Cooperative based tit-for-tat strategies to retaliate against greedy behavior in VANETs

被引:16
作者
Al-Terri, Doaa [1 ]
Otrok, Hadi [1 ,2 ]
Barada, Hassan [1 ]
Al-Qutayri, Mahmoud [1 ]
Al Hammadi, Yousof [1 ]
机构
[1] Khalifa Univ, Fac Engn, Abu Dhabi, U Arab Emirates
[2] Concordia Univ, CIISE, Montreal, PQ, Canada
关键词
CSMA/CA; MAC; Selfish nodes; VANETs; Tit-for-tat; Game theory; TIME MISBEHAVIOR DETECTION; GAME-THEORY; IEEE-802.11; MAC; BACKOFF;
D O I
10.1016/j.comcom.2017.02.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we address the problem of greediness in IEEE 802.11 CSMA/CA protocol in Vehicular Ad-hoc Networks (VANETs). In VANETs some nodes might misbehave by deviating from following the CSMA/CA standard medium access protocol, in order to increase their channel access probability. Such behavior may have a catastrophic impact on the network performance as it causes denial of service for the other cooperative nodes. To overcome such a problem, a motivational mechanism is needed to incentivize vehicles to comply with the protocol design in such distributed networks. Classical, Generous and Reputation based tit-for-tat strategies have been proposed to study the interaction among vehicles. However, these strategies are not able to enforce the cooperation since they rely on one-to-one monitoring that is not resilient to collisions. In this paper, we propose two collaborative-based tit-for-tat strategies that are identified as Group Reputation and Cooperative Detection strategies. Both strategies are able to improve the misbehavior detection decision and thus impose the MAC-layer cooperation in VANETs. In Group Reputation tit-for-tat strategy, the reputation is aggregated from the node's neighbors while in Cooperative Detection tit-for-tat strategy, a cooperative detection mechanism is proposed. These strategies are (1) immune to the ambiguous monitoring caused by collisions and (2) able to force the greedy nodes to cooperate under the threat of retaliation. Simulation results are conducted using NS-3 to demonstrate the performance of the proposed strategies compared to other strategies. Simulation results revealed that the two proposed strategies outperformed the other strategies in minimizing the effect of the interpretation errors and maximizing the throughput of the cooperative nodes. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:108 / 118
页数:11
相关论文
共 37 条
[1]   Enhancing IEEE 802.11 MAC in congested environments [J].
Aad, I ;
Ni, Q ;
Barakat, C ;
Turletti, T .
COMPUTER COMMUNICATIONS, 2005, 28 (14) :1605-1617
[2]   A game theoretical model for collaborative groups in social applications [J].
Al-Dhanhani, Ahmed ;
Mizouni, Rabeb ;
Otrok, Hadi ;
Al-Rubaie, Ahmad .
EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (11) :5056-5065
[3]   A comprehensive survey on vehicular Ad Hoc network [J].
Al-Sultan, Saif ;
Al-Doori, Moath M. ;
Al-Bayatti, Ali H. ;
Zedan, Hussien .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 37 :380-392
[4]  
Al-Terri D, 2015, INT WIREL COMMUN, P1352, DOI 10.1109/IWCMC.2015.7289279
[5]  
[Anonymous], 2006, EVOLUTION COOPERATIO
[6]  
Boyer Stephane, 2012, International Journal of Security and Networks, V7, P95
[7]   A survey on game theory applications in wireless networks [J].
Charilas, Dimitris E. ;
Panagopoulos, Athanasios D. .
COMPUTER NETWORKS, 2010, 54 (18) :3421-3430
[8]  
Chinipardaz M., 2013, COMPUTER NETWORKS DI, P23
[9]   GCW: A Game Theoretic Contention Window Adjustment Approach for IEEE 802.11 WLANs [J].
Ghazvini, Mahdieh ;
Movahhedinia, Naser ;
Jamshidi, Kamal .
WIRELESS PERSONAL COMMUNICATIONS, 2015, 83 (02) :1101-1130
[10]   Enhancing IEEE 802.11 random backoff in selfish environments [J].
Guang, Lei ;
Assi, Chadi M. ;
Benslimane, Abderrahim .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2008, 57 (03) :1806-1822