Impact of node distance on selfish replica allocation in a mobile ad-hoc network

Ad Hoc Networks - Tập 11 - Trang 2187-2202 - 2013
Byung-Gul Ryu1, Jae-Ho Choi1, SangKeun Lee1
1Dept. of Computer Science and Engineering, Korea University, 1-5,Anam-dong, Sungbuk-ku, Seoul, 136-713, Republic of Korea

Tài liệu tham khảo

Adar, 2000, Free riding on Gnutella, First Monday, 5, 1, 10.5210/fm.v5i10.792 L. Anderegg, S. Eidenbenz, Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents, in: Proceedings of ACM MobiCom, 2003, pp. 245–259. J. Broch, D.A. Maltz, D.B. Johnson, Y. Chun Hu, J. Jetcheva, A performance comparison of multi-hop wireless ad hoc network routing protocols, in: Proceedings of ACM MobiCom, 1998, pp. 85–97. Cao, 2004, Cooperative cache-based data access in ad hoc networks, IEEE Computer, 37, 32, 10.1109/MC.2004.1266293 Choi, 2012, Handling selfishness in replica allocation over a mobile ad hoc network, IEEE Transactions on Mobile Computing, 11, 278, 10.1109/TMC.2011.57 G. Ding, B. Bhargava, Peer-to-peer file-sharing over mobile ad hoc networks, in: Proceedings of IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004, pp. 104–108. Friss, 1946, A note on a simple transmission formula, Proceedings of the Institute of Radio Engineers, 34, 254 D. Hales, From selfish nodes to cooperative networks – emergent link-based incentives in peer-to-peer networks, in: Proceedings of IEEE International Conference on Peer-to-Peer Computing, 2004, pp. 151–158,. T. Hara, Effective replica allocation in ad hoc networks for improving data accessibility, in: Proceedings of IEEE International Conference on Computer Communications, 2001, pp. 1568–1576. Hara, 2006, Data replication for improving data accessibility in ad hoc networks, IEEE Transactions on Mobile Computing, 5, 1515, 10.1109/TMC.2006.165 Hara, 2009, Consistency management strategies for data replication in mobile ad hoc networks, IEEE Transactions on Mobile Computing, 8, 950, 10.1109/TMC.2008.150 Johnson, 1996, Dynamic source routing in ad hoc wireless networks, Mobile Computing, 353, 153, 10.1007/978-0-585-29603-6_5 S.U. Khan, On a game theoretical methodology for data replication in ad hoc networks, in: Proceedings of International Conference on Parallel and Distributed Processing Techniques and Applications, 2009. pp. 232–238. Khan, 2011, Mosaic-net: a game theoretical method for selection and allocation of replicas in ad hoc networks, Journal of Supercomputing, 55, 321, 10.1007/s11227-009-0329-y Li, 2007, Trust management in distributed systems, IEEE Computer, 40, 45, 10.1109/MC.2007.76 M. Li, W.-C. Lee, A. Sivasubramaniam, Efficient peer-to-peer information sharing over mobile ad hoc networks, In: Proceedings of WWW Workshop on Emerging Applications for Wireless and Mobile Access, 2004, pp. 2–6,. Y. Liu, Y. Yang, Reputation propagation and agreement in mobile ad-hoc networks, in: Proceedings of IEEE Wireless Communications and Networking Conference, 2003, pp. 1510–1515. S. Marti, T. Giuli, K. Lai, M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in: Proceedings of ACM MobiCom, 2000, pp. 255–265. Mondal, 2009, An economic incentive model for encouraging peer collaboration in mobile-P2P networks with support for constraint queries, Peer-to-Peer Networking and Applications, 2, 230, 10.1007/s12083-009-0035-9 Osborne, 2003 Padmanabhan, 2008, A survey of data replication techniques for mobile ad hoc network databases, The International Journal on Very Large Data Bases, 17, 1143, 10.1007/s00778-007-0055-0 K. Paul, D. Westhoff, Context aware detection of selfish nodes in DSR based ad-hoc networks, in: Proceedings of IEEE Global Telecommunications Conference, 2002, pp. 178–182. C.E. Perkins, P. Bhagwat, Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers, in: Proceedings of ACM SIGCOMM, 1994, pp. 234–244. C.E. Perkins, E.M. Royer, Ad-hoc on-demand distance vector routing, in: Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications, 1999, pp. 90–100. M.K. Rafsanjani, A. Movaghar, F. Koroupi, Investigating intrusion detection systems in MANET and comparing IDSs for detecting misbehaving nodes, in: Proceedings of World Academy of Science, Engineering and Technology, 2008, pp. 351–355. V. Srinivasan, P. Nuggehalli, C. Chiasserini, R. Rao, Cooperation in wireless ad hoc networks, in: Proceedings of IEEE International Conference on Computer Communications, 2003, pp. 808–817. W. Wang, X.-Y. Li, Y. Wang, Truthful multicast routing in selfish wireless networks, in: Proceedings of ACM MobiCom, 2004, pp. 245–259. Wu, 2006, A user-centered approach to active replica management in mobile environments, IEEE Transactions on Mobile Computing, 5, 1606, 10.1109/TMC.2006.158 L. Yin, G. Cao, Balancing the tradeoffs between data accessibility and query delay in ad hoc networks, in: Proceedings of IEEE International Symposium on Reliable Distributed Systems, 2004, pp. 289–298. Yoo, 2006, Why does it pay to be selfish in a MANET, IEEE Wireless Communications, 13, 87, 10.1109/MWC.2006.275203