移动自组网中节点合作方法的研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
移动自组网是由多个移动节点临时组成的一个不依赖任何基础通信设施的多跳无线网络。由于缺乏基础设施的支持,再加上节点有限的传输范围,源节点往往不能直接把数据传到目的节点,而需要借助邻居节点的转发功能。在移动自组网中,如果没有节点间的合作,路由将不能建立,数据包将不会被转发,节点间也就不能存在多跳通讯。但是节点间的合作,例如为其它节点转发数据,不是总能被保证的。网络中的自私节点可能会出于节省自己资源(如能量)的目的,拒绝为网络中的其它节点转发数据,从而表现不合作行为,这将严重影响网络的性能。移动自组网中节点合作方法的目的正是用于迫使或激励自私节点参与网络合作,从而维持网络的正常运行。
     本文对基于信誉的节点合作方法进行了改进,提出了基于共同邻居监听的节点合作方法(Common-neighbor Monitoring enabled Cooperation enforcementscheme,CMC),通过引入共同邻居监听技术,看门狗在对下一跳转发节点进行监听的同时,还对周围不相关的数据流进行监听,加快了系统对自私节点的检测速度。在路由发现过程中,CMC方法还对路由控制消息进行了过滤,丢弃那些含有自私节点的路由请求包和路由应答包,使源节点所发现的路由能够尽量绕过自私节点,进一步减小自私节点对网络性能的影响。
     在采用直接信息计算节点信誉值的方法中,虽然检测准确度较高,并且实现相对容易,但对自私节点的检测速度较慢,往往不能及时发现网络中的自私节点,于是本文进一步提出了TORA协议增强合作方法(TORAprotocolwithCooperation Enhanced, TORA CE),采用一跳信息计算节点的信誉值,加快了对自私节点的检测速度。TORA CE方法基于TORA协议,是一种多径路由自组网节点合作方法,每个节点拥有多条通往目的节点的路径,在发现自私节点后,能够快速切换路由,减小了数据传输过程中丢包的概率。TORA CE方法具有更好的分布式特点,能够将自私节点引发的路由变化限制在自私节点附近较小的范围内。
     利用博弈论和机制设计理论分析并设计节点合作方法是未来发展的必然趋势,本文还对基于VCG机制的节点合作方法进行了分析,并在此基础上提出了低负载合作协议(A Low Message-Overhead Cooperation Protocol,LMOCP)。LMOCP协议是对Ad hoc-VCG和LOTTO协议的一个改进,修正了Adhoc-VCG协议中所存在的四个缺点,并且具有更低的消息负载。通过引入邻居发现过程,节点周期地以最大传输功率发送广播消息,使每个节点都能随时计算出所有邻居到自己的最小传输功率,同时还对路由发现过程进行了改进,减少了路由发现过程中控制消息的数量。本文还从理论上对LMOCP协议的正确性进行了分析,证明了LMOCP协议是事后纳什可实现的,在所有节点都是理性的这一共同知识的假定下,每个节点的最优策略是诚实地报告自己的转发价格。
     但是LMOCP协议中的消息负载依然很大,为O(n~2),为此本文进一步提出了广播树增强节点合作协议(Broadcast-treeEnhancedCooperationProtocol,BEC)。通过在路由发现过程中创建一棵以目的节点为根的广播树,使控制消息沿着广播树以单播方式传送到根节点,能够进一步减少路由发现过程中控制消息的数量。对于一棵高度为O(lg(n))的广播树,协议的消息负载为O(n lg(n)),低于LOTTO协议的O(n~2)。另外,在BEC协议中,由目的节点收集网络的拓扑信息,并负责计算最小价格路径及各转发节点的支付,不需要假定源节点是诚实的,这更加符合网络的真实情况。
Mobile ad hoc network is a Multi-hop Wireless Network which is composed of anumber of mobile nodes and does not rely on any infrastructure communication facility.Due to the lack of infrastructure supporting, coupled with the limited transmission rangeof nodes, the source nodes can not often communicate directly with the destination nodes,so the helps of middle forwarding nodes are demanded. In mobile ad hoc network, ifthere is no cooperation between nodes, routing will not to be set up, packets will not betransmitted, and there cannot exist multi-hop communications between nodes.
     However, the cooperation between nodes, for example, forwarding data for othernodes, is not always guaranteed. For the purpose of saving their own resources (suchas energy), selfish nodes may refuse to forward packets for other nodes, thus showingthe non-cooperative behaviors, which can seriously affect the network performance. Thepurpose of cooperation scheme is to enforce or incentive the selfish nodes to participatein the network cooperation, maintaining the normal operations of the network.
     In this thesis, we have improved the reputation based cooperation schemesand proposed the common-neighbor monitoring enabled cooperation enforcementscheme(CMC). Through the introduction of common neighbor monitoring technique, thewatchdog not only monitors the behavior of next hop forwarding node, but also monitorsthe surrounding connections, speeding up the detecting rate to the selfish nodes. In theroute discovery phase, the CMC scheme filters the routing control messages, discardingthose messages which contain selfish nodes, making the route that the source node findsas far as possible bypass the selfish nodes, reducing the impact that selfish nodes have onnetwork performance.
     The CMC scheme calculates node reputations using the direct information, althougha higher detection accuracy and relatively easy to implement, the detection rate to self-ish nodes is slow. So this thesis further proposed the TORA protocol with cooperationenhanced scheme(TORA CE), which computes the node reputations using one-hop infor-mation, improving the detection rate to selfish nodes. The TORA CE scheme, which isbased on the TORA protocol, is a multi-path ad hoc network nodes cooperation scheme.Each node has multi paths leading to the destination node. After the discovery of a selfish node, the TORA CE scheme can switch route quickly, reducing the probability of drop-ping packets in data transmission phase. The TORA CE method has better distributedcharacteristics, and limiting the route changes that selfish nodes triggered in a smallerrange.
     Using the game theory and mechanism design theory to analysis and design nodecooperation schemes is the inevitable trend of the future, so this thesis has analyzed theVCG mechanism based cooperation scheme and proposed the low message-overhead co-operation protocol(LMOCP). The LMOCP protocol is an improvement to the Ad hoc-VCG and LOTTO protocol, modifying four drawbacks in the Ad hoc-VCG protocol, andhas a lower message overload. Through the introduction of neighbor discovery process,nodes periodically broadcast“hello”messages in maximum transmitting power, so thateach node can calculate the minimum transmission power from neighbors to itself. Atthe same time, the routing discovery process has been improved to reduce the number ofcontrol messages. This thesis also analyzed the correctness of the LMOCP protocol andproved that the LMOCP protocol is ex post Nash implementable. Under the assumptionthat all nodes are rationality, the optimal strategy for each node is to honestly report theirown forwarding cost.
     However, the message overhead of the LMOCP protocol is still huge, which isO(n~2), so this thesis further proposed a broadcast tree enhanced node cooperation proto-col (BEC). After the construction of a broadcast tree rooted at the destination node in therouting discovery process, the control messages are transmitted to the destination nodealong the broadcast tree, which can further reduce the control messages. For a broad-cast tree with its height equal to O(lg(n)), the message overhead in BEC protocol isO(n lg(n)), lower than that of LOTTO protocol which is O(n~2). In addition, in BEC pro-tocol, the destination node is responsible for collecting the network topology informationand calculating the minimum cost path from source to destination node, and do not needto assume that the source node is honest, which more satisfies the real situation of thenetwork.
引文
1 I. Chlamtac, M. Conti, J. Liu. Mobile Ad Hoc Networking: Imperatives and Chal-lenges[J]. Ad Hoc Networks, 2003, 1(1):13–64.
    2 I. Akyildiz, W. Su, Y. Sankarasubramaniam, et al. Wireless Sensor Networks: ASurvey[J]. Computer networks, 2002, 38(4):393–422.
    3 S. Sesay, Z. Yang, J. He. A Survey on Mobile Ad Hoc Wireless Network[J]. Infor-mation Technology Journal, 2004, 3(2):168–175.
    4 I. Akyildiz, X. Wang, W. Wang. Wireless Mesh Networks: A Survey[J]. ComputerNetworks, 2005, 47(4):445–487.
    5 I. Akyildiz, X. Wang. A Survey on Wireless Mesh Networks[J]. IEEE Communi-cations Magazine, 2005, 43(9):S23–S30.
    6 M. Frodigh, P. Johansson, P. Larsson. Wireless Ad Hoc Networking-the Art ofNetworking without a Network[J]. Ericsson Review, 2000, 4:248–263.
    7 BASAGNI S, CONTI M, GIORDANO S and STOJMENOVIC I. Mobile Ad HocNetworking[M]. New Jersey: Wiley-IEEE press, 2004.
    8 N. Davies, H. Gellersen. Beyond Prototypes: Challenges in Deploying UbiquitousSystems[J]. IEEE Pervasive Computing, 2002, 1(1):26–35.
    9徐光佑,史元春,谢伟凯.普适计算[J].计算机学报, 2003, 26(9):1042–1050.
    10 Ilyas, M. The Handbook of Ad-hoc Networks[M]. Florida: CRC Press, 2000.
    11 D. Johnson, D. Maltz, J. Broch, et al. DSR: The Dynamic Source Routing Protocolfor Multi-hop Wireless Ad Hoc Networks[J]. Ad hoc networking, 2001, 5(1):139–172.
    12 V. Park, M. Corson. A Highly Adaptive Distributed Routing Algorithm for MobileWireless Networks[C]//IEEE Infocom. 1997, 3:1405–1413.
    13刘强,匡镜明,王华. Tora路由协议详解及性能分析[C]//海峡两岸三地无线科技学术会论文集.中国北京,2005:499–503.
    14 C. Perkins, E. Belding-Royer, S. Das. RFC3561: Ad Hoc On-demand DistanceVector (aodv) Routing[J]. Internet RFCs, 2003.
    15 G. Anastasi, E. Borgia, M. Conti, et al. Ieee 802.11 B Ad Hoc Networks: Perfor-mance Measurements[J]. Cluster Computing, 2005, 8(2):135–145.
    16 B. Chatschik. An Overview of the Bluetooth Wireless Technology[J]. IEEE Com-munications Magazine, 2001, 39(12):86–94.
    17 R. Bruno, M. Conti, E. Gregori. Bluetooth: Architecture, Protocols and SchedulingAlgorithms[J]. Cluster Computing, 2002, 5(2):117–131.
    18 J. Mundinger. Reputation in Self-organized Communication Systems and Be-yond[C]//Proceedings of the Interdisciplinary systems approach in performanceevaluation and design of computer & communications sytems. 2006.
    19 S. Buchegger, J. Mundinger, J. le Boudec. Reputation Systems for Self-organized Networks[J]. IEEE TECHNOLOGY AND SOCIETY MAGAZINE,2008, 27(1):41–47.
    20 H. J. Y. Cooperation in Mobile Ad Hoc Networks[J]. http://www.cs.fsu.edu/research/reports/TR-050111.pdf, 2005.
    21 J. Jubin, J. Tornow. The Dapar Packet Radio Network Protocols[C]//proceedingsof IEEE, Special Issue on Packet Radio Networks. 1987, 75:21–32.
    22 B. Leiner, R. Ruther, A. Sastry. Goals and Challenges of the Darpa Glomo Program[global Mobileinformation Systems][J]. IEEE Personal Communications, 1996,3(6):34–43.
    23 J. Macker, M. Corson. Mobile Ad Hoc Networking and the Ietf[J]. ACM SIGMO-BILE Mobile Computing and Communications Review, 1998, 2(1):9–14.
    24汪涛.无线网络技术导论[M].北京:清华大学出版社, 2008.
    25 H. Yang, H. Luo, F. Ye, et al. Security in Mobile Ad Hoc Networks: Challengesand Solutions[J]. IEEE Wireless Communications, 2004, 11(1):38–47.
    26 R. Rajaraman. Topology Control and Routing in Ad Hoc Networks: A Survey[J].ACM SIGACT News, 2002, 33(2):60–73.
    27 P. Santi. Topology Control in Wireless Ad Hoc and Sensor Networks[J]. ACMComputing Surveys (CSUR), 2005, 37(2):164–194.
    28 S. Kumar, V. Raghavan, J. Deng. Medium Access Control Protocols for Ad HocWireless Networks: A Survey[J]. Ad Hoc Networks, 2006, 4(3):326–358.
    29 M. Billinghurst, T. Starner. Wearable Devices: New Ways to Manage Informa-tion[J]. Computer, 1999, 32(1):57–64.
    30 J. Davis, A. Fagg, B. Levine. Wearable Computers as Packet Transport Mecha-nisms in Highly-partitioned Ad-hoc Networks[C]//Proceeding of the InternationalSymposium on Wearable Computing. 2001:141–148.
    31 W. Lou, Y. Fang. A Survey of Wireless Security in Mobile Ad Hoc Networks:Challenges and Available Solutions[J]. Ad Hoc Wireless Networking, 2004:319.
    32 I. Demirkol, C. Ersoy, F. Alagoz. MAC Protocols for Wireless Sensor Networks: ASurvey[J]. IEEE Communications Magazine, 2006, 44(4):115–121.
    33 A. Snow, U. Varshney, A. Malloy. Reliability and Survivability of Wireless andMobile Networks[J]. Computer, 2000, 33(7):49–55.
    34 J. Sterbenz, R. Krishnan, R. Hain, et al. Survivable Mobile Wireless Networks: Is-sues, Challenges, and Research Directions[C]//Proceedings of the 1st ACM work-shop on Wireless security. 2002:31–40.
    35 J. Al-Karaki, A. Kamal. Routing Techniques in Wireless Sensor Networks: ASurvey[J]. IEEE Wireless Communications, 2004, 11(6):6–28.
    36 K. Akkaya, M. Younis. A Survey on Routing Protocols for Wireless Sensor Net-works[J]. Ad Hoc Networks, 2005, 3(3):325–349.
    37 M. Conti, S. Giordano, I. Council. Multihop Ad Hoc Networking: The Theory[J].IEEE Communications Magazine, 2007, 45(4):78–86.
    38 F. Cali, M. Conti, E. Gregori, et al. IEEE 802.11 Protocol: Design and PerformanceEvaluation of Anadaptive Backoff Mechanism[J]. IEEE journal on selected areasin communications, 2000, 18(9):1774–1786.
    39 E. Jung, N. Vaidya. A Power Control Mac Protocol for Ad Hoc Networks[J]. Wire-less Networks, 2005, 11(1):55–66.
    40 R. Beraldi, R. Baldoni. Unicast Routing Techniques for Mobile Ad Hoc Net-works[J]. Handbook of Ad Hoc Networks, CRC Press, New York, 2003.
    41 E. Royer, C. Toh. A Review of Current Routing Protocols for Ad Hoc MobileWirelessnetworks[J]. IEEE Personal Communications, 1999, 6(2):46–55.
    42 M. Mauve, A. Widmer, H. Hartenstein. A Survey on Position-based Routing inMobile Ad Hoc Networks[J]. IEEE network, 2001, 15(6):30–39.
    43 G. Anastasi, M. Conti, E. Gregori. IEEE 802.11 Ad Hoc Networks: Protocols,Performance and Open Issues[J]. Mobile Ad Hoc Networking, 2004:69.
    44 G. Holland, N. Vaidya. Analysis of Tcp Performance Over Mobile Ad Hoc Net-works[J]. Wireless Networks, 2002, 8(2):275–288.
    45 H. Elaarag. Improving Tcp Performance Over Mobile Networks[J]. ACM Com-puting Surveys (CSUR), 2002, 34(3):357–374.
    46 C. Parsa, J. Garcia-Luna-Aceves. Improving Tcp Performance Over Wireless Net-works at the Link Layer[J]. Mobile Networks and Applications, 2000, 5(1):57–71.
    47 Y. Huang, H. Garcia-Molina. Publish/subscribe in a Mobile Environment[J]. Wire-less Networks, 2004, 10(6):643–652.
    48 G. Cugola, H. Jacobsen. Using Publish/subscribe Middleware for Mobile Sys-tems[J]. ACM SIGMOBILE Mobile Computing and Communications Review,2002, 6(4):25–33.
    49 G. Banavar, J. Barton, N. Davies, et al. Special Feature on Middleware for Mobile& Pervasive Computing[J]. ACM SIGMOBILE Mobile Computing and Commu-nications Review, 2002, 6(4).
    50 C. Mascolo, L. Capra, W. Emmerich. Middleware for Mobile Computing (a Sur-vey)[J]. Networking 2002 Tutorial Papers, 2002, 2497:20–58.
    51 G. Anastasi, M. Conti, W. Lapenna. A Power-saving Network Architecture forAccessing the Internet from Mobile Computers: Design, Implementation and Mea-surements[J]. The Computer Journal, 2003, 46(1):3–15.
    52 L. Feeney. Energy Efficient Communication in Ad Hoc Wireless Networks[J]. Mo-bile Ad Hoc Networking, 2004:301.
    53 C. Jones, K. Sivalingam, P. Agrawal, et al. A Survey of Energy Efficient NetworkProtocols for Wireless Networks[J]. Wireless Networks, 2001, 7(4):343–358.
    54 L. Buttyan, J. Hubaux. Report on a Working Session on Security in Wireless AdHoc Networks[J]. ACM SIGMOBILE Mobile Computing and CommunicationsReview, 2003, 7(1):74–94.
    55 J. Hubaux, L. Buttyan, S. Capkun. The Quest for Security in Mobile Ad HocNetworks[C]//Proceedings of the 2nd ACM international symposium on Mobile adhoc networking & computing. 2001:146–155.
    56 P. Michiardi, R. Molva. Simulation-based Analysis of Security Exposures in Mo-bile Ad Hoc Networks[C]//Proceediings of European Wireless Conference. 2002.
    57 G. Marias, P. Georgiadis, D. Flitzanis, et al. Cooperation Enforcement Schemesfor Manets: A Survey[J]. Wireless Communications and Mobile Computing, 2006,6(3):319–332.
    58 D. Perkins, H. Hughes. A Survey on Quality-of-service Support for Mobile Ad HocNetworks[J]. Wireless Communications and Mobile Computing, 2002, 2(5).
    59 T. Reddy, I. Karthigeyan, B. Manoj, et al. Quality of Service Provisioning in AdHoc Wireless Networks: A Survey of Issues and Solutions[J]. Ad Hoc Networks,2006, 4(1):83–124.
    60 M. Conti, G. Maselli, G. Turi, et al. Cross-layering in Mobile Ad Hoc NetworkDesign[J]. Computer, 2004, 37(2):48–51.
    61 P. Pham, S. Perreau, A. Jayasuriya. New Cross-layer Design Approach to Ad HocNetworks under Rayleigh Fading[J]. IEEE Journal on selected Areas in Communi-cations, 2005, 23(1):28–39.
    62 M. Conti, E. Gregori, G. Maselli. Cooperation Issues in Mobile Ad Hoc Net-works[C]//Proceedings of 24th International Conference on Distributed ComputingSystems Workshops. 2004:803–808.
    63 S. Marti, T. Giuli, K. Lai, et al. Mitigating Routing Misbehavior in Mobile Ad HocNetworks[C]//Proceedings of the 6th annual international conference on Mobilecomputing and networking. 2000:255–265.
    64 K. Fall, K. Varadhan. The Ns Manual (formerly Ns Notes and Documentation)[J].The VINT Project, 2007, 1.
    65 K. Mandalas, D. Flitzanis, G. Marias, et al. A Survey of Several CooperationEnforcement Schemes for Manets[C]//Proceedings of the Fifth IEEE InternationalSymposium on Signal Processing and Information Technology. 2005:466–471.
    66 M. Mejia, N. Pen?a, J. Mun?oz, et al. A Review of Trust Modeling in Ad Hoc Net-works[J]. Internet Research, 2009, 19(1):88–104.
    67 S. Buchegger, J. Le Boudee. Self-policing Mobile Ad Hoc Networks by ReputationSystems[J]. IEEE Communications Magazine, 2005, 43(7):101–107.
    68 S. Buchegger, J. Le Boudec. Cooperative Routing in Mobile Ad-hoc Networks:Current Efforts Against Malice and Selfishness[C]//Proceedings of the Mobile In-ternet Workshop. 2002.
    69 S. Buchegger. Performance Analysis of the Confidant Protocol[C]//Proceedings ofthe 3rd ACM international symposium on Mobile ad hoc networking & computing.2002:226–236.
    70 S. Buchegger, J. Boudec. Coping with False Accusations in Misbehavior Reputa-tion Systems for Mobile Ad-hoc Networks[R]. Tech. rep., EPFL, 2003.
    71 S. Buchegger, J. Le Boudec. A Robust Reputation System for Mobile Ad-hocNetworks[R]. Tech. rep., EPFL, 2003.
    72 P. Michiardi, R. Molva. Core: A Collaborative Reputation Mechanism to EnforceCooperation in Mobile Ad-hoc Networks[C]//Proceedings of IFIP Communicationand Multimedia Security conference. 2002:107–121.
    73 P. Michiardi. Cooperation Enforcement and Network Security Mechanisms forMobile Ad Hoc Networks[D]PhD Thesis, Ecole nationale superieure des telecom-munications, Paris, 2004.
    74 S. Bansal, M. Baker. Observation-based Cooperation Enforcement in Ad Hoc Net-works[R]. Tech. rep., Stanford University, Stanford, CA, 2003.
    75 K. Liu, J. Deng, P. Varshney, et al. An Acknowledgment-based Approach for theDetection of Routing Misbehavior in Manets[J]. IEEE Transactions on MobileComputing, 2007, 6(5):536–550.
    76 D. Djenouri, N. Badache. Struggling Against Selfishness and Black Hole Attacksin Manets[J]. Wireless Communications and Mobile Computing, 2008, 8(6).
    77 Q. He, D. Wu, P. Khosla. A Secure Incentive Architecture for Ad Hoc Networks[J].Wireless Communications and Mobile Computing, 2006, 6(3).
    78 L. Buttyan, J. Hubaux. Nuglets: a Virtual Currency to Stimulate Cooperation inSelf-organized Mobile Ad Hoc Networks[R]. Tech. rep., Swiss Federal Institute ofTechnology, 2001.
    79 L. Buttyan, J. Hubaux. Stimulating Cooperation in Self-organizing Mobile Ad HocNetworks[J]. Mobile Networks and Applications, 2003, 8(5):579–592.
    80 S. Zhong, J. Chen, Y. Yang. Sprite: A Simple, Cheat-proof, Credit-based Systemfor Mobile Ad-hoc Networks[C]//Proceedings of the 21st Annual Joint Conferenceof the IEEE Computer and Communications Societies. 2003, 3:1987–1997.
    81 L. Anderegg, S. Eidenbenz. Ad Hoc-vcg: A Truthful and Cost-efficient Rout-ing Protocol for Mobile Ad Hoc Networks with Selfish Agents[C]//Proceedingsof the 9th annual international conference on Mobile computing and networking.2003:245–259.
    82 J. Dorsey. Game-Theoretic Power Management in Mobile Ad Hoc Net-works[D]PhD thesis, Carnegie Mellon University Department of Electrical andComputer Engineering, Pittsburgh, Pennsylvania, 2004.
    83 S. Eidenbenz, G. Resta, P. Santi. Commit: A Sender-centric Truthfuland Energy-efficient Routing Protocol for Ad Hoc Networks with SelfishNodes[C]//Proceedings of the 19th IEEE International Parallel and Distributed Pro-cessing Symposium. 2005:10.
    84 S. Eidenbenz, G. Resta, P. Santi. The Commit Protocol for Truthful and Cost-efficient Routing in Ad Hoc Networks with Selfish Nodes[J]. IEEE Transactionson Mobile Computing, 2008, 7(1):19–33.
    85 Y. Wang, M. Singhal. On Improving the Efficiency of Truthful Routing in Manetswith Selfish Nodes[J]. Pervasive and Mobile Computing, 2007, 3(5):537–559.
    86 J. Cai, U. Pooch. Play Alone Or Together-truthful and Efficient Routing in WirelessAd Hoc Networks with Selfish Nodes[C]//Proceedings of the IEEE InternationalConference on Mobile Ad-hoc and Sensor Systems. 2004:457–465.
    87 Y. Wang, V. Giruka, M. Singhal. Truthful Multipath Routing for Ad Hoc Net-works with Selfish Nodes[J]. Journal of Parallel and Distributed Computing, 2008,68(6):778–789.
    88 M. Marina, S. Das. Ad Hoc On-demand Multipath Distance Vector Routing[J].Wireless Communications and Mobile Computing, 2006, 6(7):969–988.
    89 T. Cormen, C. Leiserson, R. Rivest, et al.算法导论(影印版)[M].高等教育出版社.
    90 J. Hershberger, S. Suri. Vickrey Prices and Shortest Paths: What Is an EdgeWorth?[C]//Proceedings of the 42nd IEEE Symposium on Foundations of Com-puter Science. 2001:252–259.
    91 J. Hershberger, S. Suri, A. Bhosle. On the Difficulty of some Shortest Path Prob-lems[J]. ACM Transactions on Algorithms (TALG), 2007, 3(1).
    92 M. Pietro. A Survey of Computational Economics Applied to Computer Net-works[R]. Tech. rep., Institut Eurecom, 2006.
    93 C. Papadimitriou. Algorithms, Games, and the Internet[C]//Proceedings of thethirty-third annual ACM symposium on Theory of computing. 2001:749–753.
    94 M. Felegyhazi, J. Hubaux, L. Buttyan. Nash Equilibria of Packet ForwardingStrategies in Wireless Ad Hoc Networks[J]. IEEE Transactions on Mobile Com-puting, 2006, 5(5):463–476.
    95 V. Srivastava, J. Neel, A. MacKenzie, et al. Using Game Theory to AnalyzeWireless Ad Hoc Networks[J]. IEEE Communications Surveys & Tutorials, 2005,7(4):46–56.
    96 Y. Yoo, D. Agrawal. Why Does It Pay to Be Selfish in a Manet?[J]. IEEE WirelessCommunications, 2006, 13(6):87–97.
    97 N. Nisan, A. Ronen. Algorithmic Mechanism Design (extended Ab-stract)[C]//Proceedings of the thirty-first annual ACM symposium on Theory ofcomputing. 1999:129–140.
    98 J. Feigenbaum, S. Shenker. Distributed Algorithmic Mechanism Design: RecentResults and Future Directions[C]//Proceedings of the 6th international workshopon Discrete algorithms and methods for mobile computing and communications.2002:1–13.
    99 J. Feigenbaum, C. Papadimitriou, R. Sami, et al. A Bgp-based Mechanism forLowest-cost Routing[J]. Distributed Computing, 2005, 18(1):61–72.
    100 J. Feigenbaum, M. Schapira. Incentive-compatible Interdomain Rout-ing[C]//Proceedings of the 7th ACM conference on Electronic commerce.2006:130–139.
    101 D. Parkes, J. Shneidman. Distributed Implementations of Vickrey-clarke-grovesMechanisms[C]//Proceedings of the Third International Joint Conference on Au-tonomous Agents and Multiagent Systems-Volume 1. 2004:261–268.
    102 A. Mu’alem. On Decentralized Incentive Compatible Mechanisms for Partially In-formed Environments[C]//Proceedings of the ACM Conference on Electronic Com-merce (EC). 2005.
    103 A. Karlin, D. Kempe. Beyond Vcg: Frugality of Truthful Mecha-nisms[C]//Proceedings of 46th Annual IEEE Symposium on Foundations of Com-puter Science. 2005:615–624.
    104 A. Archer, E′. Tardos. Frugal Path Mechanisms[J]. ACM Transactions on Algo-rithms (TALG), 2007, 3(1).
    105 S. Laniepce, J. Demerjian, A. Mokhtari. Cooperation Monitoring Issues in AdHoc Networks[C]//Proceedings of the 2006 international conference on Wirelesscommunications and mobile computing. 2006:695–700.
    106 Y. Hu, A. Perrig, D. Johnson. Wormhole Detection in Wireless Ad Hoc Net-works[R]. Tech. rep., Department of Computer Science, Rice University, 2002.
    107 Levente, B. and Jean-Pierre, H. Security and Cooperation in Wireless Net-works[M]. Cambridge, UK: Cambridge University Press, 2007.
    108 T. Camp, J. Boleng, V. Davies. A Survey of Mobility Models for Ad Hoc NetworkResearch[J]. Wireless Communications and Mobile Computing, 2002, 2(5):483–502.
    109 M. Corson, S. Papademetriou, P. Papadopoulos, et al. An Internet Manet Encapsu-lation Protocol (imep) Specification[R]. Tech. rep., Internet-Draft, draft-ietf-manet-imep-spec-01. txt, 1998.
    110 D. Parkes. Iterative Combinatorial Auctions: Achieving Economic and Computa-tional Efficiency[D]University of Pennsylvania, 2001.
    111 R. Dash, N. Jennings, D. Parkes. Computational-mechanism Design: A Call toArms[J]. IEEE intelligent systems, 2003, 18(6):40–47.
    112 N. Nisan. Introduction to Mechanism Design (for Computer Scientists)[J]. Algo-rithmic Game Theory, 2007:209–242.
    113 S. Doshi, S. Bhandare, T. Brown. An On-demand Minimum Energy Routing Pro-tocol for a Wireless Ad Hoc Network[J]. ACM Mobile Computing and Communi-cations Review, 2002, 6(1).
    114 N. Nisan. Algorithmic Game Theory[M]. Cambridge Univ Press, 2007.
    115罗云峰.博弈论教程[M].北京:清华大学出版社北京交通大学出版社, 2007.
    116 Fudenberg.D, Tirole.J.博弈论[M].北京:中国人民大学出版社, 2002.
    117 M. Osborne. An Introduction to Game Theory[M]. Oxford University Press NewYork, 2004.
    118 S. Zhong, L. Li, Y. Liu, et al. On Designing Incentive-compatible Routing andForwarding Protocols in Wireless Ad-hoc Networks[J]. Wireless Networks, 2007,13(6):799–816.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700