研究生: |
李沛鴻 Pei-Hung Lee |
---|---|
論文名稱: |
以相鄰節點重要性為依據規範隨意式網路自私行為之機制 A Neighbor-Importance-Based Mechanism for Preventing from Being Exploited by Selfish Nodes in MANETs |
指導教授: |
黃能富
Nen-Fu Huang |
口試委員: | |
學位類別: |
碩士 Master |
系所名稱: |
電機資訊學院 - 資訊工程學系 Computer Science |
論文出版年: | 2006 |
畢業學年度: | 94 |
語文別: | 英文 |
論文頁數: | 40 |
中文關鍵詞: | 自私行為 、隨意式網路 、對等式網路 |
外文關鍵詞: | cooperation enforcement, MANET, P2P network |
相關次數: | 點閱:65 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
正常而言,對於建置于單一控管單位之下隨意式網路中的節點,它們一定會分享自己的資源以傳遞通訊協定訊息或是協助封包轉送。然而,對於並非由特定單位建立的隨意式網路而言,我們不能保證網路裡的節點會提供網路協同工作的相關服務。事實上,那些拒絕協同工作的節點可以因此節省能源,使本身的執行時間更為持久。尤其是當我們注意到那些沒有分享自己資源的節點還是可以利用其它正常節點的資源以達到其目的時,此類問題更能突顯其嚴重性。
在這篇論文裡面,我們提出一種可使節點免於遭受利用的機制。此機制乃是根據節點本身觀察所得的資訊以計算每個相鄰節點的重要程度;每個節點根據上述的重要程度對其相鄰節點分配單位時間之內願意為其轉送封包的數量。
模擬結果顯示採用此機制的節點能夠有效地避免遭到利用。而且,此類節點根據重要程度動態地拒絕協助轉送封包的方式不但讓網路效能僅受到輕微之影響,亦能節省可觀的資源。在整體網路自私節點比例略低時,網路效能的下降是為了追求公平而採取動態拒絕協助轉送封包的必然結果,然而在整體網路自私節點比例增加的同時,我們的機制反而呈現了比沒有此機制更好的網路效能。因此若一隨意式網路採用本機制將會可達到不被自私節點利用之公平運作環境,且在相同的網路效能之下,將可以大幅地降低各節點所需付出之系統資源。
Normally, nodes cooperate with each other in a mobile ad hoc network in which it is under the administration of a single authority. Each node contributes resources to route discovery and packet forwarding. However, in case of civilian applications such as network of cars, the nodes may not belong to a single authority and not pursue a common goal. In such cases, nodes are not forced to cooperate, thus the network functions are not guaranteed. Instead of forwarding packets for others, a node exploits resources of others and contributes nothing, which results in lower power consumption and longer operation time. Indeed, the situation may be severe since the resources (battery power, memory, bandwidth, and CPU cycles) each node owns are extremely limited.
This thesis proposes a mechanism which provides the node in a mobile ad hoc network the capability of preventing from being exploited by selfish neighborhood. The mechanism relies on the observed information to determine each neighbor’s importance according to different metrics. After that, the flow rate allocated for each neighbor is figured out based on its importance level respectively.
The simulation results show that no packet is forwarded when they are originated from selfish nodes. Besides, only few packets are failed to achieve its destination while respectable amount of forwarding operations are saved on average. The simulation results also show that when the percentage of selfish nodes in the network is small, the network throughput is affected due to fairness consideration. Once the percentage of selfish nodes increases, our mechanism makes the network throughput better compared to the original network.
[1] P. Michiardi and R. Molva, "Simulation-based analysis of security exposures in mobile ad hoc networks," European Wireless 2002, Florence, Italy, February 2002.
[2] H. Miranda and L. Rodrigues, "Friends and foes: preventing selfishness in open mobile ad hoc networks," IEEE ICDCS 2003, Providence, Rhode Island USA, May 2003, pp. 440-445.
[3] M. Conti, E. Gregori, and G. Maselli, "Cooperation issues in mobile ad hoc networks," IEEE ICDCS 2004, Tokyo, Japan, March 2004, pp. 803-808.
[4] H. Yan and D. Lowenthal, "Towards cooperation fairness in mobile ad hoc networks," IEEE WCNC 2005, vol. 4, New Orleans, LA, USA, March 2005, pp. 1909-1914.
[5] B. Raghavan and A. Snoeren, "Priority Forwarding in Ad Hoc Networks with Self-Interested Parties," Economics of Peer-to-Peer Systems Workshop 2003, Berkeley, California, USA, June 2003.
[6] R. Mahajan, M. Rodrig, D. Wetherall, and J. Zahorjan, "Sustaining Cooperation in Multi-hop Wireless Networks," USENIX NSDI 2005, Boston, Massachusetts, USA, May 2005.
[7] S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," ACM MobiCom 2000, Boston, Massachusetts, USA, August 2000, pp. 255-265.
[8] S. Buchegger and J.-Y. L. Boudec, "Performance analysis of the CONFIDANT protocol," ACM MobiHoc 2002, Lausanne, Switzerland, June 2002, pp. 226-236.
[9] P. Michiardi and R. Molva, "CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks," IFIP Communication and Multimedia Security Conference 2002, Portoroz, Slovenia, September 2002.
[10] P. Marbach and Y. Qiu, "Cooperation in wireless ad hoc networks: a market-based approach," IEEE/ACM Transactions on Networking, vol. 13, no. 6, December 2005, 1325-1338.
[11] L. Anderegg and S. Eidenbenz, "Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents," ACM MobiCom 2003, San Diego, California, USA, September 2003, pp. 245-259.
[12] L. Buttyán and J.-P. Hubaux, "Enforcing service availability in mobile ad-hoc WANs," ACM MobiHoc 2000, Boston, Massachusetts, USA, August 2000, pp. 87-96.
[13] L. Buttyán and J.-P. Hubaux, "Stimulating cooperation in self-organizing mobile ad hoc networks," ACM/Kluwer Mobile Networks and Applications, vol. 8, October 2003, pp. 579-592.
[14] S. Zhong, J. Chen, and Y. R. Yang, "Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks," IEEE INFOCOM 2003, vol. 3, San Francisco, California, USA, March 2003, pp. 1987-1997.
[15] N. B. Salem, L. Buttyan, J.-P. Hubaux, and M. Jakobsson, "Node cooperation in hybrid ad hoc networks," IEEE Transactions on Mobile Computing, vol. 5, no. 4, April 2006, pp. 365-376.
[16] V. Srinivasan, P. Nuggehalli, C.-F. Chiasserini, and R. R. Rao, "Cooperation in wireless ad hoc networks," IEEE INFOCOM 2003, vol. 2, San Francisco, CA, USA, March 2003, pp. 818-824.
[17] M. Felegyhazi, J.-P. Hubaux, and L. Buttyan, "Nash equilibria of packet forwarding strategies in wireless ad hoc networks," IEEE Transactions on Mobile Computing, vol. 5, no. 5, May 2006, pp. 463-476.
[18] A. Urpi, M. Bonuccelli, and S. Giordano, "Modeling cooperation in mobile Ad-hoc networks: a formal description of selfishness," WiOpt 2003, INRIA Sophia-Antipolis, France, March 2003.
[19] E. Altman, A. A. Kherani, P. Michiardi, and R. Molva, "Non-cooperative forwarding in ad hoc networks," IFIP Networking 2005, University of Waterloo, Waterloo Ontario Canada, May 2005, pp. 486-498.
[20] P. Golle, K. Leyton-Brown, and I. Mironov, "Incentives for sharing in peer-to-peer networks," ACM EC 2001, Tampa, Florida, USA, October 2001, pp. 264-267.
[21] C. Courcoubetis and R. Weber, "Incentives for large peer-to-peer systems," IEEE Journal on Selected Areas in Communications, vol. 24, no. 5, May 2006, 1034-1050.
[22] Y. Qiu and P. Marbach, "Bandwidth allocation in ad hoc networks: a price-based approach," IEEE INFOCOM 2003, vol. 2, San Francisco, California, USA, March 2003, pp. 797-807.
[23] Z. Fang and B. Bensaou, "Fair bandwidth sharing algorithms based on game theory frameworks for wireless ad-hoc networks," IEEE INFOCOM 2004, vol. 2, Hong Kong, March 2004, pp. 1284-1295.
[24] J. Crowcroft, R. J. Gibbens, F. P. Kelly, and S. Östring, "Modelling incentives for collaboration in mobile ad hoc networks," WiOpt 2003, INRIA Sophia-Antipolis, France, March 2003.
[25] “ns-2,” http://www.isi.edu/nsnam/ns/
[26] “Rice Monarch Project,” http://www.monarch.cs.rice.edu/cmu-ns.html