A Sofrware Framework for Robust Packet Delivery in Wireless Multi-hop Networks

This paper presents a framework for reliable packet delivery in wireless multi-hop networks exploiting an ad hoc routing protocol working on Layer 2.5. This framework incorporates a 2.5-layer routing technique with a reputation management scheme called the WARM (Wireless multi-hop Ad hoc routing incorporating Reputation Management) protocol, and high throughput network performance based on a cross-layer approach between Layer 2.5 and the TCP layer by means of TCP congestion control along with the proposed reputation management scheme. Experiments showed that the proposed framework incorporating the WARM protocol yielded efficient performance in terms of robust packet delivery and high network throughput performance.

[1]  Charles E. Perkins,et al.  Performance comparison of two on-demand routing protocols for ad hoc networks , 2001, IEEE Wirel. Commun..

[2]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[3]  Vern Paxson,et al.  TCP Congestion Control , 1999, RFC.

[4]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[5]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[6]  Zhu Han,et al.  Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[7]  John S. Baras,et al.  On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[8]  Jean-Yves Le Boudec,et al.  Self-policing mobile ad hoc networks by reputation systems , 2005, IEEE Communications Magazine.

[9]  Yacine Rebahi,et al.  A reputation-based trust mechanism for ad hoc networks , 2005, 10th IEEE Symposium on Computers and Communications (ISCC'05).

[10]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[11]  Partha Dasgupta,et al.  On using reputations in ad hoc networks to counter malicious nodes , 2004, Proceedings. Tenth International Conference on Parallel and Distributed Systems, 2004. ICPADS 2004..