DECADE: Distributed Emergent Cooperation through ADaptive Evolution in mobile ad hoc networks

Abstract The scarce resources of a mobile ad hoc network (MANET) should not be wasted attending selfish nodes (those nodes that use resources from other nodes to send their own packets, without offering their own resources to forward other nodes’ packets). Thus, rational nodes (those nodes willing to cooperate if deemed worthy) must detect and isolate selfish nodes in order to cooperate only among themselves. To achieve this purpose, in this paper we present a new game theoretic trust model called DECADE (Distributed Emergent Cooperation through ADaptive Evolution). The design of DECADE is shown by first, analyzing a simple case of packet forwarding between two nodes, and then the results are extended to bigger networks. In DECADE, each node seeks individually to maximize its chance to deliver successfully their own packets, so that the cooperation among rational nodes and the isolation of selfish nodes appear as an emergent collective behavior. This behavior emerges as long as there is a highly dynamic interaction among nodes. So, for those cases where the mobility alone does not suffice to provide this interaction, DECADE includes a sociability parameter that encourages nodes to interact among them for faster learning and adaptability. Additionally, DECADE introduces very low overhead on computational and communication resources, achieving close to optimal cooperation levels among rational nodes and almost complete isolation of selfish nodes.

[1]  Thomas Narten,et al.  Neighbor Discovery for IP Version 6 (IPv6) , 1996, RFC.

[2]  Levente Buttyán,et al.  Nash equilibria of packet forwarding strategies in wireless ad hoc networks , 2006, IEEE Transactions on Mobile Computing.

[3]  Walid Saad,et al.  Author manuscript, published in "IEEE Transactions on Wireless Communications (2009) Saad-ITransW-2009" A Distributed Coalition Formation Framework for Fair User Cooperation in Wireless Networks , 2022 .

[4]  John S. Baras,et al.  Cooperation, Trust and Games in Wireless Networks , 2005 .

[5]  K. Komathy,et al.  Trust-based evolutionary game model assisting AODV routing against selfishness , 2008, J. Netw. Comput. Appl..

[6]  Enrique Alba,et al.  A survey of parallel distributed genetic algorithms , 1999, Complex..

[7]  Erick Cantú-Paz,et al.  A Survey of Parallel Genetic Algorithms , 2000 .

[8]  Xue Liu,et al.  A trust model based on fuzzy recommendation for mobile ad-hoc networks , 2009, Comput. Networks.

[9]  Hassan Artail,et al.  A cluster-based trust-aware routing protocol for mobile ad hoc networks , 2010, Wirel. Networks.

[10]  Bruce Bueno de Mesquita,et al.  An Introduction to Game Theory , 2014 .

[11]  Jose L. Muñoz,et al.  A game theoretic trust model for on-line distributed evolution of cooperation inMANETs , 2011, J. Netw. Comput. Appl..

[12]  Enrique Alba,et al.  Cellular genetic algorithms , 2014, GECCO.

[13]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[14]  Charles E. Perkins,et al.  Ad Hoc Networking , 2001 .

[15]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[16]  Marcin Seredynski,et al.  Evolutionary game theoretical analysis of reputation-based packet forwarding in civilian mobile Ad Hoc networks , 2009, 2009 IEEE International Symposium on Parallel & Distributed Processing.

[17]  Brian L. Mark,et al.  E-Hermes: A robust cooperative trust establishment scheme for mobile ad hoc networks , 2009, Ad Hoc Networks.

[18]  Azzedine Boukerche,et al.  Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks , 2008 .

[19]  Giannis F. Marias,et al.  Cooperation enforcement schemes for MANETs: a survey: Research Articles , 2006 .

[20]  S. Buchegger,et al.  A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .

[21]  K. Komathy,et al.  Best neighbor strategy to enforce cooperation among selfish nodes in wireless ad hoc network , 2007, Comput. Commun..

[22]  Azzedine Boukerche,et al.  Algorithms and Protocols for Wireless Sensor Networks , 2008, Wiley series on parallel and distributed computing.

[23]  B.M. Ali,et al.  Mobility models, broadcasting methods and factors contributing towards the efficiency of the MANET routing protocols: Overview , 2007, 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications.

[24]  Sally Floyd,et al.  TCP Selective Acknowledgement Options , 1996 .

[25]  Víctor Carrascal Frías,et al.  RDSR-V. Reliable Dynamic Source Routing for video-streaming over mobile ad hoc networks , 2010, Comput. Networks.

[26]  Jose L. Muñoz,et al.  ad hoc networks.">A review of trust modeling in ad hoc networks , 2009, Internet Res..

[27]  Marcin Seredynski,et al.  Modelling the Evolution of Cooperative Behavior in Ad Hoc Networks using a Game Based Model , 2007, 2007 IEEE Symposium on Computational Intelligence and Games.

[28]  Jie Wu,et al.  Uncertainty Modeling and Reduction in MANETs , 2010, IEEE Transactions on Mobile Computing.

[29]  Petri Mähönen,et al.  Analytical Model of Cooperation in Ad Hoc Networks , 2004, Telecommun. Syst..

[30]  David B. Johnson,et al.  The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .

[31]  R. Axelrod,et al.  The Further Evolution of Cooperation , 1988, Science.

[32]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[33]  Seungjoon Lee,et al.  Cooperative peer groups in NICE , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[34]  R. Srikant,et al.  A game theory based reputation mechanism to incentivize cooperation in wireless ad hoc networks , 2010, Ad Hoc Networks.

[35]  Jeremy W. Dale,et al.  Molecular Genetics of Bacteria , 1989 .

[36]  B. Arms,et al.  Cooperation , 1926, Becoming Rooted.

[37]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[38]  Viswanath Tolety,et al.  Load Reduction in Ad Hoc Networks Using Mobile Servers , 1999 .

[39]  Zhu Han,et al.  Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[40]  Riccardo Poli,et al.  Parallel genetic algorithm taxonomy , 1999, 1999 Third International Conference on Knowledge-Based Intelligent Information Engineering Systems. Proceedings (Cat. No.99TH8410).

[41]  Hector Garcia-Molina,et al.  Taxonomy of trust: Categorizing P2P reputation systems , 2006, Comput. Networks.

[42]  Giannis F. Marias,et al.  Cooperation enforcement schemes for MANETs: a survey , 2006, Wirel. Commun. Mob. Comput..

[43]  W. Hamilton,et al.  The evolution of cooperation. , 1984, Science.

[44]  Chris Roadknight,et al.  Adaptive Management of an Active Service Network , 2000 .

[45]  Mary Baker,et al.  Observation-based Cooperation Enforcement in Ad Hoc Networks , 2003, ArXiv.