Performability in ad hoc networks

In mobile ad hoc networks, protocols are distributed and rely on the cooperative participation of all nodes in the network. Since the wireless technology implies node resource constraints, it may not be convenient for a node to relay requests on behalf of others. Also, malicious nodes may intentionally damage network functioning by not cooperating. Thus, cooperative algorithms make the system vulnerable to users as well as to malicious and selfish misbehavior. Lack of cooperation may severely degrade the performance of the ad hoc system; noncooperative nodes may partition the network, and well-behaving nodes can be overburdened by the consequent deviation of most of the traffic on to them, leading to possible congestion events. We address the issues of performance and reliability in packet forwarding. Our approach is based on reliability estimators taking into account not only selfish and malicious misbehavior, but also situations of congestion and lossy links. We aim at increasing network throughput and avoiding unreliable routes, thus increasing network "performability" (performance and reliability).

[1]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[2]  Marco Conti,et al.  Towards Reliable Forwarding for Ad Hoc Networks , 2003, PWC.

[3]  Van Jacobson,et al.  Congestion avoidance and control , 1988, SIGCOMM '88.

[4]  Darrell D. E. Long,et al.  A dynamic disk spin-down technique for mobile computing , 1996, MobiCom '96.

[5]  Mark Herbster,et al.  Tracking the Best Expert , 1995, Machine Learning.

[6]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[7]  Marco Conti,et al.  MobileMAN: Mobile Metropolitan Ad Hoc Networks , 2003, PWC.

[8]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[9]  Ram Ramanathan,et al.  Making link-state routing scale for ad hoc networks , 2001, MobiHoc '01.

[10]  Marco Conti,et al.  Cross-layering in mobile ad hoc network design , 2004, Computer.

[11]  Levente Buttyán,et al.  Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..

[12]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.