By Topic

Protocols for stimulating packet forwarding in wireless ad hoc networks [Security and Privacy in Emerging Wireless Networks]

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)

A wireless ad hoc network is a self-organized wireless network without centralized infrastructure. In such a network, nodes rely on each other to forward packets to remote destinations. A threat to such multihop transmission is posed by selfish nodes, which may drop others' packets to save their own bandwidth and battery life. Therefore, stimulating packet forwarding is a fundamental problem for wireless ad hoc networks. Most solutions proposed so far are either reputation-based or credit-exchange-based, which are fundamentally context-based solutions. They need to accurately identify selfish behaviors, securely maintain the context, and appropriately punish selfish nodes. These requirements are difficult to satisfy. Recently a solution from a new angle is proposed: a context-free protocol that does not rely on observation and selfish behavior detection. Given a path, a context-free protocol can transmit packets through it without knowing whether the intermediate nodes are selfish or not. It can get rid of all troubles caused by establishing and maintaining the context, and has some significant advantages over context-based solutions. In this article we first provide an overview of traditional context-based solutions, then introduce the recently proposed context-free solution, and finally analyze them extensively.

Published in:

IEEE Wireless Communications  (Volume:17 ,  Issue: 5 )