
    Overall Acceptance Rate 83 of 272 submissions, 31%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 10 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2018)Self-Optimization and Self-Stabilization in Autonomic CloudsConcurrency and Computation: Practice & Experience10.1002/cpe.190624:9(1015-1034)Online publication date: 29-Dec-2018
    • (2009)Performance analysis of trust-based node evaluation schemes in wireless and mobile ad hoc networksProceedings of the 2009 IEEE international conference on Communications10.5555/1817770.1818301(5535-5539)Online publication date: 14-Jun-2009
    • (2009)Performance Analysis of Trust-Based Node Evaluation Schemes in Wireless and Mobile Ad Hoc Networks2009 IEEE International Conference on Communications10.1109/ICC.2009.5305933(1-5)Online publication date: Jun-2009
    • (2009)Routing-Based Source-Location Privacy in Wireless Sensor Networks2009 IEEE International Conference on Communications10.1109/ICC.2009.5199430(1-5)Online publication date: Jun-2009

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media