Modelo de confianza evolutivo para lograr cooperación emergente en redes ad-hoc a través de algoritmos genéticos

ilustraciones, gráficas, tablas

Autores:
Vega Vega, Diego Alejandro
Tipo de recurso:
Fecha de publicación:
2021
Institución:
Universidad Nacional de Colombia
Repositorio:
Universidad Nacional de Colombia
Idioma:
spa
OAI Identifier:
oai:repositorio.unal.edu.co:unal/80614
Acceso en línea:
https://repositorio.unal.edu.co/handle/unal/80614
https://repositorio.unal.edu.co/
Palabra clave:
000 - Ciencias de la computación, información y obras generales
Local area networks (Computer networks)
Computer algorithms
Computer networks - design and construction
Redes de área local (Computadores)
Algoritmos (Computadores)
Redes de computadores - Diseño y construcción
Auto-organización
Cooperación
Confianza
Adaptación
Redes ad-hoc
Self-organization
Cooperation
Trust
Adaptation
Ad-hoc networks
Rights
openAccess
License
Reconocimiento 4.0 Internacional
id UNACIONAL2_13a245dc5f272ea528356560eaae6742
oai_identifier_str oai:repositorio.unal.edu.co:unal/80614
network_acronym_str UNACIONAL2
network_name_str Universidad Nacional de Colombia
repository_id_str
dc.title.spa.fl_str_mv Modelo de confianza evolutivo para lograr cooperación emergente en redes ad-hoc a través de algoritmos genéticos
dc.title.translated.eng.fl_str_mv Evolutionary trust model to achieve emergent cooperation in ad-hoc networks through genetic algorithms
title Modelo de confianza evolutivo para lograr cooperación emergente en redes ad-hoc a través de algoritmos genéticos
spellingShingle Modelo de confianza evolutivo para lograr cooperación emergente en redes ad-hoc a través de algoritmos genéticos
000 - Ciencias de la computación, información y obras generales
Local area networks (Computer networks)
Computer algorithms
Computer networks - design and construction
Redes de área local (Computadores)
Algoritmos (Computadores)
Redes de computadores - Diseño y construcción
Auto-organización
Cooperación
Confianza
Adaptación
Redes ad-hoc
Self-organization
Cooperation
Trust
Adaptation
Ad-hoc networks
title_short Modelo de confianza evolutivo para lograr cooperación emergente en redes ad-hoc a través de algoritmos genéticos
title_full Modelo de confianza evolutivo para lograr cooperación emergente en redes ad-hoc a través de algoritmos genéticos
title_fullStr Modelo de confianza evolutivo para lograr cooperación emergente en redes ad-hoc a través de algoritmos genéticos
title_full_unstemmed Modelo de confianza evolutivo para lograr cooperación emergente en redes ad-hoc a través de algoritmos genéticos
title_sort Modelo de confianza evolutivo para lograr cooperación emergente en redes ad-hoc a través de algoritmos genéticos
dc.creator.fl_str_mv Vega Vega, Diego Alejandro
dc.contributor.advisor.spa.fl_str_mv Ortiz Triviño, Jorge Eduardo
dc.contributor.author.spa.fl_str_mv Vega Vega, Diego Alejandro
dc.contributor.researchgroup.spa.fl_str_mv TLÖN - Grupo de Investigación en Redes de Telecomunicaciones Dinámicas y Lenguajes de Programación Distribuidos
dc.subject.ddc.spa.fl_str_mv 000 - Ciencias de la computación, información y obras generales
topic 000 - Ciencias de la computación, información y obras generales
Local area networks (Computer networks)
Computer algorithms
Computer networks - design and construction
Redes de área local (Computadores)
Algoritmos (Computadores)
Redes de computadores - Diseño y construcción
Auto-organización
Cooperación
Confianza
Adaptación
Redes ad-hoc
Self-organization
Cooperation
Trust
Adaptation
Ad-hoc networks
dc.subject.lemb.eng.fl_str_mv Local area networks (Computer networks)
Computer algorithms
Computer networks - design and construction
dc.subject.lemb.spa.fl_str_mv Redes de área local (Computadores)
Algoritmos (Computadores)
Redes de computadores - Diseño y construcción
dc.subject.proposal.spa.fl_str_mv Auto-organización
Cooperación
Confianza
Adaptación
Redes ad-hoc
dc.subject.proposal.eng.fl_str_mv Self-organization
Cooperation
Trust
Adaptation
Ad-hoc networks
description ilustraciones, gráficas, tablas
publishDate 2021
dc.date.accessioned.none.fl_str_mv 2021-10-26T14:19:59Z
dc.date.available.none.fl_str_mv 2021-10-26T14:19:59Z
dc.date.issued.none.fl_str_mv 2021-09-15
dc.type.spa.fl_str_mv Trabajo de grado - Maestría
dc.type.driver.spa.fl_str_mv info:eu-repo/semantics/masterThesis
dc.type.version.spa.fl_str_mv info:eu-repo/semantics/acceptedVersion
dc.type.content.spa.fl_str_mv Text
dc.type.redcol.spa.fl_str_mv http://purl.org/redcol/resource_type/TM
status_str acceptedVersion
dc.identifier.uri.none.fl_str_mv https://repositorio.unal.edu.co/handle/unal/80614
dc.identifier.instname.spa.fl_str_mv Universidad Nacional de Colombia
dc.identifier.reponame.spa.fl_str_mv Repositorio Institucional Universidad Nacional de Colombia
dc.identifier.repourl.spa.fl_str_mv https://repositorio.unal.edu.co/
url https://repositorio.unal.edu.co/handle/unal/80614
https://repositorio.unal.edu.co/
identifier_str_mv Universidad Nacional de Colombia
Repositorio Institucional Universidad Nacional de Colombia
dc.language.iso.spa.fl_str_mv spa
language spa
dc.relation.references.spa.fl_str_mv Abdel-Halim, I T. ; Fahmy, H M A. ; Bahaa-Eldin, A M.: Agent-based trusted on-demand routing protocol for mobile ad-hoc networks. En: Wireless Networks 21 (2014), Nr. 2, p. 467–483
Anderegg, Luzi ; Eidenbenz, Stephan: Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. En: Proceedings of the 9th annual international conference on Mobile computing and networking, 2003, p. 245–259
Ashwin, M ; Kamalraj, S ; Azath, M: Weighted Clustering Trust Model for Mobile Ad Hoc Networks. En: Wireless Personal Communications 94 (2017), Nr. 4, p. 2203– 2212
Axelrod, Robert ; Hamilton, William D.: The evolution of cooperation. En: science 211 (1981), Nr. 4489, p. 1390–1396
Ayday, E ; Fekri, F: An Iterative Algorithm for Trust Management and Adversary Detection for Delay-Tolerant Networks. En: IEEE Transactions on Mobile Computing 11 (2012), Nr. 9, p. 1514–1531
Bansal, Sorav ; Baker, Mary: Observation-based cooperation enforcement in ad hoc networks. En: arXiv preprint cs/0307012 (2003)
Bauer, Paul C.: Conceptualizing trust and trustworthiness. (2017)
Bauer, Paul C. ; Keusch, Florian ; Kreuter, Frauke: Trust and cooperative behavior: Evidence from the realm of data-sharing. En: PloS one 14 (2019), Nr. 8, p. e0220115
Bisen, D ; Sharma, S: An enhanced performance through agent-based secure approach for mobile ad hoc networks. En: International Journal of Electronics 105 (2018), Nr. 1, p. 116–136
Buchegger, Sonja ; Le Boudec, Jean-Yves: Performance analysis of the CONFI- DANT protocol. En: Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing, 2002, p. 226–236
Chatterjee, P ; Sengupta, I ; Ghosh, S K.: STACRP: A secure trusted auction oriented clustering based routing protocol for MANET. En: Cluster Computing 15 (2012), Nr. 3, p. 303–320
Fadel, Etimad ; Gungor, Vehbi C. ; Nassef, Laila ; Akkari, Nadine ; Malik, MG A. ; Almasri, Suleiman ; Akyildiz, Ian F.: A survey on wireless sensor networks for smart grid. En: Computer Communications 71 (2015), p. 22–33
Fitzek, F.H.P. ; Katz, M.D.: Cooperation in wireless networks: Principles and applications: Real egoistic behavior is to cooperate! Springer, 2006. – 1–641 p.. – cited By 186
Friedman, Linda W. ; Friedman, Hershey H.: Analyzing simulation output using the bootstrap method. En: Simulation 64 (1995), Nr. 2, p. 95–100
Gera, P ; Garg, K ; Misra, M: Trust-based multi-path routing for enhancing data security in MANETs. En: International Journal of Network Security 16 (2014), Nr. 2, p. 102–111
Gershenson, Carlos ; Heylighen, Francis: When can we call a system self-organizing? En: European Conference on Artificial Life Springer, 2003, p. 606–614
Ghosekar, Pravin ; Katkar, Girish ; Ghorpade, Pradip: Mobile ad hoc networking: imperatives and challenges. En: IJCA Special issue on MANETs 3 (2010), p. 153–158
Hanbali, Ahmad ; Ibrahim, Mouhamad ; Simon, Vilmos ; Varga, Endre ; Carreras, Iacopo: A Survey of Message Diffusion Protocols in Mobile Ad Hoc Networks, 2008
Hardin, Garrett: The tragedy of the commons. En: science 162 (1968), Nr. 3859, p. 1243–1248
He, Qi ; Wu, Dapeng ; Khosla, Pradeep: SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks. En: 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No. 04TH8733) Vol. 2 IEEE, 2004, p. 825–830
Hegde, S B. ; Babu, B S. ; Venkataram, P: A Cognitive Theory-based Opportunistic Resource-Pooling Scheme for Ad hoc Networks. En: Journal of Intelligent Systems 26 (2017), Nr. 1, p. 47–68
Hilbe, Christian ; Šimsa, Štěpán ; Chatterjee, Krishnendu ; Nowak, Martin A.: Evolution of cooperation in stochastic games. En: Nature 559 (2018), Nr. 7713, p. 246–249
Jayanand, A ; Chenthil Kumaran, N: Trusted and authentication based routing security for MANET. En: International Journal of Applied Engineering Research 10 (2015), Nr. 1, p. 105–120
Katz, M. ; Fitzek, F.H.P. ; Lucani, D.E. ; Seeling, P.: Mobile clouds as the building blocks of shareconomy: Sharing resources locally and widely. En: IEEE Vehicular Technology Magazine 9 (2014), Nr. 3, p. 63–71
Li, W ; Parker, J ; Joshi, A: Security through collaboration and trust in MANETs. En: Mobile Networks and Applications 17 (2012), Nr. 3, p. 342–352
Loo, Jonathan ; Mauri, Jaime L. ; Ortiz, Jesus H.: Mobile ad hoc networks: current status and future trends. CRC Press, 2016
Mandhare, V V. ; Thool, V R. ; Manthalkar, R R.: QoS Routing enhancement using metaheuristic approach in mobile ad-hoc network. En: Computer Networks 110 (2016), p. 180–191. – ISSN 1389–1286
Mani, P ; Kamalakkannan, P: Conviction based packet promotion scheme for efficient detection of selfish nodes in mobile Ad Hoc networks. En: International Review on Computers and Software 9 (2014), Nr. 2, p. 212–218
Marias, Giannis F. ; Georgiadis, Panagiotis ; Flitzanis, D ; Mandalas, K: Cooperation enforcement schemes for MANETs: A survey. En: Wireless Communications and Mobile Computing 6 (2006), Nr. 3, p. 319–332
Mejia, Angela M.: Evolución genética de estrategias para modelos de confianza en redes móviles ad-hoc basados en teoría de juegos. 2010. – unpublished thesis
Mejia, M ; Peña, N ; Muñoz, J L. ; Esparza, O ; Alzate, M A.: A game theoretic trust model for on-line distributed evolution of cooperation inMANETs. En: Journal of Network and Computer Applications 34 (2011), Nr. 1, p. 39–51
Mertens, J-F ; Neyman, Abraham: Stochastic games. En: International Journal of Game Theory 10 (1981), Nr. 2, p. 53–66
Michiardi, Pietro ; Molva, Refik: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. En: Advanced communications and multimedia security. Springer, 2002, p. 107–121
Myerson, Roger B.: Game theory. Harvard university press, 2013
Ninu, S B. ; Behin Sam, S: A collaborative Intrusion Detection System for manet using data mining technique. En: ARPN Journal of Engineering and Applied Sciences 13 (2018), Nr. 14, p. 4387–4392
Ochoa, Gabriela: Setting the mutation rate: Scope and limitations of the 1/L heuristic. En: Proceedings of the 4th Annual Conference on Genetic and Evolutionary Computation, 2002, p. 495–502
Pariselvam, S ; Parvathi, R M S.: Trust based security mechanism for service discovery in MANET. En: Journal of Theoretical and Applied Information Technology 56 (2013), Nr. 2, p. 226–234
Pouyan, A A. ; Yadollahzadeh Tabari, M: FPN-SAODV: using fuzzy petri nets for securing AODV routing protocol in mobile Ad hoc network. En: International Journal of Communication Systems 30 (2017), Nr. 1
Rajeshwar, J ; Narsimha, G: Secure way routing protocol for mobile ad hoc network. En: Wireless Networks 23 (2017), Nr. 2, p. 345–354
Rapoport, Anatol ; Chammah, Albert M. ; Orwant, Carol J.: Prisoner’s dilemma: A study in conflict and cooperation. Vol. 165. University of Michigan press, 1965
Raychaudhuri, Dipankar ; Gerla, Mario: Emerging wireless technologies and the future mobile internet. Cambridge University Press, 2011
Raychaudhuri, Dipankar ; Mandayam, Narayan B.: Frontiers of wireless and mobile communications. En: Proceedings of the IEEE 100 (2012), Nr. 4, p. 824–840
Reddy, V B. ; Venkataraman, S ; Negi, A: A dynamic trust evolution model for MANETs based on mobility. En: International Journal of Ad Hoc and Ubiquitous Computing 28 (2018), Nr. 4, p. 230–246
Roughgarden, Tim: Algorithmic game theory. En: Communications of the ACM 53 (2010), Nr. 7, p. 78–86
Saha, H N. ; Singh, R ; Bhattacharyya, D ; Banerjee, P K.: Modified Fidelity Based On-Demand Secure (MFBOD) Routing Protocol in Mobile Ad-Hoc Network. En: Foundations of Computing and Decision Sciences 40 (2015), Nr. 4, p. 267–298
Shannon, Claude E.: A mathematical theory of communication. En: ACM SIGMO- BILE mobile computing and communications review 5 (2001), Nr. 1, p. 3–55
Sridhar, S ; Nagaraju, V ; Bapu, B R T. ; Shankar, R ; Anitha, R: Trusted and optimized routing in mobile ad-hoc networks emphasizing quality of service. En: Applied Mathematics and Information Sciences 12 (2018), Nr. 3, p. 655–663
Thorat, S A. ; Kulkarni, P J.: Opportunistic Routing in Presence of Selfish Nodes for MANET. En: Wireless Personal Communications 82 (2015), Nr. 2, p. 689–708
Tonguz, Ozan K. ; Ferrari, Gianluigi: A communication-theoretic approach to ad hoc wireless networking. En: 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks Vol. 2 IEEE, 2006, p. 715–722
Vega, Diego A. ; Ospina, Juan P. ; Latorre, Julian F. ; Ortiz, Jorge E.: An adaptive trust model for achieving emergent cooperation in ad hoc networks. En: Current Trends in Semantic Web Technologies: Theory and Practice. Springer, 2019, p. 85–100
Vekaria, Kanta ; Clack, Chris: Selective crossover in genetic algorithms: An empirical study. En: International Conference on Parallel Problem Solving from Nature Springer, 1998, p. 438–447
Wooldridge, Michael: An introduction to multiagent systems. John Wiley & Sons, 2009
Yang, Hao ; Shu, James ; Meng, Xiaoqiao ; Lu, Songwu: SCAN: self-organized network-layer security in mobile ad hoc networks. En: IEEE Journal on Selected Areas in Communications 24 (2006), Nr. 2, p. 261–273
Zhang, Qing ; Yu, Ting ; Irwin, Keith: A Classification Scheme for Trust Functions in Reputation-Based Trust Management. En: ISWC Workshop on Trust, Security, and Reputation on the Semantic Web Vol. 127 Citeseer, 2004
Zhang, Yujun ; Yan, Tan ; Tian, Jie ; Hu, Qi ; Wang, Guiling ; Li, Zhongcheng: TOHIP: A topology-hiding multipath routing protocol in mobile ad hoc networks. En: Ad Hoc Networks 21 (2014), p. 109–122. – ISSN 1570–8705
Zhong, Sheng ; Chen, Jiang ; Yang, Yang R.: Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. En: IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No. 03CH37428) Vol. 3 IEEE, 2003, p. 1987–1997
dc.rights.coar.fl_str_mv http://purl.org/coar/access_right/c_abf2
dc.rights.license.spa.fl_str_mv Reconocimiento 4.0 Internacional
dc.rights.uri.spa.fl_str_mv http://creativecommons.org/licenses/by/4.0/
dc.rights.accessrights.spa.fl_str_mv info:eu-repo/semantics/openAccess
rights_invalid_str_mv Reconocimiento 4.0 Internacional
http://creativecommons.org/licenses/by/4.0/
http://purl.org/coar/access_right/c_abf2
eu_rights_str_mv openAccess
dc.format.extent.spa.fl_str_mv xvi, 57 páginas
dc.format.mimetype.spa.fl_str_mv application/pdf
dc.publisher.spa.fl_str_mv Universidad Nacional de Colombia
dc.publisher.program.spa.fl_str_mv Bogotá - Ingeniería - Maestría en Ingeniería - Ingeniería de Sistemas y Computación
dc.publisher.department.spa.fl_str_mv Departamento de Ingeniería de Sistemas e Industrial
dc.publisher.faculty.spa.fl_str_mv Facultad de Ingeniería
dc.publisher.place.spa.fl_str_mv Bogotá, Colombia
dc.publisher.branch.spa.fl_str_mv Universidad Nacional de Colombia - Sede Bogotá
institution Universidad Nacional de Colombia
bitstream.url.fl_str_mv https://repositorio.unal.edu.co/bitstream/unal/80614/3/license.txt
https://repositorio.unal.edu.co/bitstream/unal/80614/4/1015453545.2021.pdf
https://repositorio.unal.edu.co/bitstream/unal/80614/5/1015453545.2021.pdf.jpg
bitstream.checksum.fl_str_mv 8153f7789df02f0a4c9e079953658ab2
46cd227e225bdbc4f17679e5b6ce4226
5d9554142dd7fcc2054e850a1a53e3de
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
repository.name.fl_str_mv Repositorio Institucional Universidad Nacional de Colombia
repository.mail.fl_str_mv repositorio_nal@unal.edu.co
_version_ 1814089668778524672
spelling Reconocimiento 4.0 Internacionalhttp://creativecommons.org/licenses/by/4.0/info:eu-repo/semantics/openAccesshttp://purl.org/coar/access_right/c_abf2Ortiz Triviño, Jorge Eduardod9ea1d3c2dfb7b6f0ffa170fad3e2d14Vega Vega, Diego Alejandro880dea3c4818a94086dd7ce1eaa8a224TLÖN - Grupo de Investigación en Redes de Telecomunicaciones Dinámicas y Lenguajes de Programación Distribuidos2021-10-26T14:19:59Z2021-10-26T14:19:59Z2021-09-15https://repositorio.unal.edu.co/handle/unal/80614Universidad Nacional de ColombiaRepositorio Institucional Universidad Nacional de Colombiahttps://repositorio.unal.edu.co/ilustraciones, gráficas, tablasEn esta tesis, se propone un modelo evolutivo para interacciones de agentes en redes ad-hoc. Para esto, primero se hizo una revisión general sobre los diferentes tipos de modelos existentes en la literatura, con el fin de elegir un modelo en función de su pertinencia. El modelo escogido utiliza algoritmos genéticos complementados con juegos estocásticos, que se espera que ofrezcan un comportamiento adaptativo y dinámico. A continuación, se diseñaron las simulaciones con el fin de involucrar la naturaleza de las redes ad-hoc, donde se demostró que los algoritmos genéticos son capaces de adaptarse a la red, pero el proceso toma 1.000 interacciones para alcanzar indicadores favorables. En consecuencia, se propuso la inclusión de juegos estocásticos, los cuales alcanzan los mismos indicadores con solo 250 interacciones. Este resultado evidencia las ventajas del modelo propuesto. Finalmente, se realizó la implementación de una prueba piloto sobre una red ad-hoc real, validando el comportamiento de las simulaciones. La principal contribución de este trabajo es el modelo adaptativo, que además presenta una mejora en la velocidad de adaptación en entornos adversos en comparación con trabajos encontrados en la literatura. (Texto tomado de la fuente).This thesis proposes an evolutional model for agent interactions in ad-hoc networks. For this purpose, an overview is presented of the different types of existing models in the literature, in order to choose a model based on its relevance to the objective. The choosen model uses genetic algorithms improved by including stochastic games that are expected to offer an adaptative and dynamic behavior. After defining the model to be studied, the simulations were designed to involve the nature of ad-hoc networks. The simulations show that the genetic algorithms are able to adapt to the network, but the process takes 1.000 interactions to reach favorable indicators. In consecuence, the inclusion of stochastic games is proposed. With this improvement, the algorithm reaches the same indicators with only 250 interactions. This result evidences the advantages of the model proposed. Finally, the implementation in a real ad-hoc network showed results that validate the behavior observed in the simulations. The main contribution of this work is the adaptative model that also presents an improvement in the velocity of adaptation in adverse environments in comparison with previous works in the literature.Esta tesis de maestría se sustentó el 15 de Septiembre de 2021 a las 10:00 am, y fue evaluada por los siguientes jurados: Luis Fernando Niño Vásquez (Ph.D.) Universidad Nacional de Colombia Departamento de ingeniería de sistemas e industrial Jeisson Andrés Vergara Vargas (Ph.D.) Universidad Nacional de Colombia Departamento de ingeniería de sistemas e industrialMaestríaMagíster en Ingeniería - Ingeniería de Sistemas y ComputaciónSimulación basada en agentesComputación aplicadaTesis presentada como requisito parcial para optar al título de: Magister en Ingeniería de Sistemas y ComputaciónDepartamento de Ingeniería de Sistemas e Industrialxvi, 57 páginasapplication/pdfspaUniversidad Nacional de ColombiaBogotá - Ingeniería - Maestría en Ingeniería - Ingeniería de Sistemas y ComputaciónDepartamento de Ingeniería de Sistemas e IndustrialFacultad de IngenieríaBogotá, ColombiaUniversidad Nacional de Colombia - Sede Bogotá000 - Ciencias de la computación, información y obras generalesLocal area networks (Computer networks)Computer algorithmsComputer networks - design and constructionRedes de área local (Computadores)Algoritmos (Computadores)Redes de computadores - Diseño y construcciónAuto-organizaciónCooperaciónConfianzaAdaptaciónRedes ad-hocSelf-organizationCooperationTrustAdaptationAd-hoc networksModelo de confianza evolutivo para lograr cooperación emergente en redes ad-hoc a través de algoritmos genéticosEvolutionary trust model to achieve emergent cooperation in ad-hoc networks through genetic algorithmsTrabajo de grado - Maestríainfo:eu-repo/semantics/masterThesisinfo:eu-repo/semantics/acceptedVersionTexthttp://purl.org/redcol/resource_type/TMAbdel-Halim, I T. ; Fahmy, H M A. ; Bahaa-Eldin, A M.: Agent-based trusted on-demand routing protocol for mobile ad-hoc networks. En: Wireless Networks 21 (2014), Nr. 2, p. 467–483Anderegg, Luzi ; Eidenbenz, Stephan: Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. En: Proceedings of the 9th annual international conference on Mobile computing and networking, 2003, p. 245–259Ashwin, M ; Kamalraj, S ; Azath, M: Weighted Clustering Trust Model for Mobile Ad Hoc Networks. En: Wireless Personal Communications 94 (2017), Nr. 4, p. 2203– 2212Axelrod, Robert ; Hamilton, William D.: The evolution of cooperation. En: science 211 (1981), Nr. 4489, p. 1390–1396Ayday, E ; Fekri, F: An Iterative Algorithm for Trust Management and Adversary Detection for Delay-Tolerant Networks. En: IEEE Transactions on Mobile Computing 11 (2012), Nr. 9, p. 1514–1531Bansal, Sorav ; Baker, Mary: Observation-based cooperation enforcement in ad hoc networks. En: arXiv preprint cs/0307012 (2003)Bauer, Paul C.: Conceptualizing trust and trustworthiness. (2017)Bauer, Paul C. ; Keusch, Florian ; Kreuter, Frauke: Trust and cooperative behavior: Evidence from the realm of data-sharing. En: PloS one 14 (2019), Nr. 8, p. e0220115Bisen, D ; Sharma, S: An enhanced performance through agent-based secure approach for mobile ad hoc networks. En: International Journal of Electronics 105 (2018), Nr. 1, p. 116–136Buchegger, Sonja ; Le Boudec, Jean-Yves: Performance analysis of the CONFI- DANT protocol. En: Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing, 2002, p. 226–236Chatterjee, P ; Sengupta, I ; Ghosh, S K.: STACRP: A secure trusted auction oriented clustering based routing protocol for MANET. En: Cluster Computing 15 (2012), Nr. 3, p. 303–320Fadel, Etimad ; Gungor, Vehbi C. ; Nassef, Laila ; Akkari, Nadine ; Malik, MG A. ; Almasri, Suleiman ; Akyildiz, Ian F.: A survey on wireless sensor networks for smart grid. En: Computer Communications 71 (2015), p. 22–33Fitzek, F.H.P. ; Katz, M.D.: Cooperation in wireless networks: Principles and applications: Real egoistic behavior is to cooperate! Springer, 2006. – 1–641 p.. – cited By 186Friedman, Linda W. ; Friedman, Hershey H.: Analyzing simulation output using the bootstrap method. En: Simulation 64 (1995), Nr. 2, p. 95–100Gera, P ; Garg, K ; Misra, M: Trust-based multi-path routing for enhancing data security in MANETs. En: International Journal of Network Security 16 (2014), Nr. 2, p. 102–111Gershenson, Carlos ; Heylighen, Francis: When can we call a system self-organizing? En: European Conference on Artificial Life Springer, 2003, p. 606–614Ghosekar, Pravin ; Katkar, Girish ; Ghorpade, Pradip: Mobile ad hoc networking: imperatives and challenges. En: IJCA Special issue on MANETs 3 (2010), p. 153–158Hanbali, Ahmad ; Ibrahim, Mouhamad ; Simon, Vilmos ; Varga, Endre ; Carreras, Iacopo: A Survey of Message Diffusion Protocols in Mobile Ad Hoc Networks, 2008Hardin, Garrett: The tragedy of the commons. En: science 162 (1968), Nr. 3859, p. 1243–1248He, Qi ; Wu, Dapeng ; Khosla, Pradeep: SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks. En: 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No. 04TH8733) Vol. 2 IEEE, 2004, p. 825–830Hegde, S B. ; Babu, B S. ; Venkataram, P: A Cognitive Theory-based Opportunistic Resource-Pooling Scheme for Ad hoc Networks. En: Journal of Intelligent Systems 26 (2017), Nr. 1, p. 47–68Hilbe, Christian ; Šimsa, Štěpán ; Chatterjee, Krishnendu ; Nowak, Martin A.: Evolution of cooperation in stochastic games. En: Nature 559 (2018), Nr. 7713, p. 246–249Jayanand, A ; Chenthil Kumaran, N: Trusted and authentication based routing security for MANET. En: International Journal of Applied Engineering Research 10 (2015), Nr. 1, p. 105–120Katz, M. ; Fitzek, F.H.P. ; Lucani, D.E. ; Seeling, P.: Mobile clouds as the building blocks of shareconomy: Sharing resources locally and widely. En: IEEE Vehicular Technology Magazine 9 (2014), Nr. 3, p. 63–71Li, W ; Parker, J ; Joshi, A: Security through collaboration and trust in MANETs. En: Mobile Networks and Applications 17 (2012), Nr. 3, p. 342–352Loo, Jonathan ; Mauri, Jaime L. ; Ortiz, Jesus H.: Mobile ad hoc networks: current status and future trends. CRC Press, 2016Mandhare, V V. ; Thool, V R. ; Manthalkar, R R.: QoS Routing enhancement using metaheuristic approach in mobile ad-hoc network. En: Computer Networks 110 (2016), p. 180–191. – ISSN 1389–1286Mani, P ; Kamalakkannan, P: Conviction based packet promotion scheme for efficient detection of selfish nodes in mobile Ad Hoc networks. En: International Review on Computers and Software 9 (2014), Nr. 2, p. 212–218Marias, Giannis F. ; Georgiadis, Panagiotis ; Flitzanis, D ; Mandalas, K: Cooperation enforcement schemes for MANETs: A survey. En: Wireless Communications and Mobile Computing 6 (2006), Nr. 3, p. 319–332Mejia, Angela M.: Evolución genética de estrategias para modelos de confianza en redes móviles ad-hoc basados en teoría de juegos. 2010. – unpublished thesisMejia, M ; Peña, N ; Muñoz, J L. ; Esparza, O ; Alzate, M A.: A game theoretic trust model for on-line distributed evolution of cooperation inMANETs. En: Journal of Network and Computer Applications 34 (2011), Nr. 1, p. 39–51Mertens, J-F ; Neyman, Abraham: Stochastic games. En: International Journal of Game Theory 10 (1981), Nr. 2, p. 53–66Michiardi, Pietro ; Molva, Refik: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. En: Advanced communications and multimedia security. Springer, 2002, p. 107–121Myerson, Roger B.: Game theory. Harvard university press, 2013Ninu, S B. ; Behin Sam, S: A collaborative Intrusion Detection System for manet using data mining technique. En: ARPN Journal of Engineering and Applied Sciences 13 (2018), Nr. 14, p. 4387–4392Ochoa, Gabriela: Setting the mutation rate: Scope and limitations of the 1/L heuristic. En: Proceedings of the 4th Annual Conference on Genetic and Evolutionary Computation, 2002, p. 495–502Pariselvam, S ; Parvathi, R M S.: Trust based security mechanism for service discovery in MANET. En: Journal of Theoretical and Applied Information Technology 56 (2013), Nr. 2, p. 226–234Pouyan, A A. ; Yadollahzadeh Tabari, M: FPN-SAODV: using fuzzy petri nets for securing AODV routing protocol in mobile Ad hoc network. En: International Journal of Communication Systems 30 (2017), Nr. 1Rajeshwar, J ; Narsimha, G: Secure way routing protocol for mobile ad hoc network. En: Wireless Networks 23 (2017), Nr. 2, p. 345–354Rapoport, Anatol ; Chammah, Albert M. ; Orwant, Carol J.: Prisoner’s dilemma: A study in conflict and cooperation. Vol. 165. University of Michigan press, 1965Raychaudhuri, Dipankar ; Gerla, Mario: Emerging wireless technologies and the future mobile internet. Cambridge University Press, 2011Raychaudhuri, Dipankar ; Mandayam, Narayan B.: Frontiers of wireless and mobile communications. En: Proceedings of the IEEE 100 (2012), Nr. 4, p. 824–840Reddy, V B. ; Venkataraman, S ; Negi, A: A dynamic trust evolution model for MANETs based on mobility. En: International Journal of Ad Hoc and Ubiquitous Computing 28 (2018), Nr. 4, p. 230–246Roughgarden, Tim: Algorithmic game theory. En: Communications of the ACM 53 (2010), Nr. 7, p. 78–86Saha, H N. ; Singh, R ; Bhattacharyya, D ; Banerjee, P K.: Modified Fidelity Based On-Demand Secure (MFBOD) Routing Protocol in Mobile Ad-Hoc Network. En: Foundations of Computing and Decision Sciences 40 (2015), Nr. 4, p. 267–298Shannon, Claude E.: A mathematical theory of communication. En: ACM SIGMO- BILE mobile computing and communications review 5 (2001), Nr. 1, p. 3–55Sridhar, S ; Nagaraju, V ; Bapu, B R T. ; Shankar, R ; Anitha, R: Trusted and optimized routing in mobile ad-hoc networks emphasizing quality of service. En: Applied Mathematics and Information Sciences 12 (2018), Nr. 3, p. 655–663Thorat, S A. ; Kulkarni, P J.: Opportunistic Routing in Presence of Selfish Nodes for MANET. En: Wireless Personal Communications 82 (2015), Nr. 2, p. 689–708Tonguz, Ozan K. ; Ferrari, Gianluigi: A communication-theoretic approach to ad hoc wireless networking. En: 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks Vol. 2 IEEE, 2006, p. 715–722Vega, Diego A. ; Ospina, Juan P. ; Latorre, Julian F. ; Ortiz, Jorge E.: An adaptive trust model for achieving emergent cooperation in ad hoc networks. En: Current Trends in Semantic Web Technologies: Theory and Practice. Springer, 2019, p. 85–100Vekaria, Kanta ; Clack, Chris: Selective crossover in genetic algorithms: An empirical study. En: International Conference on Parallel Problem Solving from Nature Springer, 1998, p. 438–447Wooldridge, Michael: An introduction to multiagent systems. John Wiley & Sons, 2009Yang, Hao ; Shu, James ; Meng, Xiaoqiao ; Lu, Songwu: SCAN: self-organized network-layer security in mobile ad hoc networks. En: IEEE Journal on Selected Areas in Communications 24 (2006), Nr. 2, p. 261–273Zhang, Qing ; Yu, Ting ; Irwin, Keith: A Classification Scheme for Trust Functions in Reputation-Based Trust Management. En: ISWC Workshop on Trust, Security, and Reputation on the Semantic Web Vol. 127 Citeseer, 2004Zhang, Yujun ; Yan, Tan ; Tian, Jie ; Hu, Qi ; Wang, Guiling ; Li, Zhongcheng: TOHIP: A topology-hiding multipath routing protocol in mobile ad hoc networks. En: Ad Hoc Networks 21 (2014), p. 109–122. – ISSN 1570–8705Zhong, Sheng ; Chen, Jiang ; Yang, Yang R.: Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. En: IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No. 03CH37428) Vol. 3 IEEE, 2003, p. 1987–1997EstudiantesInvestigadoresMaestrosPúblico generalLICENSElicense.txtlicense.txttext/plain; charset=utf-84074https://repositorio.unal.edu.co/bitstream/unal/80614/3/license.txt8153f7789df02f0a4c9e079953658ab2MD53ORIGINAL1015453545.2021.pdf1015453545.2021.pdfTesis de Maestría en Ingeniería de Sistemas y Computaciónapplication/pdf2426047https://repositorio.unal.edu.co/bitstream/unal/80614/4/1015453545.2021.pdf46cd227e225bdbc4f17679e5b6ce4226MD54THUMBNAIL1015453545.2021.pdf.jpg1015453545.2021.pdf.jpgGenerated Thumbnailimage/jpeg4369https://repositorio.unal.edu.co/bitstream/unal/80614/5/1015453545.2021.pdf.jpg5d9554142dd7fcc2054e850a1a53e3deMD55unal/80614oai:repositorio.unal.edu.co:unal/806142023-07-30 23:03:59.357Repositorio Institucional Universidad Nacional de Colombiarepositorio_nal@unal.edu.coUExBTlRJTExBIERFUMOTU0lUTwoKQ29tbyBlZGl0b3IgZGUgZXN0ZSDDrXRlbSwgdXN0ZWQgcHVlZGUgbW92ZXJsbyBhIHJldmlzacOzbiBzaW4gYW50ZXMgcmVzb2x2ZXIgbG9zIHByb2JsZW1hcyBpZGVudGlmaWNhZG9zLCBkZSBsbyBjb250cmFyaW8sIGhhZ2EgY2xpYyBlbiBHdWFyZGFyIHBhcmEgZ3VhcmRhciBlbCDDrXRlbSB5IHNvbHVjaW9uYXIgZXN0b3MgcHJvYmxlbWFzIG1hcyB0YXJkZS4KClBhcmEgdHJhYmFqb3MgZGVwb3NpdGFkb3MgcG9yIHN1IHByb3BpbyBhdXRvcjoKIApBbCBhdXRvYXJjaGl2YXIgZXN0ZSBncnVwbyBkZSBhcmNoaXZvcyBkaWdpdGFsZXMgeSBzdXMgbWV0YWRhdG9zLCB5byBnYXJhbnRpem8gYWwgUmVwb3NpdG9yaW8gSW5zdGl0dWNpb25hbCBVbmFsIGVsIGRlcmVjaG8gYSBhbG1hY2VuYXJsb3MgeSBtYW50ZW5lcmxvcyBkaXNwb25pYmxlcyBlbiBsw61uZWEgZGUgbWFuZXJhIGdyYXR1aXRhLiBEZWNsYXJvIHF1ZSBsYSBvYnJhIGVzIGRlIG1pIHByb3BpZWRhZCBpbnRlbGVjdHVhbCB5IHF1ZSBlbCBSZXBvc2l0b3JpbyBJbnN0aXR1Y2lvbmFsIFVuYWwgbm8gYXN1bWUgbmluZ3VuYSByZXNwb25zYWJpbGlkYWQgc2kgaGF5IGFsZ3VuYSB2aW9sYWNpw7NuIGEgbG9zIGRlcmVjaG9zIGRlIGF1dG9yIGFsIGRpc3RyaWJ1aXIgZXN0b3MgYXJjaGl2b3MgeSBtZXRhZGF0b3MuIChTZSByZWNvbWllbmRhIGEgdG9kb3MgbG9zIGF1dG9yZXMgYSBpbmRpY2FyIHN1cyBkZXJlY2hvcyBkZSBhdXRvciBlbiBsYSBww6FnaW5hIGRlIHTDrXR1bG8gZGUgc3UgZG9jdW1lbnRvLikgRGUgbGEgbWlzbWEgbWFuZXJhLCBhY2VwdG8gbG9zIHTDqXJtaW5vcyBkZSBsYSBzaWd1aWVudGUgbGljZW5jaWE6IExvcyBhdXRvcmVzIG8gdGl0dWxhcmVzIGRlbCBkZXJlY2hvIGRlIGF1dG9yIGRlbCBwcmVzZW50ZSBkb2N1bWVudG8gY29uZmllcmVuIGEgbGEgVW5pdmVyc2lkYWQgTmFjaW9uYWwgZGUgQ29sb21iaWEgdW5hIGxpY2VuY2lhIG5vIGV4Y2x1c2l2YSwgbGltaXRhZGEgeSBncmF0dWl0YSBzb2JyZSBsYSBvYnJhIHF1ZSBzZSBpbnRlZ3JhIGVuIGVsIFJlcG9zaXRvcmlvIEluc3RpdHVjaW9uYWwsIHF1ZSBzZSBhanVzdGEgYSBsYXMgc2lndWllbnRlcyBjYXJhY3RlcsOtc3RpY2FzOiBhKSBFc3RhcsOhIHZpZ2VudGUgYSBwYXJ0aXIgZGUgbGEgZmVjaGEgZW4gcXVlIHNlIGluY2x1eWUgZW4gZWwgcmVwb3NpdG9yaW8sIHF1ZSBzZXLDoW4gcHJvcnJvZ2FibGVzIGluZGVmaW5pZGFtZW50ZSBwb3IgZWwgdGllbXBvIHF1ZSBkdXJlIGVsIGRlcmVjaG8gcGF0cmltb25pYWwgZGVsIGF1dG9yLiBFbCBhdXRvciBwb2Ryw6EgZGFyIHBvciB0ZXJtaW5hZGEgbGEgbGljZW5jaWEgc29saWNpdMOhbmRvbG8gYSBsYSBVbml2ZXJzaWRhZC4gYikgTG9zIGF1dG9yZXMgYXV0b3JpemFuIGEgbGEgVW5pdmVyc2lkYWQgTmFjaW9uYWwgZGUgQ29sb21iaWEgcGFyYSBwdWJsaWNhciBsYSBvYnJhIGVuIGVsIGZvcm1hdG8gcXVlIGVsIHJlcG9zaXRvcmlvIGxvIHJlcXVpZXJhIChpbXByZXNvLCBkaWdpdGFsLCBlbGVjdHLDs25pY28gbyBjdWFscXVpZXIgb3RybyBjb25vY2lkbyBvIHBvciBjb25vY2VyKSB5IGNvbm9jZW4gcXVlIGRhZG8gcXVlIHNlIHB1YmxpY2EgZW4gSW50ZXJuZXQgcG9yIGVzdGUgaGVjaG8gY2lyY3VsYSBjb24gYWxjYW5jZSBtdW5kaWFsLiBjKSBMb3MgYXV0b3JlcyBhY2VwdGFuIHF1ZSBsYSBhdXRvcml6YWNpw7NuIHNlIGhhY2UgYSB0w610dWxvIGdyYXR1aXRvLCBwb3IgbG8gdGFudG8sIHJlbnVuY2lhbiBhIHJlY2liaXIgZW1vbHVtZW50byBhbGd1bm8gcG9yIGxhIHB1YmxpY2FjacOzbiwgZGlzdHJpYnVjacOzbiwgY29tdW5pY2FjacOzbiBww7pibGljYSB5IGN1YWxxdWllciBvdHJvIHVzbyBxdWUgc2UgaGFnYSBlbiBsb3MgdMOpcm1pbm9zIGRlIGxhIHByZXNlbnRlIGxpY2VuY2lhIHkgZGUgbGEgbGljZW5jaWEgQ3JlYXRpdmUgQ29tbW9ucyBjb24gcXVlIHNlIHB1YmxpY2EuIGQpIExvcyBhdXRvcmVzIG1hbmlmaWVzdGFuIHF1ZSBzZSB0cmF0YSBkZSB1bmEgb2JyYSBvcmlnaW5hbCBzb2JyZSBsYSBxdWUgdGllbmVuIGxvcyBkZXJlY2hvcyBxdWUgYXV0b3JpemFuIHkgcXVlIHNvbiBlbGxvcyBxdWllbmVzIGFzdW1lbiB0b3RhbCByZXNwb25zYWJpbGlkYWQgcG9yIGVsIGNvbnRlbmlkbyBkZSBzdSBvYnJhIGFudGUgbGEgVW5pdmVyc2lkYWQgTmFjaW9uYWwgeSBhbnRlIHRlcmNlcm9zLiBFbiB0b2RvIGNhc28gbGEgVW5pdmVyc2lkYWQgTmFjaW9uYWwgZGUgQ29sb21iaWEgc2UgY29tcHJvbWV0ZSBhIGluZGljYXIgc2llbXByZSBsYSBhdXRvcsOtYSBpbmNsdXllbmRvIGVsIG5vbWJyZSBkZWwgYXV0b3IgeSBsYSBmZWNoYSBkZSBwdWJsaWNhY2nDs24uIGUpIExvcyBhdXRvcmVzIGF1dG9yaXphbiBhIGxhIFVuaXZlcnNpZGFkIHBhcmEgaW5jbHVpciBsYSBvYnJhIGVuIGxvcyBhZ3JlZ2Fkb3JlcywgaW5kaWNlc3MgeSBidXNjYWRvcmVzIHF1ZSBzZSBlc3RpbWVuIG5lY2VzYXJpb3MgcGFyYSBwcm9tb3ZlciBzdSBkaWZ1c2nDs24uIGYpIExvcyBhdXRvcmVzIGFjZXB0YW4gcXVlIGxhIFVuaXZlcnNpZGFkIE5hY2lvbmFsIGRlIENvbG9tYmlhIHB1ZWRhIGNvbnZlcnRpciBlbCBkb2N1bWVudG8gYSBjdWFscXVpZXIgbWVkaW8gbyBmb3JtYXRvIHBhcmEgcHJvcMOzc2l0b3MgZGUgcHJlc2VydmFjacOzbiBkaWdpdGFsLiBTSSBFTCBET0NVTUVOVE8gU0UgQkFTQSBFTiBVTiBUUkFCQUpPIFFVRSBIQSBTSURPIFBBVFJPQ0lOQURPIE8gQVBPWUFETyBQT1IgVU5BIEFHRU5DSUEgTyBVTkEgT1JHQU5JWkFDScOTTiwgQ09OIEVYQ0VQQ0nDk04gREUgTEEgVU5JVkVSU0lEQUQgTkFDSU9OQUwgREUgQ09MT01CSUEsIExPUyBBVVRPUkVTIEdBUkFOVElaQU4gUVVFIFNFIEhBIENVTVBMSURPIENPTiBMT1MgREVSRUNIT1MgWSBPQkxJR0FDSU9ORVMgUkVRVUVSSURPUyBQT1IgRUwgUkVTUEVDVElWTyBDT05UUkFUTyBPIEFDVUVSRE8uIAoKUGFyYSB0cmFiYWpvcyBkZXBvc2l0YWRvcyBwb3Igb3RyYXMgcGVyc29uYXMgZGlzdGludGFzIGEgc3UgYXV0b3I6IAoKRGVjbGFybyBxdWUgZWwgZ3J1cG8gZGUgYXJjaGl2b3MgZGlnaXRhbGVzIHkgbWV0YWRhdG9zIGFzb2NpYWRvcyBxdWUgZXN0b3kgYXJjaGl2YW5kbyBlbiBlbCBSZXBvc2l0b3JpbyBJbnN0aXR1Y2lvbmFsIFVOKSBlcyBkZSBkb21pbmlvIHDDumJsaWNvLiBTaSBubyBmdWVzZSBlbCBjYXNvLCBhY2VwdG8gdG9kYSBsYSByZXNwb25zYWJpbGlkYWQgcG9yIGN1YWxxdWllciBpbmZyYWNjacOzbiBkZSBkZXJlY2hvcyBkZSBhdXRvciBxdWUgY29ubGxldmUgbGEgZGlzdHJpYnVjacOzbiBkZSBlc3RvcyBhcmNoaXZvcyB5IG1ldGFkYXRvcy4KTk9UQTogU0kgTEEgVEVTSVMgQSBQVUJMSUNBUiBBRFFVSVJJw5MgQ09NUFJPTUlTT1MgREUgQ09ORklERU5DSUFMSURBRCBFTiBFTCBERVNBUlJPTExPIE8gUEFSVEVTIERFTCBET0NVTUVOVE8uIFNJR0EgTEEgRElSRUNUUklaIERFIExBIFJFU09MVUNJw5NOIDAyMyBERSAyMDE1LCBQT1IgTEEgQ1VBTCBTRSBFU1RBQkxFQ0UgRUwgUFJPQ0VESU1JRU5UTyBQQVJBIExBIFBVQkxJQ0FDScOTTiBERSBURVNJUyBERSBNQUVTVFLDjUEgWSBET0NUT1JBRE8gREUgTE9TIEVTVFVESUFOVEVTIERFIExBIFVOSVZFUlNJREFEIE5BQ0lPTkFMIERFIENPTE9NQklBIEVOIEVMIFJFUE9TSVRPUklPIElOU1RJVFVDSU9OQUwgVU4sIEVYUEVESURBIFBPUiBMQSBTRUNSRVRBUsONQSBHRU5FUkFMLiAqTEEgVEVTSVMgQSBQVUJMSUNBUiBERUJFIFNFUiBMQSBWRVJTScOTTiBGSU5BTCBBUFJPQkFEQS4gCgpBbCBoYWNlciBjbGljIGVuIGVsIHNpZ3VpZW50ZSBib3TDs24sIHVzdGVkIGluZGljYSBxdWUgZXN0w6EgZGUgYWN1ZXJkbyBjb24gZXN0b3MgdMOpcm1pbm9zLiBTaSB0aWVuZSBhbGd1bmEgZHVkYSBzb2JyZSBsYSBsaWNlbmNpYSwgcG9yIGZhdm9yLCBjb250YWN0ZSBjb24gZWwgYWRtaW5pc3RyYWRvciBkZWwgc2lzdGVtYS4KClVOSVZFUlNJREFEIE5BQ0lPTkFMIERFIENPTE9NQklBIC0gw5psdGltYSBtb2RpZmljYWNpw7NuIDE5LzEwLzIwMjEK