23 research outputs found

    Game Theory-Based Cooperation for Underwater Acoustic Sensor Networks: Taxonomy, Review, Research Challenges and Directions.

    Get PDF
    Exploring and monitoring the underwater world using underwater sensors is drawing a lot of attention these days. In this field cooperation between acoustic sensor nodes has been a critical problem due to the challenging features such as acoustic channel failure (sound signal), long propagation delay of acoustic signal, limited bandwidth and loss of connectivity. There are several proposed methods to improve cooperation between the nodes by incorporating information/game theory in the node's cooperation. However, there is a need to classify the existing works and demonstrate their performance in addressing the cooperation issue. In this paper, we have conducted a review to investigate various factors affecting cooperation in underwater acoustic sensor networks. We study various cooperation techniques used for underwater acoustic sensor networks from different perspectives, with a concentration on communication reliability, energy consumption, and security and present a taxonomy for underwater cooperation. Moreover, we further review how the game theory can be applied to make the nodes cooperate with each other. We further analyze different cooperative game methods, where their performance on different metrics is compared. Finally, open issues and future research direction in underwater acoustic sensor networks are highlighted

    Mitigating Misbehavior In Wireless Networks: A Game Theoretic Approach

    Get PDF
    In a distributed wireless system, multiple network nodes behave cooperatively towards a common goal. Though such assumptions on cooperation are desirable (e.g., controlling the transmit power level, reducing interference for each other, revealing private information, adhering to network policies) for analyzing and modeling, certain nodes belonging to a real-world system have often shown to deviate. These nodes, known as misbehaving nodes, bring more challenges to the design of the wireless network because the unreliable channel makes the actions of the nodes hidden from each other. In this dissertation, we analyze two types of misbehavior, namely, selfish noncooperation and malicious attacking. We apply game theoretic techniques to model the interactions among the nodes in the network. First, we consider a homogeneous unreliable channel and analyze the necessary and sufficient conditions to enforce cooperative packet forwarding among a node pair. We formulate an anti-collusion game and derive the conditions that achieve full cooperation when the non-cooperative nodes collude. In addition, we consider multi-hop communication with a heterogeneous channel model. We refine our game model as a hidden action game with imperfect private monitoring. A state machine based strategy is proposed to reach Nash Equilibrium. The strategy attains cooperative packet forwarding with heterogeneous channel and requires only partial and imperfect information. Furthermore, it also enforces cooperation in multi-hop packet forwarding. To tackle the malicious attacks, we use Bayesian game analysis to show the existence of equilibrium in the detection game and argue that it might not be profitable to isolate the malicious nodes upon detection. We propose the concept of coexistence with malicious nodes by proving the co-existence equilibrium and derive the conditions that achieve the equilibrium. This research is further accomplished by extensive simulation studies. Simulation results illustrate the properties of the games and the derived equilibria. The results validate our design philosophy and clearly indicate that the proposed game theoretic solutions can be effectively used to enforce cooperation and mitigate attacks

    Autenticación de contenidos y control de acceso en redes peer-to-peer puras

    Get PDF
    Esta tesis doctoral se enmarca dentro del área de investigación de la seguridad en entornos Peer-to-Peer (P2P) totalmente descentralizados (también denominados puros.) En particular, el objetivo principal de esta tesis doctoral es definir, analizar e implementar un esquema para la distribución segura de los contenidos compartidos. En este trabajo de tesis se han realizado importantes avances e innovadoras aportaciones enfocadas a garantizar que el contenido compartido es auténtico; es decir, que no ha sido alterado, incluso tratándose de una réplica del original. Además, se propone un mecanismo de control de acceso orientado a proporcionar servicios de autorización en un entorno que no cuenta con una jerarquía de autoridades de certificación. A continuación, se resume la metodología seguida, las principales aportaciones de esta tesis y, finalmente, se muestran las conclusiones más importantes. __________________________________________The study and analysis of the state-of-the-art on security in Peer-to-Peer (P2P) networks gives us many important insights regarding the lack of practical security mechanisms in such fully decentralized and highly dynamic networks. The major problems range from the absence of content authentication mechanisms, which address and assure the authenticity and integrity of the resources shared by networking nodes, to access control proposals, which provide authorization services. In particular, the combination of both, authentication and access control, within well-known P2P file sharing systems may involve several advances in the content replication and distribution processes. The aim of this thesis is to define, develop and evaluate a secure P2P content distribution scheme for file sharing scenarios. The proposal will be based on the use of digital certificates, similar to those used in the provision of public key authenticity. To carry out this proposal in such an environment, which does not count on a hierarchy of certification authorities, we will explore the application of non-conventional techniques, such as Byzantine agreement protocols and schemes based on “proof-of-work.” We then propose a content authentication protocol for pure P2P file sharing systems. Under certain restrictions, our scheme provides guarantees that a content is authentic, i.e. it has not been altered, even if it is a replica of the original and the source has lost control over it. Moreover, we extend our initial work by showing how digital certificates can be modified to provide authorization capabilities for self-organizing peers. The entire scheme is first theoretically analyzed, and also implemented in C and Java in order to evaluate its performance. This document is presented as Ph.D. Thesis within the 2007–08 Ph.D. in Computer Science Program at Carlos III University of Madrid

    Mobile Ad Hoc Networks

    Get PDF
    Guiding readers through the basics of these rapidly emerging networks to more advanced concepts and future expectations, Mobile Ad hoc Networks: Current Status and Future Trends identifies and examines the most pressing research issues in Mobile Ad hoc Networks (MANETs). Containing the contributions of leading researchers, industry professionals, and academics, this forward-looking reference provides an authoritative perspective of the state of the art in MANETs. The book includes surveys of recent publications that investigate key areas of interest such as limited resources and the mobility of mobile nodes. It considers routing, multicast, energy, security, channel assignment, and ensuring quality of service. Also suitable as a text for graduate students, the book is organized into three sections: Fundamentals of MANET Modeling and Simulation—Describes how MANETs operate and perform through simulations and models Communication Protocols of MANETs—Presents cutting-edge research on key issues, including MAC layer issues and routing in high mobility Future Networks Inspired By MANETs—Tackles open research issues and emerging trends Illustrating the role MANETs are likely to play in future networks, this book supplies the foundation and insight you will need to make your own contributions to the field. It includes coverage of routing protocols, modeling and simulations tools, intelligent optimization techniques to multicriteria routing, security issues in FHAMIPv6, connecting moving smart objects to the Internet, underwater sensor networks, wireless mesh network architecture and protocols, adaptive routing provision using Bayesian inference, and adaptive flow control in transport layer using genetic algorithms

    Mobile Ad Hoc Networks

    Get PDF
    Guiding readers through the basics of these rapidly emerging networks to more advanced concepts and future expectations, Mobile Ad hoc Networks: Current Status and Future Trends identifies and examines the most pressing research issues in Mobile Ad hoc Networks (MANETs). Containing the contributions of leading researchers, industry professionals, and academics, this forward-looking reference provides an authoritative perspective of the state of the art in MANETs. The book includes surveys of recent publications that investigate key areas of interest such as limited resources and the mobility of mobile nodes. It considers routing, multicast, energy, security, channel assignment, and ensuring quality of service. Also suitable as a text for graduate students, the book is organized into three sections: Fundamentals of MANET Modeling and Simulation—Describes how MANETs operate and perform through simulations and models Communication Protocols of MANETs—Presents cutting-edge research on key issues, including MAC layer issues and routing in high mobility Future Networks Inspired By MANETs—Tackles open research issues and emerging trends Illustrating the role MANETs are likely to play in future networks, this book supplies the foundation and insight you will need to make your own contributions to the field. It includes coverage of routing protocols, modeling and simulations tools, intelligent optimization techniques to multicriteria routing, security issues in FHAMIPv6, connecting moving smart objects to the Internet, underwater sensor networks, wireless mesh network architecture and protocols, adaptive routing provision using Bayesian inference, and adaptive flow control in transport layer using genetic algorithms

    Contribución al diseño de protocolos de encaminamiento en redes móviles ad-hoc basados en reputación

    Get PDF
    The mobile ad-hoc networks are part of the next generation access networks (Next Generation Networking o NGN), "all-IP" networks facing the great scientific and technical challenge that is the ubiquitous computing The mobile ad-hoc networks are useful in situations where rapid deployment is required in an area where there is no infrastructure. The nodes can act as sources, destinations or as routers to transmit data from one node to another node not accessible with a single jump In this thesis we present two new algorithms of reputation-based routing protocols, REMODE_sw (Reputation for Mobile Devices Static Weight) and DrepSR (Dynamic reputation-based Source Routing), which use DSR (Dynamic Source Routing) as a routing protocol engine. The REMODE_sw protocol (Reputation for Mobile Devices Static Weight) is static weight and DrepSR (Dynamic reputation-based Source Routing) is dynamic weight, the difference is in the behavior of beta, which is the weight that reputation values (of each network node) new have in relation to historical values, REMODE_sw (Reputation for Mobile Devices Static Weight) maintains a constant beta value, while DrepSR (Dynamic reputation-based Source Routing) based on the behavior of the variance (of the reputation of each node in the network), independently updates the beta values of each node in the network, achieving that the reputation values(of each node in the network) approximate their average value with greater speed, in order that the reputation system has more accurate information on the behavior of each node The two new algorithms estimate the RFVs (Reputation Forwarding Values) in an ad-hoc mobile network, the main thing is to be able to choose those paths that are formed by the nodes with greater reputation, thus avoiding the less collaborative nodes. Reputation estimation is done using only first-hand information available to the node based on its experience in the network. For REMODE_sw (Reputation for Mobile Devices Static Weight) we have made the implementation of the algorithm on NS-2.35 (Network Simulator Version 2.35) using scenarios created with Bonnmotion v3.0, while for DrepSR (Dynamic reputation-based Source Routing) we have developed a simulator of an ad-hoc mobile network using MATLAB R2017b, inside this simulator we have implemented the algorithm DrepSR (Dynamic reputation-based Source Routing), likewise this simulation scenarios are created using Bonnmotionv3.0. As a general conclusion we have verified that the two new algorithms truly identify the most cooperative paths, which implies an improvement of the total packet loss fraction (average of all the paths of the network), since that allows to avoid the selfish nodes of the network.Las redes móviles ad-hoc son parte de las redes de acceso de próxima generación (Next Generation Networking o NGN), redes “all-IP” que hacen frente al gran desafío científico y técnico que es la computación ubicua Las redes móviles ad-hoc son útiles en situaciones donde se requiere un rápido despliegue en una zona en la que no hay infraestructura. Los nodos pueden actuar como fuentes, destinos o como encaminadores para transmitir datos de un nodo a otro nodo no accesible con un único salto En esta tesis presentamos dos nuevos algoritmos de protocolos de encaminamiento basados en reputación, REMODE_sw (Reputation for Mobile Devices Static Weight) y DrepSR (Dynamic reputation-based Source Routing), los cuales utilizan DSR (Dynamic Source Routing) como motor de protocolo de encaminamiento. El protocolo REMODE_sw (Reputation for Mobile Devices Static Weight) es de peso estático y DrepSR (Dynamic reputation-based Source Routing) es de peso dinámico, la diferencia se encuentra en el comportamiento de beta, el cual es el peso que los valores de reputación (de cada nodo de la red) nuevos tienen en relación a los valores históricos, REMODE_sw (Reputation for Mobile Devices Static Weight) mantiene un valor de beta constante, mientras que DrepSR (Dynamic reputation-based Source Routing) en base al comportamiento de la varianza (de la reputación de cada nodo de la red), actualiza de forma independiente los valores de beta de cada nodo de la red, consiguiendo que los valores de reputación (de cada nodo de la red) se aproximen a su valor medio con mayor rapidez, con la finalidad de que el sistema de reputación cuente con información más precisa sobre el comportamiento de cada nodo Los dos nuevos algoritmos estiman las RFVs (Reputation Forwarding Values) en una red móvil ad-hoc, lo primordial es poder elegir aquellos caminos que son formados por los nodos con mayor reputación, evitando así los nodos menos colaborativos. La estimación de la reputación se realiza utilizando únicamente información de primera mano disponible para el nodo en función de su experiencia en la red Para REMODE_sw (Reputation for Mobile Devices Static Weight) hemos realizado la implementación del algoritmo sobre NS-2.35 (Network Simulator Version 2.35) utilizando escenarios creados con Bonnmotion v3.0, mientras que para DrepSR (Dynamic reputation-based Source Routing) hemos desarrollado un simulador de una red móvil ad-hoc utilizando MATLAB R2017b, dentro de dicho simulador hemos implementado el algoritmo DrepSR (Dynamic reputation-based Source Routing), igualmente estos escenarios de simulación se crean utilizando Bonnmotion v3.0 Como conclusión general hemos podido comprobar que los dos nuevos algoritmos verdaderamente identifican los caminos más cooperativos, lo que supone una mejora de la fracción de pérdida de paquetes total (promedio de todos los caminos de la red), ya que permite evitar los nodos egoístas de la red.Les xarxes mòbils ad hoc són part de les xarxes d'accés de pròxima generació (Next Generation Networking o NGN), xarxes "all IP" que fan front al gran desafiament científic i tècnic que és la computació ubiqua Les xarxes mòbils ad hoc són útils en situacions on es requereix un ràpid desplegament en una zona en la qual no hi ha infraestructura. Els nodes poden actuar com a fonts, destinacions o com encaminaments per transmetre dades d'un node a un altre node no accessible amb un únic salt En aquesta tesi presentem dos nous algoritmes de protocols d'encaminament basats en reputació, REMODE_sw (Reputation for Mobile Devices Static Weight) i DrepSR (Dynamic reputation based Source Routing), els quals utilitzen DSR (Dynamic Source Routing) com a motor de protocol d'encaminament. El protocol REMODE_sw (Reputation for Mobile Devices Static Weight) és de pes estàtic i DrepSR (Dynamic reputation based Source Routing) és de pes dinàmic, la diferència es troba en el comportament de beta, el qual és el pes que els valors de reputació (de cada node de la xarxa) nous tenen en relació als valors històrics, REMODE_sw (Reputation for Mobile Devices Static Weight) manté un valor de beta constant, mentre que DrepSR (Dynamic reputation based Source Routing) sobre la base del comportament de la variància (de la reputació de cada node de la xarxa), s'actualitza de forma independent els valors de beta de cada node de la xarxa, aconseguint que els valors de reputació (de cada node de la xarxa) s'aproximin al seu valor mitjà amb major rapidesa, amb la finalitat que el sistema de reputació compti amb informació més precisa sobre el comportament de cada node Els dos nous algoritmes estimen les RFVs (Reputation Forwarding Values) en una xarxa mòbil ad hoc, el primordial és poder triar aquells camins que són formats pels nodes amb més reputació, evitant així els nodes menys col·laboratius. L'estimació de la reputació es realitza utilitzant únicament informació de primera mà disponible per al node en funció de la seva experiència a la xarxa Per REMODE_sw (Reputation for Mobile Devices Static Weight) hem realitzat la implementació de l'algoritme sobre NS 2.35 (Network Simulator Version 2.35) utilitzant escenaris creats amb Bonnmotion v3.0, mentre que per DrepSR (Dynamic reputation--based Source Routing) hem desenvolupat un simulador d'una xarxa mòbil ad--hoc utilitzant MATLAB R2017b, dins d'aquest simulador hem implementat l'algoritme DrepSR (Dynamic reputation--based Source Routing), igualment en aquest simulador s'han utilitzant escenaris creats en Bonnmotion v3.0 Com a conclusió general hem pogut comprovar que els dos nous algoritmes veritablement identifiquen els camins més cooperatius, fet que suposa una millora de la fracció de pèrdua de paquets total (mitjana de tots els camins de la xarxa), ja que permet evitar els nodes egoistes de la xarxaPostprint (published version

    Contribución al diseño de protocolos de encaminamiento en redes móviles ad-hoc basados en reputación

    Get PDF
    The mobile ad-hoc networks are part of the next generation access networks (Next Generation Networking o NGN), "all-IP" networks facing the great scientific and technical challenge that is the ubiquitous computing The mobile ad-hoc networks are useful in situations where rapid deployment is required in an area where there is no infrastructure. The nodes can act as sources, destinations or as routers to transmit data from one node to another node not accessible with a single jump In this thesis we present two new algorithms of reputation-based routing protocols, REMODE_sw (Reputation for Mobile Devices Static Weight) and DrepSR (Dynamic reputation-based Source Routing), which use DSR (Dynamic Source Routing) as a routing protocol engine. The REMODE_sw protocol (Reputation for Mobile Devices Static Weight) is static weight and DrepSR (Dynamic reputation-based Source Routing) is dynamic weight, the difference is in the behavior of beta, which is the weight that reputation values (of each network node) new have in relation to historical values, REMODE_sw (Reputation for Mobile Devices Static Weight) maintains a constant beta value, while DrepSR (Dynamic reputation-based Source Routing) based on the behavior of the variance (of the reputation of each node in the network), independently updates the beta values of each node in the network, achieving that the reputation values(of each node in the network) approximate their average value with greater speed, in order that the reputation system has more accurate information on the behavior of each node The two new algorithms estimate the RFVs (Reputation Forwarding Values) in an ad-hoc mobile network, the main thing is to be able to choose those paths that are formed by the nodes with greater reputation, thus avoiding the less collaborative nodes. Reputation estimation is done using only first-hand information available to the node based on its experience in the network. For REMODE_sw (Reputation for Mobile Devices Static Weight) we have made the implementation of the algorithm on NS-2.35 (Network Simulator Version 2.35) using scenarios created with Bonnmotion v3.0, while for DrepSR (Dynamic reputation-based Source Routing) we have developed a simulator of an ad-hoc mobile network using MATLAB R2017b, inside this simulator we have implemented the algorithm DrepSR (Dynamic reputation-based Source Routing), likewise this simulation scenarios are created using Bonnmotionv3.0. As a general conclusion we have verified that the two new algorithms truly identify the most cooperative paths, which implies an improvement of the total packet loss fraction (average of all the paths of the network), since that allows to avoid the selfish nodes of the network.Las redes móviles ad-hoc son parte de las redes de acceso de próxima generación (Next Generation Networking o NGN), redes “all-IP” que hacen frente al gran desafío científico y técnico que es la computación ubicua Las redes móviles ad-hoc son útiles en situaciones donde se requiere un rápido despliegue en una zona en la que no hay infraestructura. Los nodos pueden actuar como fuentes, destinos o como encaminadores para transmitir datos de un nodo a otro nodo no accesible con un único salto En esta tesis presentamos dos nuevos algoritmos de protocolos de encaminamiento basados en reputación, REMODE_sw (Reputation for Mobile Devices Static Weight) y DrepSR (Dynamic reputation-based Source Routing), los cuales utilizan DSR (Dynamic Source Routing) como motor de protocolo de encaminamiento. El protocolo REMODE_sw (Reputation for Mobile Devices Static Weight) es de peso estático y DrepSR (Dynamic reputation-based Source Routing) es de peso dinámico, la diferencia se encuentra en el comportamiento de beta, el cual es el peso que los valores de reputación (de cada nodo de la red) nuevos tienen en relación a los valores históricos, REMODE_sw (Reputation for Mobile Devices Static Weight) mantiene un valor de beta constante, mientras que DrepSR (Dynamic reputation-based Source Routing) en base al comportamiento de la varianza (de la reputación de cada nodo de la red), actualiza de forma independiente los valores de beta de cada nodo de la red, consiguiendo que los valores de reputación (de cada nodo de la red) se aproximen a su valor medio con mayor rapidez, con la finalidad de que el sistema de reputación cuente con información más precisa sobre el comportamiento de cada nodo Los dos nuevos algoritmos estiman las RFVs (Reputation Forwarding Values) en una red móvil ad-hoc, lo primordial es poder elegir aquellos caminos que son formados por los nodos con mayor reputación, evitando así los nodos menos colaborativos. La estimación de la reputación se realiza utilizando únicamente información de primera mano disponible para el nodo en función de su experiencia en la red Para REMODE_sw (Reputation for Mobile Devices Static Weight) hemos realizado la implementación del algoritmo sobre NS-2.35 (Network Simulator Version 2.35) utilizando escenarios creados con Bonnmotion v3.0, mientras que para DrepSR (Dynamic reputation-based Source Routing) hemos desarrollado un simulador de una red móvil ad-hoc utilizando MATLAB R2017b, dentro de dicho simulador hemos implementado el algoritmo DrepSR (Dynamic reputation-based Source Routing), igualmente estos escenarios de simulación se crean utilizando Bonnmotion v3.0 Como conclusión general hemos podido comprobar que los dos nuevos algoritmos verdaderamente identifican los caminos más cooperativos, lo que supone una mejora de la fracción de pérdida de paquetes total (promedio de todos los caminos de la red), ya que permite evitar los nodos egoístas de la red.Les xarxes mòbils ad hoc són part de les xarxes d'accés de pròxima generació (Next Generation Networking o NGN), xarxes "all IP" que fan front al gran desafiament científic i tècnic que és la computació ubiqua Les xarxes mòbils ad hoc són útils en situacions on es requereix un ràpid desplegament en una zona en la qual no hi ha infraestructura. Els nodes poden actuar com a fonts, destinacions o com encaminaments per transmetre dades d'un node a un altre node no accessible amb un únic salt En aquesta tesi presentem dos nous algoritmes de protocols d'encaminament basats en reputació, REMODE_sw (Reputation for Mobile Devices Static Weight) i DrepSR (Dynamic reputation based Source Routing), els quals utilitzen DSR (Dynamic Source Routing) com a motor de protocol d'encaminament. El protocol REMODE_sw (Reputation for Mobile Devices Static Weight) és de pes estàtic i DrepSR (Dynamic reputation based Source Routing) és de pes dinàmic, la diferència es troba en el comportament de beta, el qual és el pes que els valors de reputació (de cada node de la xarxa) nous tenen en relació als valors històrics, REMODE_sw (Reputation for Mobile Devices Static Weight) manté un valor de beta constant, mentre que DrepSR (Dynamic reputation based Source Routing) sobre la base del comportament de la variància (de la reputació de cada node de la xarxa), s'actualitza de forma independent els valors de beta de cada node de la xarxa, aconseguint que els valors de reputació (de cada node de la xarxa) s'aproximin al seu valor mitjà amb major rapidesa, amb la finalitat que el sistema de reputació compti amb informació més precisa sobre el comportament de cada node Els dos nous algoritmes estimen les RFVs (Reputation Forwarding Values) en una xarxa mòbil ad hoc, el primordial és poder triar aquells camins que són formats pels nodes amb més reputació, evitant així els nodes menys col·laboratius. L'estimació de la reputació es realitza utilitzant únicament informació de primera mà disponible per al node en funció de la seva experiència a la xarxa Per REMODE_sw (Reputation for Mobile Devices Static Weight) hem realitzat la implementació de l'algoritme sobre NS 2.35 (Network Simulator Version 2.35) utilitzant escenaris creats amb Bonnmotion v3.0, mentre que per DrepSR (Dynamic reputation--based Source Routing) hem desenvolupat un simulador d'una xarxa mòbil ad--hoc utilitzant MATLAB R2017b, dins d'aquest simulador hem implementat l'algoritme DrepSR (Dynamic reputation--based Source Routing), igualment en aquest simulador s'han utilitzant escenaris creats en Bonnmotion v3.0 Com a conclusió general hem pogut comprovar que els dos nous algoritmes veritablement identifiquen els camins més cooperatius, fet que suposa una millora de la fracció de pèrdua de paquets total (mitjana de tots els camins de la xarxa), ja que permet evitar els nodes egoistes de la xarx

    Mobile Ad-Hoc Networks

    Get PDF
    Being infrastructure-less and without central administration control, wireless ad-hoc networking is playing a more and more important role in extending the coverage of traditional wireless infrastructure (cellular networks, wireless LAN, etc). This book includes state-of the-art techniques and solutions for wireless ad-hoc networks. It focuses on the following topics in ad-hoc networks: vehicular ad-hoc networks, security and caching, TCP in ad-hoc networks and emerging applications. It is targeted to provide network engineers and researchers with design guidelines for large scale wireless ad hoc networks
    corecore