DOI QR코드

DOI QR Code

A Generous Cooperative Routing Protocol for Vehicle-to-Vehicle Networks

  • Li, Xiaohui (College of Computer Science, Sichuan University) ;
  • Wang, Junfeng (College of Computer Science, Sichuan University)
  • Received : 2016.02.11
  • Accepted : 2016.08.02
  • Published : 2016.11.30

Abstract

In vehicle-to-vehicle (V2V) networks, where selfishness degrades node activity, countermeasures for collaboration enforcement must be provided to enable application of a sage and efficient network environment. Because vehicular networks feature both high mobility and various topologies, selfish behavior judgment and establishment of a stable routing protocol become intensely challenging. In this paper, a two-phase-based generous cooperative routing protocol (called GEC) is presented for V2V networks to provide resistance to selfishness. To detect selfish behaving vehicles, a packet forwarding watchdog and an average connection rate based on the multipath weight method are used, where evidence is gathered from different watchdogs. Then, multihop relay decisions are made using a generous cooperative algorithm based on game theory. Finally, through buffering of the multiple end-to-end paths and judicious choice of optimal cooperative routes, route maintenance phase is capable of dealing with congestion and rapidly exchanging traffic. Specifically, it is proved that the GEC is theoretically subgame perfect. Simulation results show that for V2V networks with inherently selfish nodes, the proposed method isolates uncooperative vehicles and is capable of accommodating both the mobility and congestion circumstances by facilitating information dissemination and reducing end-to-end delay.

Keywords

References

  1. S. Zeadally, R. Hunt, Y. S. Chen, A. Irwin and A. Hassan, "Vehicular ad hoc networks (VANETS): status, results, and challenges," Telecommunication Systems, vol. 50, no. 4, pp. 217-241, December, 2012. https://doi.org/10.1007/s11235-010-9400-5
  2. Kuk-Hyun Cho, Min-Woo Ryu, "A Survey of Greedy Routing Protocols for Vehicular Ad Hoc Networks," Smart Computing Review, Vol. 2, No. 2, pp.125-137, April 2012.
  3. A. Jesudoss, S. K. Raja and A. Sulaiman, "Stimulating truth-telling and cooperation among nodes in VANETs through payment and punishment scheme," Ad Hoc Networks, vol. 24, pp. 250-263, January, 2015. https://doi.org/10.1016/j.adhoc.2014.08.018
  4. Evangelia Kokolaki, Georgios Kollias and Maria Papadaki, "Opportunistically-assisted parking search: a story of free riders, selfish liars and bona fide mules," in Proc. of IEEE 10th Annual. Conf. on Wireless On-demand Network Systems and Services, pp.17-24, March 18-20, 2013.
  5. R. I. Ciobanu, C. Dobre, M. Dascalu, S. Trausan-Matu and V. Cristea, "Sense: A collaborative selfish node detection and incentive mechanism for opportunistic networks," Journal of Network and Computer Applications, vol. 41, pp. 240-249, May, 2014. https://doi.org/10.1016/j.jnca.2014.01.009
  6. O. A. Wahab, H. Otrok and A. Mourad, "A cooperative watchdog model based on Dempster-Shafer for detecting misbehaving vehicles," Computer Communications, vol. 41, pp. 43-54, March, 2014. https://doi.org/10.1016/j.comcom.2013.12.005
  7. S. Zhong, J. Chen, and Y.R. Yang, "Sprite: A Simple Cheat-Proof, Credit-Based System for Mobile Ad Hoc Networks," in Proc. of 22nd Annual Joint Conf. of the IEEE Computer and Communications, INFOCOM 2003, vol.3, pp. 1987-1997, March 30-April 3, 2003.
  8. L. Anderegg and S. Eidenbenz, "Ad Hoc-VCG: A Truthful and Cost-Efficient Routing Protocol for Mobile Ad Hoc Networks with Selfish Agents," in Proc. of the 9th Annual Int. Conf. on Mobile Computing and Networking, pp.245-259, September 14-19, 2003.
  9. H. Janzadeh, K. Fayazbakhsh, M. Dehghan, and M.S. Fallah, "A Secure Credit-Based Cooperation Stimulating Mechanism for MANETs Using Hash Chains," Future Generation Computer Systems, vol. 25, no.8, pp. 926-934, September, 2009. https://doi.org/10.1016/j.future.2008.12.002
  10. Q. Lian, Y. Peng, M. Yang, Z. Zhang, Y. Dai and X. Li, "Robust incentives via multilevel tit-for-tat," Concurrency Computat.: Pract. Exper, vol. 20, no. 2, pp. 167-178, May, 2007.
  11. S. Marti, T.J. Giuli, K. Lai and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. of the 6th Annual Int. Conf. on Mobile Computing and Networking, vol. 4, pp. 255-265, August 6 - 11, 2000.
  12. P. Michiardi and R. Molva, "Core: A Collaborative Reputation mechanism to enforce node cooperation in Mobile Ad Hoc Networks," in Proc. of the 6th IFIP Communication and Multimedia Security Conference, pp. 107-121, September 26-27, 2002.
  13. S. Buchegger and J.-Y.L. Boudec, "Performance analysis of the confidant protocol," in Proc. of the 3rd ACM Int. Symposium on Mobile Ad Hoc Networking & Computing, pp. 226-236, June 9-11, 2002.
  14. S. Bansal and M. Baker, "Observation-based cooperation enforcement in ad hoc networks," Technical Report, Computer Science Department, Stanford University, 2003.
  15. D.B. Johnson and D.A. Maltz, "Dynamic source routing in ad hoc wireless networks," Mobile Computing, vol. 353, pp. 153-181, 1996.
  16. O. A. Wahab, O. Hadi, and M. Azzam, "A Dempster-Shafer Based Tit-for-Tat Strategy to Regulate the Cooperation in VANET Using QoS-OLSR Protocol," Wireless Personal Communications, vol. 75, no. 3, pp. 1635-1667, April, 2014. https://doi.org/10.1007/s11277-013-1443-y
  17. A. E. Khatib, A. Mourada, H. Otrokb, O. A. Wahabc, J. Bentahar, "A Cooperative Detection Model Based on Artificial Neural Network for VANET QoS-OLSR Protocol," in Proc. of 15' IEEE Int. Conf. on Ubiquitous Wireless Broadband, pp. 1-5, October 4-7, 2015.
  18. V. N. G. J. Soares and J. J. P. C. Rodrigues, "7. Cooperation in DTN-Based Network Architectures," Cooperative Networking, Wiley, pp. 101-115, 2011.
  19. J. Dias, J. Rodrigues, L. Shu, and S. Ullah, "Performance evaluation of a cooperative reputation system for vehicular delay-tolerant networks," EURASIP Journal on Wireless Communications and Networking, vol. 2014, no. 1, pp. 1-13, May, 2014. https://doi.org/10.1186/1687-1499-2014-1
  20. J. Jude Kline, "Basic game theory," Australian Economic Review, vol. 33, no. 4, pp. 381-387, December, 2000. https://doi.org/10.1111/1467-8462.00170
  21. L. A. Imhof, D. Fudenberg and M. A. Nowak, "Tit-for-tat or win-stay, lose-shift?" Journal of Theoretical Biology, vol. 247, no. 3, pp. 574-580, August, 2007. https://doi.org/10.1016/j.jtbi.2007.03.027
  22. F. Milan, J. J. Jaramillo and R. Srikant, "Achieving cooperation in multihop wireless networks of selfish nodes," in Proc. of 06' Workshop on Game Theory for Communications and Networks, October 14, 2006.
  23. R. Leung, J. Liu, E. Poon, A. L. C. Chan and B. Li, "MP-DSR: a QoS-aware multi-path dynamic source routing protocol for wireless ad-hoc networks," in Proc. of 26th Annual IEEE Conf. on Local Computer Networks, pp. 132-141, November 14-16, 2001.
  24. K. Fall and K. Varadhan, "The network simulator (ns-2)," 2007.