143
Views
8
CrossRef citations to date
0
Altmetric
Articles

A novel hybrid incentive mechanism for node cooperation in mobile cyber-physical systems

, &
Pages 316-336 | Received 13 Sep 2013, Accepted 02 Oct 2013, Published online: 12 Nov 2013

REFERENCES

  • S. Bansal and M. Baker, Observation-based cooperation enforcement in ad hoc networks. Available at http://arxiv.org/pdf/cs.NI/0307012 (2003)
  • L. Buttyan and J.-P. Hubaux, Enforcing service availability in mobile ad-hoc WANs, the 1st ACM International Symposium on Mobile Ad Hoc Networking & Computing (MobiHoc 2000), Boston (2000)
  • L.Buttyan and J.-P.Hubaux, Stimulating cooperation in self-organizing mobile ad hoc networks, MONET, J. Mobile Netw.8(5) (2002), pp. 579–592.
  • D.E.Charilas, K.D.Georgilakis, and A.D.Panagopoulos, ICARUS: Hybrid incentive mechanism for cooperation stimulation in ad hoc networks, Ad Hoc Netw.10(6) (2012), pp. 976–989.
  • D.E.Charilas, S.G.Vassaki, A.D.Panagopoulos, and P.Constantinou, Cooperation incentives in 4G networks, in Game Theory for Wireless Communications and Networking, Y.Zhang and M.Guizani, eds., CRC Press, New York, 2011, pp. 295–314.
  • E. Hernández-Orallo, M.D.S. Olmos, J.-C. Cano, C.T. Calafate, and P. Manzoni, Evaluation of collaborative selfish node detection in MANETs and DTNs, the 15th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM 2012), New York (2012)
  • E.Hernández-Orallo, M.D.Serrat, J.-C.Cano, C.T.Calafate, and P.Manzoni, Improving selfish node detection in MANETs using a collaborative watchdog, IEEE Commun. Lett.16(5) (2012), pp. 642–645.
  • J.P. Hubaux and L. Buttyan, Toward mobile ad-hoc WANs: Terminodes, 2000 Wireless Communications and Networking Conference (WCNC 2000), Chicago (2000)
  • E.V.Huntington, The mathematical theory of the apportionment of representatives, Proc. Natl. Acad. Sci.7(4) (1921), pp. 123–127.
  • D.B. Johnson, Routing in ad hoc networks of mobile hosts, IEEE Workshop on Mobile Computing Systems and Applications, Santa Cruz, CA (1994)
  • P.Khatri and A.Mohammed, TDSR: Trust based DSR routing protocol for securing MANET, Int. J. Netw. Parallel Comp.1(3) (2013), pp. 28–42.
  • J.W.Lee, Y.H.Lee, and V.R.Syrotiuk, The performance of a watchdog protocol for wireless network security, Int. J. Wireless Mobile Comp.2(1) (2007), pp. 28–36.
  • Z.Li and H.Y.Shen, Game-theoretic analysis of cooperation incentive strategies in mobile ad hoc networks, IEEE Trans. Mobile Comp.11(8) (2012), pp. 1287–1303.
  • Y.N.Liu, K.Q.Li, Y.W.Jin, Y.Zhang, and W.Y.Qu, A novel reputation computation model based on subjective logic for mobile ad hoc networks, Future Gener. Comput. Syst.27(5) (2010), pp. 547–554.
  • Y.Ma and A.Jamalipour, A cooperative cache-based content delivery framework for intermittently connected mobile ad hoc networks, IEEE Trans. Wireless Commun.9(1) (2010), pp. 366–373.
  • S. Marti, T.J. Giuli, K. Lai, and M. Baker, Mitigating routing misbehaviour in mobile ad hoc networks, the 6th Annual International Conference on Mobile Computing and Networking (MobiCom 2000), New York (2000)
  • N.Nisan, T.Roughgarden, E.Tardos, and V.V.Vazirani, Algorithmic Game Theory, Cambridge University Press, New York, 2007.
  • A.M. Raafat, M. Fathy, A. Yehia, and M.A. Azer, Cooperation incentives in wireless ad hoc networks, the 2nd International Conference on Education Technology and Computer (ICETC 2010), Shanghai (2010)
  • M.T. Rafaei, V. Srivastava, L. Dasilva, and M. Eltoweissy, A reputation-based mechanism for isolating selfish nodes in ad hoc networks, the 2nd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous 2005), Washington D.C. (2005)
  • K.S.Ramana, A.A.Chari, and N.Kasiviswanth, A survey on trust management for mobile ad hoc networks, Int. J. Netw. Secur. Appl.2(2) (2010), pp. 75–85.
  • Y.W. Wang, V.C. Giruka, and M. Singhal, A fair distributed solution for selfish nodes problem in wireless ad hoc networks, ADHOC-NOW 2004, Vancouver (2004)
  • Z.J.Xu, Q.Hu, Y.J.Zhang, and X.M.Ye, Trust evaluation routing protocol to enforce cooperation in mobile ad hoc networks, J. Commun.33(7) (2012), pp. 27–35. (in Chinese).
  • Y.Yoo, S.Ahn, and D.P.Agrawal, Impact of a simple load balancing approach and an incentive-based scheme on MANET performance, J. Parallel Distrib. Comp.70(2) (2010), pp. 71–83.
  • X. Zeng, R. Bagrodia, and M. Gerla, Glomosim: A library for parallel simulation of large-scale wireless networks, the 12th Workshop on Parallel and Distributed Simulations (PADS 1998), Alberta (1998)
  • C. Zhang, X.Y. Zhu, Y. Song, and Y.G. Fang, C4: A new paradigm for providing incentives in multi-hop wireless networks, IEEE INFOCOM 2011, Shanghai (2011)
  • S. Zhong, J. Chen, and Y.R. Yang, Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks, IEEE INFOCOM 2003, San Francisco (2003)
  • S. Zhou and L. Ying, On delay constrained multicast capacity of large-scale mobile ad-hoc networks, IEEE INFOCOM 2010, Piscataway, NJ (2010)

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.