Analysis of reputation-based incentive mechanisms in ad hoc networks

The incentive mechanisms based on reputation are often used to induce cooperation among selfish nodes in ad hoc networks. In those mechanisms nodes with lower reputation value will receive less benefit, which suffers from a new problem of second-ordered free riding. Refusing service request from bad nodes will increase the defector's own reputation, so refusing isn't a favorable choice. Mitigating this new selfish behavior is important to improve the cooperation in ad hoc networks and enhance system robustness. The paper discusses the second-ordered free-riding problem in incentive mechanism for packet forwarding in ad hoc networks and proposes a new scheme based on second-ordered reputation combining with a probabilistic service assignment rule. It is proved that the new scheme is available and cooperation can be built in various network settings.

[1]  Yoh Iwasa,et al.  The leading eight: social norms that can maintain cooperation by indirect reciprocity. , 2006, Journal of theoretical biology.

[2]  Levente Buttyán,et al.  Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..

[3]  Karthik Panchanathan,et al.  A tale of two defectors: the importance of standing for evolution of indirect reciprocity. , 2003, Journal of theoretical biology.

[4]  M. Nowak,et al.  Evolution of indirect reciprocity by image scoring , 1998, Nature.

[5]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[6]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[7]  Mike Burmester,et al.  Cooperation in Mobile Ad Hoc Networks , 2009, Guide to Wireless Ad Hoc Networks.

[8]  Mary Baker,et al.  Observation-based Cooperation Enforcement in Ad Hoc Networks , 2003, ArXiv.

[9]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[10]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.