【正文】
ategies in wireless ad hoc networks, IEEE Transactions on Mobile Computing, 2006, 5(5):463475[14]. Zapata ., Asokan N. , Securing ad hoc routing protocols, Proceedings of the 3rd Workshop on Wireless Security, New York: ACM Press, 2002, 110[15]. Newsome J., Shi E., Song D., Perrig A., The Sybil attack in sensor networks: analysis and defenses, Proceedings of International Symposium on Information Processing in Sensor Networks(IPSN), New York: ACM Press, 2004, 259268[16]. Li ., Li J., Liu P., Chen ., Ondemand publickey management for mobile Ad hoc networks, Wireless Communications and Mobile Computing, 2006, 6(3): 295306[17]. Urpi A., Bonuccelli M., Giordano S., Modeling cooperation in mobile ad hoc networks: a formal description of selfishness, Proceedings of Modeling and Optimization in Mobile, Ad hoc and Wireless Networks, SophiaAntipolis: IEEE Press, 2003[18]. Myerson R. B., Game Theory, Analysis of Conflict, Chinese Economy Press, 2001[19]. Liu K., Deng J., Varshney P. K., Balakrishnan K., An acknowledgmentbased approach for the detection of routing misbehavior in MANETs, IEEE Transactions on Mobile Computing, 2007, 6(5): 488501[20]. Zhu , Bao F., Li ., Compact stimulation mechanism for routing discovery protocols in civilian ad hoc networks, Proceeding of IFIP International Federation for Information Processing, 2005, LNCS 3677: 200209 黃蕾,女,1972年生,博士研究生,高工,研究方向包括ad hoc網(wǎng)絡(luò)合作激勵,衛(wèi)星網(wǎng)絡(luò)擁塞控制等Huang Lei, born in 1972, . candidate,senior engineer. Her research interests include cooperation stimulation in ad hoc networks, congestion control in satellite network, etc.劉立祥,男,1973年生,博士,副研究員,研究方向包括ad hoc網(wǎng)絡(luò)、衛(wèi)星網(wǎng)絡(luò)路由協(xié)議、新型網(wǎng)絡(luò)體系結(jié)構(gòu)、網(wǎng)絡(luò)控制等Liu Lixiang, born in 1973, .,associate researcher. His research interests include ad hoc network, routing protocol in satellite network, novel network architecture, network control, etc.BackgroundMobile adhoc networks are basically peer to peer multihop wireless networks. Key networking tasks must be carried out on the base of mutual cooperation among these nodes. If these nodes belong to different profitmaximizing entities, for example, in a mercial scenario, cooperation assumption doesn’t hold. To save the resources such as energy, a selfish node may refuse to relay the packets for others.How to stimulate selfish nodes to cooperate became a hot spot in ad hoc network research munity recently. Current studies proposed a lot of schemes to detect selfish dropping in data forwarding stage, such as watchdog or 2ACK. But it is easy to escape the detection of these schemes by just silent dropping control packets in route discovery stage. Because of the uncertainty in route discovery, it is hard to detect such kind of selfishness. This paper proposed a detection mechanism for silent dropping in route discovery based on the statistics of route control packet. Authors proved the effectiveness of the proposed algorithm to stimulate cooperation with the tools of game theory and by simulation. This research is partially supported by the advanced research foundation of Chinese Academy of Sciences under grant 9140A150301. 第一作者聯(lián)系方式:電話:13621230920Email:huangleiff@通信地址:北京中關(guān)村南四街四號軟件所通用軟件實(shí)驗(yàn)室 1000809 / 9