Presentation 2004/7/8
A Game Theorem-Based Approach to Avoid Malicious Nodes in Mobile Ad hoc Networks
Mingmei Li, Eiji Kamioka, Shigeki Yamada,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) In ubiquitous context of mobile ad hoc networks, all network functions must be performed by the nodes themselves. Whereas the bandwidth allocated per node decreases with the number of nodes increase, some nodes may be interested in higher bandwidth, in this case, they may intend not to relay packets for other nodes. If most nodes find it benefit for themselves, their sequacious actions may break down the whole network. We address this as malicious nodes problem. In this paper, our approach is based on game theory with noncooperation, i. e., there are conflicts for which the rules of a game do not specify any agreement or cooperation. We establish a simple malicious node game that models the bandwidth payoffs for the network and the nodes, define contribution rate (CR) and attack rate (AR) for the two strategies of each node, and then we show Nash equilibria exist in all-node strategy set. Finally we propose an algorithm that converges to a Nash equilibrium.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Malicious Nodes / Game theory / Pareto Optimal Point / Nash Equilibrium
Paper # MoMuC2004-35
Date of Issue

Conference Information
Committee MoMuC
Conference Date 2004/7/8(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Mobile Multimedia Communications(MoMuC)
Language ENG
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) A Game Theorem-Based Approach to Avoid Malicious Nodes in Mobile Ad hoc Networks
Sub Title (in English)
Keyword(1) Malicious Nodes
Keyword(2) Game theory
Keyword(3) Pareto Optimal Point
Keyword(4) Nash Equilibrium
1st Author's Name Mingmei Li
1st Author's Affiliation The Graduate University for Advance Studies()
2nd Author's Name Eiji Kamioka
2nd Author's Affiliation National Institute of Informatics
3rd Author's Name Shigeki Yamada
3rd Author's Affiliation National Institute of Informatics
Date 2004/7/8
Paper # MoMuC2004-35
Volume (vol) vol.104
Number (no) 189
Page pp.pp.-
#Pages 6
Date of Issue