Modelo de confianza evolutivo para lograr cooperación emergente en redes ad-hoc a través de algoritmos genéticos
ilustraciones, gráficas, tablas
- Autores:
-
Vega Vega, Diego Alejandro
- Tipo de recurso:
- Fecha de publicación:
- 2021
- Institución:
- Universidad Nacional de Colombia
- Repositorio:
- Universidad Nacional de Colombia
- Idioma:
- spa
- OAI Identifier:
- oai:repositorio.unal.edu.co:unal/80614
- Palabra clave:
- 000 - Ciencias de la computación, información y obras generales
Local area networks (Computer networks)
Computer algorithms
Computer networks - design and construction
Redes de área local (Computadores)
Algoritmos (Computadores)
Redes de computadores - Diseño y construcción
Auto-organización
Cooperación
Confianza
Adaptación
Redes ad-hoc
Self-organization
Cooperation
Trust
Adaptation
Ad-hoc networks
- Rights
- openAccess
- License
- Reconocimiento 4.0 Internacional
id |
UNACIONAL2_13a245dc5f272ea528356560eaae6742 |
---|---|
oai_identifier_str |
oai:repositorio.unal.edu.co:unal/80614 |
network_acronym_str |
UNACIONAL2 |
network_name_str |
Universidad Nacional de Colombia |
repository_id_str |
|
dc.title.spa.fl_str_mv |
Modelo de confianza evolutivo para lograr cooperación emergente en redes ad-hoc a través de algoritmos genéticos |
dc.title.translated.eng.fl_str_mv |
Evolutionary trust model to achieve emergent cooperation in ad-hoc networks through genetic algorithms |
title |
Modelo de confianza evolutivo para lograr cooperación emergente en redes ad-hoc a través de algoritmos genéticos |
spellingShingle |
Modelo de confianza evolutivo para lograr cooperación emergente en redes ad-hoc a través de algoritmos genéticos 000 - Ciencias de la computación, información y obras generales Local area networks (Computer networks) Computer algorithms Computer networks - design and construction Redes de área local (Computadores) Algoritmos (Computadores) Redes de computadores - Diseño y construcción Auto-organización Cooperación Confianza Adaptación Redes ad-hoc Self-organization Cooperation Trust Adaptation Ad-hoc networks |
title_short |
Modelo de confianza evolutivo para lograr cooperación emergente en redes ad-hoc a través de algoritmos genéticos |
title_full |
Modelo de confianza evolutivo para lograr cooperación emergente en redes ad-hoc a través de algoritmos genéticos |
title_fullStr |
Modelo de confianza evolutivo para lograr cooperación emergente en redes ad-hoc a través de algoritmos genéticos |
title_full_unstemmed |
Modelo de confianza evolutivo para lograr cooperación emergente en redes ad-hoc a través de algoritmos genéticos |
title_sort |
Modelo de confianza evolutivo para lograr cooperación emergente en redes ad-hoc a través de algoritmos genéticos |
dc.creator.fl_str_mv |
Vega Vega, Diego Alejandro |
dc.contributor.advisor.spa.fl_str_mv |
Ortiz Triviño, Jorge Eduardo |
dc.contributor.author.spa.fl_str_mv |
Vega Vega, Diego Alejandro |
dc.contributor.researchgroup.spa.fl_str_mv |
TLÖN - Grupo de Investigación en Redes de Telecomunicaciones Dinámicas y Lenguajes de Programación Distribuidos |
dc.subject.ddc.spa.fl_str_mv |
000 - Ciencias de la computación, información y obras generales |
topic |
000 - Ciencias de la computación, información y obras generales Local area networks (Computer networks) Computer algorithms Computer networks - design and construction Redes de área local (Computadores) Algoritmos (Computadores) Redes de computadores - Diseño y construcción Auto-organización Cooperación Confianza Adaptación Redes ad-hoc Self-organization Cooperation Trust Adaptation Ad-hoc networks |
dc.subject.lemb.eng.fl_str_mv |
Local area networks (Computer networks) Computer algorithms Computer networks - design and construction |
dc.subject.lemb.spa.fl_str_mv |
Redes de área local (Computadores) Algoritmos (Computadores) Redes de computadores - Diseño y construcción |
dc.subject.proposal.spa.fl_str_mv |
Auto-organización Cooperación Confianza Adaptación Redes ad-hoc |
dc.subject.proposal.eng.fl_str_mv |
Self-organization Cooperation Trust Adaptation Ad-hoc networks |
description |
ilustraciones, gráficas, tablas |
publishDate |
2021 |
dc.date.accessioned.none.fl_str_mv |
2021-10-26T14:19:59Z |
dc.date.available.none.fl_str_mv |
2021-10-26T14:19:59Z |
dc.date.issued.none.fl_str_mv |
2021-09-15 |
dc.type.spa.fl_str_mv |
Trabajo de grado - Maestría |
dc.type.driver.spa.fl_str_mv |
info:eu-repo/semantics/masterThesis |
dc.type.version.spa.fl_str_mv |
info:eu-repo/semantics/acceptedVersion |
dc.type.content.spa.fl_str_mv |
Text |
dc.type.redcol.spa.fl_str_mv |
http://purl.org/redcol/resource_type/TM |
status_str |
acceptedVersion |
dc.identifier.uri.none.fl_str_mv |
https://repositorio.unal.edu.co/handle/unal/80614 |
dc.identifier.instname.spa.fl_str_mv |
Universidad Nacional de Colombia |
dc.identifier.reponame.spa.fl_str_mv |
Repositorio Institucional Universidad Nacional de Colombia |
dc.identifier.repourl.spa.fl_str_mv |
https://repositorio.unal.edu.co/ |
url |
https://repositorio.unal.edu.co/handle/unal/80614 https://repositorio.unal.edu.co/ |
identifier_str_mv |
Universidad Nacional de Colombia Repositorio Institucional Universidad Nacional de Colombia |
dc.language.iso.spa.fl_str_mv |
spa |
language |
spa |
dc.relation.references.spa.fl_str_mv |
Abdel-Halim, I T. ; Fahmy, H M A. ; Bahaa-Eldin, A M.: Agent-based trusted on-demand routing protocol for mobile ad-hoc networks. En: Wireless Networks 21 (2014), Nr. 2, p. 467–483 Anderegg, Luzi ; Eidenbenz, Stephan: Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. En: Proceedings of the 9th annual international conference on Mobile computing and networking, 2003, p. 245–259 Ashwin, M ; Kamalraj, S ; Azath, M: Weighted Clustering Trust Model for Mobile Ad Hoc Networks. En: Wireless Personal Communications 94 (2017), Nr. 4, p. 2203– 2212 Axelrod, Robert ; Hamilton, William D.: The evolution of cooperation. En: science 211 (1981), Nr. 4489, p. 1390–1396 Ayday, E ; Fekri, F: An Iterative Algorithm for Trust Management and Adversary Detection for Delay-Tolerant Networks. En: IEEE Transactions on Mobile Computing 11 (2012), Nr. 9, p. 1514–1531 Bansal, Sorav ; Baker, Mary: Observation-based cooperation enforcement in ad hoc networks. En: arXiv preprint cs/0307012 (2003) Bauer, Paul C.: Conceptualizing trust and trustworthiness. (2017) Bauer, Paul C. ; Keusch, Florian ; Kreuter, Frauke: Trust and cooperative behavior: Evidence from the realm of data-sharing. En: PloS one 14 (2019), Nr. 8, p. e0220115 Bisen, D ; Sharma, S: An enhanced performance through agent-based secure approach for mobile ad hoc networks. En: International Journal of Electronics 105 (2018), Nr. 1, p. 116–136 Buchegger, Sonja ; Le Boudec, Jean-Yves: Performance analysis of the CONFI- DANT protocol. En: Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing, 2002, p. 226–236 Chatterjee, P ; Sengupta, I ; Ghosh, S K.: STACRP: A secure trusted auction oriented clustering based routing protocol for MANET. En: Cluster Computing 15 (2012), Nr. 3, p. 303–320 Fadel, Etimad ; Gungor, Vehbi C. ; Nassef, Laila ; Akkari, Nadine ; Malik, MG A. ; Almasri, Suleiman ; Akyildiz, Ian F.: A survey on wireless sensor networks for smart grid. En: Computer Communications 71 (2015), p. 22–33 Fitzek, F.H.P. ; Katz, M.D.: Cooperation in wireless networks: Principles and applications: Real egoistic behavior is to cooperate! Springer, 2006. – 1–641 p.. – cited By 186 Friedman, Linda W. ; Friedman, Hershey H.: Analyzing simulation output using the bootstrap method. En: Simulation 64 (1995), Nr. 2, p. 95–100 Gera, P ; Garg, K ; Misra, M: Trust-based multi-path routing for enhancing data security in MANETs. En: International Journal of Network Security 16 (2014), Nr. 2, p. 102–111 Gershenson, Carlos ; Heylighen, Francis: When can we call a system self-organizing? En: European Conference on Artificial Life Springer, 2003, p. 606–614 Ghosekar, Pravin ; Katkar, Girish ; Ghorpade, Pradip: Mobile ad hoc networking: imperatives and challenges. En: IJCA Special issue on MANETs 3 (2010), p. 153–158 Hanbali, Ahmad ; Ibrahim, Mouhamad ; Simon, Vilmos ; Varga, Endre ; Carreras, Iacopo: A Survey of Message Diffusion Protocols in Mobile Ad Hoc Networks, 2008 Hardin, Garrett: The tragedy of the commons. En: science 162 (1968), Nr. 3859, p. 1243–1248 He, Qi ; Wu, Dapeng ; Khosla, Pradeep: SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks. En: 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No. 04TH8733) Vol. 2 IEEE, 2004, p. 825–830 Hegde, S B. ; Babu, B S. ; Venkataram, P: A Cognitive Theory-based Opportunistic Resource-Pooling Scheme for Ad hoc Networks. En: Journal of Intelligent Systems 26 (2017), Nr. 1, p. 47–68 Hilbe, Christian ; Šimsa, Štěpán ; Chatterjee, Krishnendu ; Nowak, Martin A.: Evolution of cooperation in stochastic games. En: Nature 559 (2018), Nr. 7713, p. 246–249 Jayanand, A ; Chenthil Kumaran, N: Trusted and authentication based routing security for MANET. En: International Journal of Applied Engineering Research 10 (2015), Nr. 1, p. 105–120 Katz, M. ; Fitzek, F.H.P. ; Lucani, D.E. ; Seeling, P.: Mobile clouds as the building blocks of shareconomy: Sharing resources locally and widely. En: IEEE Vehicular Technology Magazine 9 (2014), Nr. 3, p. 63–71 Li, W ; Parker, J ; Joshi, A: Security through collaboration and trust in MANETs. En: Mobile Networks and Applications 17 (2012), Nr. 3, p. 342–352 Loo, Jonathan ; Mauri, Jaime L. ; Ortiz, Jesus H.: Mobile ad hoc networks: current status and future trends. CRC Press, 2016 Mandhare, V V. ; Thool, V R. ; Manthalkar, R R.: QoS Routing enhancement using metaheuristic approach in mobile ad-hoc network. En: Computer Networks 110 (2016), p. 180–191. – ISSN 1389–1286 Mani, P ; Kamalakkannan, P: Conviction based packet promotion scheme for efficient detection of selfish nodes in mobile Ad Hoc networks. En: International Review on Computers and Software 9 (2014), Nr. 2, p. 212–218 Marias, Giannis F. ; Georgiadis, Panagiotis ; Flitzanis, D ; Mandalas, K: Cooperation enforcement schemes for MANETs: A survey. En: Wireless Communications and Mobile Computing 6 (2006), Nr. 3, p. 319–332 Mejia, Angela M.: Evolución genética de estrategias para modelos de confianza en redes móviles ad-hoc basados en teoría de juegos. 2010. – unpublished thesis Mejia, M ; Peña, N ; Muñoz, J L. ; Esparza, O ; Alzate, M A.: A game theoretic trust model for on-line distributed evolution of cooperation inMANETs. En: Journal of Network and Computer Applications 34 (2011), Nr. 1, p. 39–51 Mertens, J-F ; Neyman, Abraham: Stochastic games. En: International Journal of Game Theory 10 (1981), Nr. 2, p. 53–66 Michiardi, Pietro ; Molva, Refik: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. En: Advanced communications and multimedia security. Springer, 2002, p. 107–121 Myerson, Roger B.: Game theory. Harvard university press, 2013 Ninu, S B. ; Behin Sam, S: A collaborative Intrusion Detection System for manet using data mining technique. En: ARPN Journal of Engineering and Applied Sciences 13 (2018), Nr. 14, p. 4387–4392 Ochoa, Gabriela: Setting the mutation rate: Scope and limitations of the 1/L heuristic. En: Proceedings of the 4th Annual Conference on Genetic and Evolutionary Computation, 2002, p. 495–502 Pariselvam, S ; Parvathi, R M S.: Trust based security mechanism for service discovery in MANET. En: Journal of Theoretical and Applied Information Technology 56 (2013), Nr. 2, p. 226–234 Pouyan, A A. ; Yadollahzadeh Tabari, M: FPN-SAODV: using fuzzy petri nets for securing AODV routing protocol in mobile Ad hoc network. En: International Journal of Communication Systems 30 (2017), Nr. 1 Rajeshwar, J ; Narsimha, G: Secure way routing protocol for mobile ad hoc network. En: Wireless Networks 23 (2017), Nr. 2, p. 345–354 Rapoport, Anatol ; Chammah, Albert M. ; Orwant, Carol J.: Prisoner’s dilemma: A study in conflict and cooperation. Vol. 165. University of Michigan press, 1965 Raychaudhuri, Dipankar ; Gerla, Mario: Emerging wireless technologies and the future mobile internet. Cambridge University Press, 2011 Raychaudhuri, Dipankar ; Mandayam, Narayan B.: Frontiers of wireless and mobile communications. En: Proceedings of the IEEE 100 (2012), Nr. 4, p. 824–840 Reddy, V B. ; Venkataraman, S ; Negi, A: A dynamic trust evolution model for MANETs based on mobility. En: International Journal of Ad Hoc and Ubiquitous Computing 28 (2018), Nr. 4, p. 230–246 Roughgarden, Tim: Algorithmic game theory. En: Communications of the ACM 53 (2010), Nr. 7, p. 78–86 Saha, H N. ; Singh, R ; Bhattacharyya, D ; Banerjee, P K.: Modified Fidelity Based On-Demand Secure (MFBOD) Routing Protocol in Mobile Ad-Hoc Network. En: Foundations of Computing and Decision Sciences 40 (2015), Nr. 4, p. 267–298 Shannon, Claude E.: A mathematical theory of communication. En: ACM SIGMO- BILE mobile computing and communications review 5 (2001), Nr. 1, p. 3–55 Sridhar, S ; Nagaraju, V ; Bapu, B R T. ; Shankar, R ; Anitha, R: Trusted and optimized routing in mobile ad-hoc networks emphasizing quality of service. En: Applied Mathematics and Information Sciences 12 (2018), Nr. 3, p. 655–663 Thorat, S A. ; Kulkarni, P J.: Opportunistic Routing in Presence of Selfish Nodes for MANET. En: Wireless Personal Communications 82 (2015), Nr. 2, p. 689–708 Tonguz, Ozan K. ; Ferrari, Gianluigi: A communication-theoretic approach to ad hoc wireless networking. En: 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks Vol. 2 IEEE, 2006, p. 715–722 Vega, Diego A. ; Ospina, Juan P. ; Latorre, Julian F. ; Ortiz, Jorge E.: An adaptive trust model for achieving emergent cooperation in ad hoc networks. En: Current Trends in Semantic Web Technologies: Theory and Practice. Springer, 2019, p. 85–100 Vekaria, Kanta ; Clack, Chris: Selective crossover in genetic algorithms: An empirical study. En: International Conference on Parallel Problem Solving from Nature Springer, 1998, p. 438–447 Wooldridge, Michael: An introduction to multiagent systems. John Wiley & Sons, 2009 Yang, Hao ; Shu, James ; Meng, Xiaoqiao ; Lu, Songwu: SCAN: self-organized network-layer security in mobile ad hoc networks. En: IEEE Journal on Selected Areas in Communications 24 (2006), Nr. 2, p. 261–273 Zhang, Qing ; Yu, Ting ; Irwin, Keith: A Classification Scheme for Trust Functions in Reputation-Based Trust Management. En: ISWC Workshop on Trust, Security, and Reputation on the Semantic Web Vol. 127 Citeseer, 2004 Zhang, Yujun ; Yan, Tan ; Tian, Jie ; Hu, Qi ; Wang, Guiling ; Li, Zhongcheng: TOHIP: A topology-hiding multipath routing protocol in mobile ad hoc networks. En: Ad Hoc Networks 21 (2014), p. 109–122. – ISSN 1570–8705 Zhong, Sheng ; Chen, Jiang ; Yang, Yang R.: Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. En: IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No. 03CH37428) Vol. 3 IEEE, 2003, p. 1987–1997 |
dc.rights.coar.fl_str_mv |
http://purl.org/coar/access_right/c_abf2 |
dc.rights.license.spa.fl_str_mv |
Reconocimiento 4.0 Internacional |
dc.rights.uri.spa.fl_str_mv |
http://creativecommons.org/licenses/by/4.0/ |
dc.rights.accessrights.spa.fl_str_mv |
info:eu-repo/semantics/openAccess |
rights_invalid_str_mv |
Reconocimiento 4.0 Internacional http://creativecommons.org/licenses/by/4.0/ http://purl.org/coar/access_right/c_abf2 |
eu_rights_str_mv |
openAccess |
dc.format.extent.spa.fl_str_mv |
xvi, 57 páginas |
dc.format.mimetype.spa.fl_str_mv |
application/pdf |
dc.publisher.spa.fl_str_mv |
Universidad Nacional de Colombia |
dc.publisher.program.spa.fl_str_mv |
Bogotá - Ingeniería - Maestría en Ingeniería - Ingeniería de Sistemas y Computación |
dc.publisher.department.spa.fl_str_mv |
Departamento de Ingeniería de Sistemas e Industrial |
dc.publisher.faculty.spa.fl_str_mv |
Facultad de Ingeniería |
dc.publisher.place.spa.fl_str_mv |
Bogotá, Colombia |
dc.publisher.branch.spa.fl_str_mv |
Universidad Nacional de Colombia - Sede Bogotá |
institution |
Universidad Nacional de Colombia |
bitstream.url.fl_str_mv |
https://repositorio.unal.edu.co/bitstream/unal/80614/3/license.txt https://repositorio.unal.edu.co/bitstream/unal/80614/4/1015453545.2021.pdf https://repositorio.unal.edu.co/bitstream/unal/80614/5/1015453545.2021.pdf.jpg |
bitstream.checksum.fl_str_mv |
8153f7789df02f0a4c9e079953658ab2 46cd227e225bdbc4f17679e5b6ce4226 5d9554142dd7fcc2054e850a1a53e3de |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 MD5 |
repository.name.fl_str_mv |
Repositorio Institucional Universidad Nacional de Colombia |
repository.mail.fl_str_mv |
repositorio_nal@unal.edu.co |
_version_ |
1814089668778524672 |
spelling |
Reconocimiento 4.0 Internacionalhttp://creativecommons.org/licenses/by/4.0/info:eu-repo/semantics/openAccesshttp://purl.org/coar/access_right/c_abf2Ortiz Triviño, Jorge Eduardod9ea1d3c2dfb7b6f0ffa170fad3e2d14Vega Vega, Diego Alejandro880dea3c4818a94086dd7ce1eaa8a224TLÖN - Grupo de Investigación en Redes de Telecomunicaciones Dinámicas y Lenguajes de Programación Distribuidos2021-10-26T14:19:59Z2021-10-26T14:19:59Z2021-09-15https://repositorio.unal.edu.co/handle/unal/80614Universidad Nacional de ColombiaRepositorio Institucional Universidad Nacional de Colombiahttps://repositorio.unal.edu.co/ilustraciones, gráficas, tablasEn esta tesis, se propone un modelo evolutivo para interacciones de agentes en redes ad-hoc. Para esto, primero se hizo una revisión general sobre los diferentes tipos de modelos existentes en la literatura, con el fin de elegir un modelo en función de su pertinencia. El modelo escogido utiliza algoritmos genéticos complementados con juegos estocásticos, que se espera que ofrezcan un comportamiento adaptativo y dinámico. A continuación, se diseñaron las simulaciones con el fin de involucrar la naturaleza de las redes ad-hoc, donde se demostró que los algoritmos genéticos son capaces de adaptarse a la red, pero el proceso toma 1.000 interacciones para alcanzar indicadores favorables. En consecuencia, se propuso la inclusión de juegos estocásticos, los cuales alcanzan los mismos indicadores con solo 250 interacciones. Este resultado evidencia las ventajas del modelo propuesto. Finalmente, se realizó la implementación de una prueba piloto sobre una red ad-hoc real, validando el comportamiento de las simulaciones. La principal contribución de este trabajo es el modelo adaptativo, que además presenta una mejora en la velocidad de adaptación en entornos adversos en comparación con trabajos encontrados en la literatura. (Texto tomado de la fuente).This thesis proposes an evolutional model for agent interactions in ad-hoc networks. For this purpose, an overview is presented of the different types of existing models in the literature, in order to choose a model based on its relevance to the objective. The choosen model uses genetic algorithms improved by including stochastic games that are expected to offer an adaptative and dynamic behavior. After defining the model to be studied, the simulations were designed to involve the nature of ad-hoc networks. The simulations show that the genetic algorithms are able to adapt to the network, but the process takes 1.000 interactions to reach favorable indicators. In consecuence, the inclusion of stochastic games is proposed. With this improvement, the algorithm reaches the same indicators with only 250 interactions. This result evidences the advantages of the model proposed. Finally, the implementation in a real ad-hoc network showed results that validate the behavior observed in the simulations. The main contribution of this work is the adaptative model that also presents an improvement in the velocity of adaptation in adverse environments in comparison with previous works in the literature.Esta tesis de maestría se sustentó el 15 de Septiembre de 2021 a las 10:00 am, y fue evaluada por los siguientes jurados: Luis Fernando Niño Vásquez (Ph.D.) Universidad Nacional de Colombia Departamento de ingeniería de sistemas e industrial Jeisson Andrés Vergara Vargas (Ph.D.) Universidad Nacional de Colombia Departamento de ingeniería de sistemas e industrialMaestríaMagíster en Ingeniería - Ingeniería de Sistemas y ComputaciónSimulación basada en agentesComputación aplicadaTesis presentada como requisito parcial para optar al título de: Magister en Ingeniería de Sistemas y ComputaciónDepartamento de Ingeniería de Sistemas e Industrialxvi, 57 páginasapplication/pdfspaUniversidad Nacional de ColombiaBogotá - Ingeniería - Maestría en Ingeniería - Ingeniería de Sistemas y ComputaciónDepartamento de Ingeniería de Sistemas e IndustrialFacultad de IngenieríaBogotá, ColombiaUniversidad Nacional de Colombia - Sede Bogotá000 - Ciencias de la computación, información y obras generalesLocal area networks (Computer networks)Computer algorithmsComputer networks - design and constructionRedes de área local (Computadores)Algoritmos (Computadores)Redes de computadores - Diseño y construcciónAuto-organizaciónCooperaciónConfianzaAdaptaciónRedes ad-hocSelf-organizationCooperationTrustAdaptationAd-hoc networksModelo de confianza evolutivo para lograr cooperación emergente en redes ad-hoc a través de algoritmos genéticosEvolutionary trust model to achieve emergent cooperation in ad-hoc networks through genetic algorithmsTrabajo de grado - Maestríainfo:eu-repo/semantics/masterThesisinfo:eu-repo/semantics/acceptedVersionTexthttp://purl.org/redcol/resource_type/TMAbdel-Halim, I T. ; Fahmy, H M A. ; Bahaa-Eldin, A M.: Agent-based trusted on-demand routing protocol for mobile ad-hoc networks. En: Wireless Networks 21 (2014), Nr. 2, p. 467–483Anderegg, Luzi ; Eidenbenz, Stephan: Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. En: Proceedings of the 9th annual international conference on Mobile computing and networking, 2003, p. 245–259Ashwin, M ; Kamalraj, S ; Azath, M: Weighted Clustering Trust Model for Mobile Ad Hoc Networks. En: Wireless Personal Communications 94 (2017), Nr. 4, p. 2203– 2212Axelrod, Robert ; Hamilton, William D.: The evolution of cooperation. En: science 211 (1981), Nr. 4489, p. 1390–1396Ayday, E ; Fekri, F: An Iterative Algorithm for Trust Management and Adversary Detection for Delay-Tolerant Networks. En: IEEE Transactions on Mobile Computing 11 (2012), Nr. 9, p. 1514–1531Bansal, Sorav ; Baker, Mary: Observation-based cooperation enforcement in ad hoc networks. En: arXiv preprint cs/0307012 (2003)Bauer, Paul C.: Conceptualizing trust and trustworthiness. (2017)Bauer, Paul C. ; Keusch, Florian ; Kreuter, Frauke: Trust and cooperative behavior: Evidence from the realm of data-sharing. En: PloS one 14 (2019), Nr. 8, p. e0220115Bisen, D ; Sharma, S: An enhanced performance through agent-based secure approach for mobile ad hoc networks. En: International Journal of Electronics 105 (2018), Nr. 1, p. 116–136Buchegger, Sonja ; Le Boudec, Jean-Yves: Performance analysis of the CONFI- DANT protocol. En: Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing, 2002, p. 226–236Chatterjee, P ; Sengupta, I ; Ghosh, S K.: STACRP: A secure trusted auction oriented clustering based routing protocol for MANET. En: Cluster Computing 15 (2012), Nr. 3, p. 303–320Fadel, Etimad ; Gungor, Vehbi C. ; Nassef, Laila ; Akkari, Nadine ; Malik, MG A. ; Almasri, Suleiman ; Akyildiz, Ian F.: A survey on wireless sensor networks for smart grid. En: Computer Communications 71 (2015), p. 22–33Fitzek, F.H.P. ; Katz, M.D.: Cooperation in wireless networks: Principles and applications: Real egoistic behavior is to cooperate! Springer, 2006. – 1–641 p.. – cited By 186Friedman, Linda W. ; Friedman, Hershey H.: Analyzing simulation output using the bootstrap method. En: Simulation 64 (1995), Nr. 2, p. 95–100Gera, P ; Garg, K ; Misra, M: Trust-based multi-path routing for enhancing data security in MANETs. En: International Journal of Network Security 16 (2014), Nr. 2, p. 102–111Gershenson, Carlos ; Heylighen, Francis: When can we call a system self-organizing? En: European Conference on Artificial Life Springer, 2003, p. 606–614Ghosekar, Pravin ; Katkar, Girish ; Ghorpade, Pradip: Mobile ad hoc networking: imperatives and challenges. En: IJCA Special issue on MANETs 3 (2010), p. 153–158Hanbali, Ahmad ; Ibrahim, Mouhamad ; Simon, Vilmos ; Varga, Endre ; Carreras, Iacopo: A Survey of Message Diffusion Protocols in Mobile Ad Hoc Networks, 2008Hardin, Garrett: The tragedy of the commons. En: science 162 (1968), Nr. 3859, p. 1243–1248He, Qi ; Wu, Dapeng ; Khosla, Pradeep: SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks. En: 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No. 04TH8733) Vol. 2 IEEE, 2004, p. 825–830Hegde, S B. ; Babu, B S. ; Venkataram, P: A Cognitive Theory-based Opportunistic Resource-Pooling Scheme for Ad hoc Networks. En: Journal of Intelligent Systems 26 (2017), Nr. 1, p. 47–68Hilbe, Christian ; Šimsa, Štěpán ; Chatterjee, Krishnendu ; Nowak, Martin A.: Evolution of cooperation in stochastic games. En: Nature 559 (2018), Nr. 7713, p. 246–249Jayanand, A ; Chenthil Kumaran, N: Trusted and authentication based routing security for MANET. En: International Journal of Applied Engineering Research 10 (2015), Nr. 1, p. 105–120Katz, M. ; Fitzek, F.H.P. ; Lucani, D.E. ; Seeling, P.: Mobile clouds as the building blocks of shareconomy: Sharing resources locally and widely. En: IEEE Vehicular Technology Magazine 9 (2014), Nr. 3, p. 63–71Li, W ; Parker, J ; Joshi, A: Security through collaboration and trust in MANETs. En: Mobile Networks and Applications 17 (2012), Nr. 3, p. 342–352Loo, Jonathan ; Mauri, Jaime L. ; Ortiz, Jesus H.: Mobile ad hoc networks: current status and future trends. CRC Press, 2016Mandhare, V V. ; Thool, V R. ; Manthalkar, R R.: QoS Routing enhancement using metaheuristic approach in mobile ad-hoc network. En: Computer Networks 110 (2016), p. 180–191. – ISSN 1389–1286Mani, P ; Kamalakkannan, P: Conviction based packet promotion scheme for efficient detection of selfish nodes in mobile Ad Hoc networks. En: International Review on Computers and Software 9 (2014), Nr. 2, p. 212–218Marias, Giannis F. ; Georgiadis, Panagiotis ; Flitzanis, D ; Mandalas, K: Cooperation enforcement schemes for MANETs: A survey. En: Wireless Communications and Mobile Computing 6 (2006), Nr. 3, p. 319–332Mejia, Angela M.: Evolución genética de estrategias para modelos de confianza en redes móviles ad-hoc basados en teoría de juegos. 2010. – unpublished thesisMejia, M ; Peña, N ; Muñoz, J L. ; Esparza, O ; Alzate, M A.: A game theoretic trust model for on-line distributed evolution of cooperation inMANETs. En: Journal of Network and Computer Applications 34 (2011), Nr. 1, p. 39–51Mertens, J-F ; Neyman, Abraham: Stochastic games. En: International Journal of Game Theory 10 (1981), Nr. 2, p. 53–66Michiardi, Pietro ; Molva, Refik: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. En: Advanced communications and multimedia security. Springer, 2002, p. 107–121Myerson, Roger B.: Game theory. Harvard university press, 2013Ninu, S B. ; Behin Sam, S: A collaborative Intrusion Detection System for manet using data mining technique. En: ARPN Journal of Engineering and Applied Sciences 13 (2018), Nr. 14, p. 4387–4392Ochoa, Gabriela: Setting the mutation rate: Scope and limitations of the 1/L heuristic. En: Proceedings of the 4th Annual Conference on Genetic and Evolutionary Computation, 2002, p. 495–502Pariselvam, S ; Parvathi, R M S.: Trust based security mechanism for service discovery in MANET. En: Journal of Theoretical and Applied Information Technology 56 (2013), Nr. 2, p. 226–234Pouyan, A A. ; Yadollahzadeh Tabari, M: FPN-SAODV: using fuzzy petri nets for securing AODV routing protocol in mobile Ad hoc network. En: International Journal of Communication Systems 30 (2017), Nr. 1Rajeshwar, J ; Narsimha, G: Secure way routing protocol for mobile ad hoc network. En: Wireless Networks 23 (2017), Nr. 2, p. 345–354Rapoport, Anatol ; Chammah, Albert M. ; Orwant, Carol J.: Prisoner’s dilemma: A study in conflict and cooperation. Vol. 165. University of Michigan press, 1965Raychaudhuri, Dipankar ; Gerla, Mario: Emerging wireless technologies and the future mobile internet. Cambridge University Press, 2011Raychaudhuri, Dipankar ; Mandayam, Narayan B.: Frontiers of wireless and mobile communications. En: Proceedings of the IEEE 100 (2012), Nr. 4, p. 824–840Reddy, V B. ; Venkataraman, S ; Negi, A: A dynamic trust evolution model for MANETs based on mobility. En: International Journal of Ad Hoc and Ubiquitous Computing 28 (2018), Nr. 4, p. 230–246Roughgarden, Tim: Algorithmic game theory. En: Communications of the ACM 53 (2010), Nr. 7, p. 78–86Saha, H N. ; Singh, R ; Bhattacharyya, D ; Banerjee, P K.: Modified Fidelity Based On-Demand Secure (MFBOD) Routing Protocol in Mobile Ad-Hoc Network. En: Foundations of Computing and Decision Sciences 40 (2015), Nr. 4, p. 267–298Shannon, Claude E.: A mathematical theory of communication. En: ACM SIGMO- BILE mobile computing and communications review 5 (2001), Nr. 1, p. 3–55Sridhar, S ; Nagaraju, V ; Bapu, B R T. ; Shankar, R ; Anitha, R: Trusted and optimized routing in mobile ad-hoc networks emphasizing quality of service. En: Applied Mathematics and Information Sciences 12 (2018), Nr. 3, p. 655–663Thorat, S A. ; Kulkarni, P J.: Opportunistic Routing in Presence of Selfish Nodes for MANET. En: Wireless Personal Communications 82 (2015), Nr. 2, p. 689–708Tonguz, Ozan K. ; Ferrari, Gianluigi: A communication-theoretic approach to ad hoc wireless networking. En: 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks Vol. 2 IEEE, 2006, p. 715–722Vega, Diego A. ; Ospina, Juan P. ; Latorre, Julian F. ; Ortiz, Jorge E.: An adaptive trust model for achieving emergent cooperation in ad hoc networks. En: Current Trends in Semantic Web Technologies: Theory and Practice. Springer, 2019, p. 85–100Vekaria, Kanta ; Clack, Chris: Selective crossover in genetic algorithms: An empirical study. En: International Conference on Parallel Problem Solving from Nature Springer, 1998, p. 438–447Wooldridge, Michael: An introduction to multiagent systems. John Wiley & Sons, 2009Yang, Hao ; Shu, James ; Meng, Xiaoqiao ; Lu, Songwu: SCAN: self-organized network-layer security in mobile ad hoc networks. En: IEEE Journal on Selected Areas in Communications 24 (2006), Nr. 2, p. 261–273Zhang, Qing ; Yu, Ting ; Irwin, Keith: A Classification Scheme for Trust Functions in Reputation-Based Trust Management. En: ISWC Workshop on Trust, Security, and Reputation on the Semantic Web Vol. 127 Citeseer, 2004Zhang, Yujun ; Yan, Tan ; Tian, Jie ; Hu, Qi ; Wang, Guiling ; Li, Zhongcheng: TOHIP: A topology-hiding multipath routing protocol in mobile ad hoc networks. En: Ad Hoc Networks 21 (2014), p. 109–122. – ISSN 1570–8705Zhong, Sheng ; Chen, Jiang ; Yang, Yang R.: Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. En: IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No. 03CH37428) Vol. 3 IEEE, 2003, p. 1987–1997EstudiantesInvestigadoresMaestrosPúblico generalLICENSElicense.txtlicense.txttext/plain; charset=utf-84074https://repositorio.unal.edu.co/bitstream/unal/80614/3/license.txt8153f7789df02f0a4c9e079953658ab2MD53ORIGINAL1015453545.2021.pdf1015453545.2021.pdfTesis de Maestría en Ingeniería de Sistemas y Computaciónapplication/pdf2426047https://repositorio.unal.edu.co/bitstream/unal/80614/4/1015453545.2021.pdf46cd227e225bdbc4f17679e5b6ce4226MD54THUMBNAIL1015453545.2021.pdf.jpg1015453545.2021.pdf.jpgGenerated Thumbnailimage/jpeg4369https://repositorio.unal.edu.co/bitstream/unal/80614/5/1015453545.2021.pdf.jpg5d9554142dd7fcc2054e850a1a53e3deMD55unal/80614oai:repositorio.unal.edu.co:unal/806142023-07-30 23:03:59.357Repositorio Institucional Universidad Nacional de Colombiarepositorio_nal@unal.edu.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 |