Basic Search / Detailed Display

Author: 邱心伶
Hsin-Lin Chiu
Thesis Title: 自私的隨意網路之效能研究
A Network Performance Study for Selfish MANET Environment
Advisor: 羅乃維
Nai-Wei Lo
Committee: 左瑞麟
Ray-Lin Tso
呂永和
Yung-Ho Leu
Degree: 碩士
Master
Department: 管理學院 - 資訊管理系
Department of Information Management
Thesis Publication Year: 2012
Graduation Academic Year: 100
Language: 英文
Pages: 35
Keywords (in Chinese): 隨意網路自私節點友誼機制封包傳遞率
Keywords (in other languages): MANET, Selfish node, Friendship, Packet delivery ratio
Reference times: Clicks: 77Downloads: 6
Share:
School Collection Retrieve National Library Collection Retrieve Error Report
  • 無線隨意網路是由行動裝置而構成自律分散式的網路,行動裝置靠著之間的互相合作來傳遞封包,但行動裝置會因自身有限的資源例如電力,產生是否轉送源自其他裝置封包的自私行為,而這種自私節點的行為會降低封包的成功傳遞量,所以自私節點的出現成為一項值得探討的研究議題。
    近幾年的研究中,數種偵測自私節點的方法被陸續提出,但這些方法通常都假設自私節點在隨意網路下是少數的,並且都被當成惡意節點而發展出一機制偵測及隔離;本研究認為自私並非一種惡意行為,而是每一個行動裝置皆會出現的自然行為,所以本研究探討分析在隨意網路的節點全都為自私節點時所造成之效能影響,並在每一個自私節點上加入友誼 (Friendship)機制,節點與節點藉由朋友之間的信任來傳遞封包以提升整個網路效能。


    A MANET is a self-organizing and self-configuring network without the need for any existing network infrastructure or centralized administration. A MANET is a collection of mobile nodes with limited resources such as battery power. Limited resources make the nodes appear selfish behavior. Selfish nodes want to save their resources for their own usage, so they are unwilling to spend resources to forward data packets. In consequence, selfish nodes will reduce the total packet delivery ratio in a MANET. Every node may appear selfish behaviors in real world environment. In the previous published literature, the general assumption is that only a few selfish nodes in a MANET. Selfish nodes usually are viewed as malicious nodes, and detection mechanisms are developed to identify and isolate node with malicious behaviors.
    In this study, the author argues that selfishness is not a malicious behavior. Actually, selfishness is a natural behavior for all nodes in the MANET. Thus, this study is to measure and evaluate the possible effects in the real world where all mobile devices are selfish nodes and proposes a friendship strategy for each selfish node is developed to observe and evaluate performance improvement in a MANET.

    中文摘要 i ABSTRACT ii 誌謝 iii CONTENTS iv List of Figures v List of Tables vi Chapter 1 Introduction 1 Chapter 2 Related Works 4 2.1. The DSR protocol 4 2.2. Existing Solutions of Selfish Nodes in MANET 6 Chapter 3 Friendship Strategy for Selfishness in MANET 11 3.1. Modeling the Behavior of Selfish Nodes 11 3.2. Friendship Strategy 13 Chapter 4 Simulation Result 15 4.1. Simulation Scenario 15 4.2. Performance Analysis 17 4.2.1. The Throughput 18 4.2.2. Packet Delivery Ratio 23 4.2.3. Average End-to-End Delay 27 Chapter 5 Conclusion 31 References 33

    [1]Ting Liu, Kai Liu, "Improvements on DSDV in Mobile Ad Hoc Networks," Wireless Communications, Networking and Mobile Computing, pp.1637-1640, Sept. 21-25, 2007.
    [2]Ching-Chuan Chiang, Hsiao-Kuang Wu, Winston Liu, Mario Gerla, "Routing in Clustered Multihop Mobile Wireless Networks with Fading Channel," Proceedings of IEEE Singapore International Conference on Networks, Singapore, 1997.
    [3]P. Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, A. Qayyum, L. Viennot, "Optimized link state routing protocol for ad hoc networks," Multi Topic Conference, pp.62-68, 2001.
    [4]V. D. Park, M. S. Corson, "A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks," INFOCOM '97, Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies, Vol.3, pp.1405-1355, Apr. 7-12, 1997.
    [5]M. Scott Corson, Anthony Ephremides, "A Distributed Routing Algorithm for Mobile Wireless Networks," Wireless Networks, Vol.1, No.1, pp.61-81, Feb., 1995.
    [6]Chai-Keong Toh, "Associativity-Based Routing for Ad Hoc Mobile Networks," IEEE 15th Annual International Phoenix Conference on Computers and Communications, IEEE IPCCC 1996, pp.480-486, Mar. 27-29, 1996.
    [7]Lianyu Zhao, Haiying Shen, "A Low-cost Anonymous Routing Protocol in MANETs," Proceedings of the International Conference on Computer Communications and Networks, San Francisco, CA, United States, pp.1-6, Aug. 3-6, 2009.
    [8]D. Johnson, Y. Hu, D. Maltz, "The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4," Network working Group Request for Comments: 4728, Feb., 2007.
    [9]C.E. Perkins, E.M. Royer, "Ad Hoc On-Demand Distance Vector Routing," Proceedings of the Second IEEE Workshop Mobile Computing Systems and Applications, New Orleans, LA, pp.90-100, Feb. 25-26, 1999.
    [10]Djamel Djenouri, Nadjib Badache, "MANET: Selfish Behavior on Packet Forwarding," Encyclopedia of Wireless and Mobile Communications, 2008.
    [11]Pietro Michiardi, Refik Molva, "Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks," The 6th IFIP Communication and Multimedia Security Conference CMS 2002, Portoroz, Slovenia, Sept. 26-27, 2002.
    [12]Sonja Buchegger, Jean-yves Le Boudec, "Performance analysis of the confidant protocol: Cooperation of nodes - fairness in dynamic ad-hoc networks," 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2002), Lausanne, Switzerland, June 9-11, 2002.
    [13]Hao Yang, Xiaoqiao Meng, Songwu Lu, "Self-organized network layer security in mobile ad hoc networks," ACM MOBICOM Wireless Security Workshop (WiSe 2002), Atlanta, GA, Sept. 28, 2002.
    [14]H. Miranda, L. Rodrigues, "Friends and foes: preventing selfishness in open mobile ad hoc networks," The 23rd IEEE International Conference on Distributed Computing Systems (ICDCS 2003), Providence, RI, pp.440-445, May 19-22, 2003.
    [15]Levente Buttyan, Jean-Pierre Hubaux, "Nuglets: a virtual currency to stimulate cooperation in self-organized mobile ad hoc networks," Swiss Federal Institute of Technology, Lausanne, Switzerland, Tech. Rep. DSC/2001/001. Jan. 2001.
    [16]Sanjay K. Dhurandher, Mohammad S. Obaidat, Karan Verma, Pushkar Gupta, Pravina Dhurandher, "FACES: Friend-Based Ad Hoc Routing Using Challenges to Establish Security in MANETs Systems," IEEE Systems Journal, Vol.5, No.2, pp.176-188, June, 2011.
    [17]Sergio Marti, T.J Giuli, Kevin Lai, Mary Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM, pp.255-265, 2000.

    QR CODE