dc.contributor | Ortiz Triviño, Jorge Eduardo | |
dc.contributor | TLÖN - Grupo de Investigación en Redes de Telecomunicaciones Dinámicas y Lenguajes de Programación Distribuidos | |
dc.creator | Vega Vega, Diego Alejandro | |
dc.date.accessioned | 2021-10-26T14:19:59Z | |
dc.date.available | 2021-10-26T14:19:59Z | |
dc.date.created | 2021-10-26T14:19:59Z | |
dc.date.issued | 2021-09-15 | |
dc.identifier | https://repositorio.unal.edu.co/handle/unal/80614 | |
dc.identifier | Universidad Nacional de Colombia | |
dc.identifier | Repositorio Institucional Universidad Nacional de Colombia | |
dc.identifier | https://repositorio.unal.edu.co/ | |
dc.description.abstract | En esta tesis, se propone un modelo evolutivo para interacciones de agentes en redes ad-hoc. Para esto, primero se hizo una revisión general sobre los diferentes tipos de modelos existentes en la literatura, con el fin de elegir un modelo en función de su pertinencia. El modelo escogido utiliza algoritmos genéticos complementados con juegos estocásticos, que se espera que ofrezcan un comportamiento adaptativo y dinámico. A continuación, se diseñaron las simulaciones con el fin de involucrar la naturaleza de las redes ad-hoc, donde se demostró que los algoritmos genéticos son capaces de adaptarse a la red, pero el proceso toma 1.000 interacciones para alcanzar indicadores favorables. En consecuencia, se propuso la inclusión de juegos estocásticos, los cuales alcanzan los mismos indicadores con solo 250 interacciones. Este resultado evidencia las ventajas del modelo propuesto. Finalmente, se realizó la implementación de una prueba piloto sobre una red ad-hoc real, validando el comportamiento de las simulaciones. La principal contribución de este trabajo es el modelo adaptativo, que además presenta una mejora en la velocidad de adaptación en entornos adversos en comparación con trabajos encontrados en la literatura. (Texto tomado de la fuente). | |
dc.description.abstract | This thesis proposes an evolutional model for agent interactions in ad-hoc networks. For this purpose, an overview is presented of the different types of existing models in the literature, in order to choose a model based on its relevance to the objective. The choosen model uses genetic algorithms improved by including stochastic games that are expected to offer an adaptative and dynamic behavior. After defining the model to be studied, the simulations were designed to involve the nature of ad-hoc networks. The simulations show that the genetic algorithms are able to adapt to the network, but the process takes 1.000 interactions to reach favorable indicators. In consecuence, the inclusion of stochastic games is proposed. With this improvement, the algorithm reaches the same indicators with only 250 interactions. This result evidences the advantages of the model proposed. Finally, the implementation in a real ad-hoc network showed results that validate the behavior observed in the simulations. The main contribution of this work is the adaptative model that also presents an improvement in the velocity of adaptation in adverse environments in comparison with previous works in the literature. | |
dc.language | spa | |
dc.publisher | Universidad Nacional de Colombia | |
dc.publisher | Bogotá - Ingeniería - Maestría en Ingeniería - Ingeniería de Sistemas y Computación | |
dc.publisher | Departamento de Ingeniería de Sistemas e Industrial | |
dc.publisher | Facultad de Ingeniería | |
dc.publisher | Bogotá, Colombia | |
dc.publisher | Universidad Nacional de Colombia - Sede Bogotá | |
dc.relation | Abdel-Halim, I T. ; Fahmy, H M A. ; Bahaa-Eldin, A M.: Agent-based trusted on-demand routing protocol for mobile ad-hoc networks. En: Wireless Networks 21 (2014), Nr. 2, p. 467–483 | |
dc.relation | Anderegg, Luzi ; Eidenbenz, Stephan: Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. En: Proceedings of the 9th annual international conference on Mobile computing and networking, 2003, p. 245–259 | |
dc.relation | Ashwin, M ; Kamalraj, S ; Azath, M: Weighted Clustering Trust Model for Mobile Ad Hoc Networks. En: Wireless Personal Communications 94 (2017), Nr. 4, p. 2203– 2212 | |
dc.relation | Axelrod, Robert ; Hamilton, William D.: The evolution of cooperation. En: science 211 (1981), Nr. 4489, p. 1390–1396 | |
dc.relation | Ayday, E ; Fekri, F: An Iterative Algorithm for Trust Management and Adversary Detection for Delay-Tolerant Networks. En: IEEE Transactions on Mobile Computing 11 (2012), Nr. 9, p. 1514–1531 | |
dc.relation | Bansal, Sorav ; Baker, Mary: Observation-based cooperation enforcement in ad hoc networks. En: arXiv preprint cs/0307012 (2003) | |
dc.relation | Bauer, Paul C.: Conceptualizing trust and trustworthiness. (2017) | |
dc.relation | Bauer, Paul C. ; Keusch, Florian ; Kreuter, Frauke: Trust and cooperative behavior: Evidence from the realm of data-sharing. En: PloS one 14 (2019), Nr. 8, p. e0220115 | |
dc.relation | Bisen, D ; Sharma, S: An enhanced performance through agent-based secure approach for mobile ad hoc networks. En: International Journal of Electronics 105 (2018), Nr. 1, p. 116–136 | |
dc.relation | Buchegger, Sonja ; Le Boudec, Jean-Yves: Performance analysis of the CONFI- DANT protocol. En: Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing, 2002, p. 226–236 | |
dc.relation | Chatterjee, P ; Sengupta, I ; Ghosh, S K.: STACRP: A secure trusted auction oriented clustering based routing protocol for MANET. En: Cluster Computing 15 (2012), Nr. 3, p. 303–320 | |
dc.relation | Fadel, Etimad ; Gungor, Vehbi C. ; Nassef, Laila ; Akkari, Nadine ; Malik, MG A. ; Almasri, Suleiman ; Akyildiz, Ian F.: A survey on wireless sensor networks for smart grid. En: Computer Communications 71 (2015), p. 22–33 | |
dc.relation | Fitzek, F.H.P. ; Katz, M.D.: Cooperation in wireless networks: Principles and applications: Real egoistic behavior is to cooperate! Springer, 2006. – 1–641 p.. – cited By 186 | |
dc.relation | Friedman, Linda W. ; Friedman, Hershey H.: Analyzing simulation output using the bootstrap method. En: Simulation 64 (1995), Nr. 2, p. 95–100 | |
dc.relation | Gera, P ; Garg, K ; Misra, M: Trust-based multi-path routing for enhancing data security in MANETs. En: International Journal of Network Security 16 (2014), Nr. 2, p. 102–111 | |
dc.relation | Gershenson, Carlos ; Heylighen, Francis: When can we call a system self-organizing? En: European Conference on Artificial Life Springer, 2003, p. 606–614 | |
dc.relation | Ghosekar, Pravin ; Katkar, Girish ; Ghorpade, Pradip: Mobile ad hoc networking: imperatives and challenges. En: IJCA Special issue on MANETs 3 (2010), p. 153–158 | |
dc.relation | Hanbali, Ahmad ; Ibrahim, Mouhamad ; Simon, Vilmos ; Varga, Endre ; Carreras, Iacopo: A Survey of Message Diffusion Protocols in Mobile Ad Hoc Networks, 2008 | |
dc.relation | Hardin, Garrett: The tragedy of the commons. En: science 162 (1968), Nr. 3859, p. 1243–1248 | |
dc.relation | He, Qi ; Wu, Dapeng ; Khosla, Pradeep: SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks. En: 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No. 04TH8733) Vol. 2 IEEE, 2004, p. 825–830 | |
dc.relation | Hegde, S B. ; Babu, B S. ; Venkataram, P: A Cognitive Theory-based Opportunistic Resource-Pooling Scheme for Ad hoc Networks. En: Journal of Intelligent Systems 26 (2017), Nr. 1, p. 47–68 | |
dc.relation | Hilbe, Christian ; Šimsa, Štěpán ; Chatterjee, Krishnendu ; Nowak, Martin A.: Evolution of cooperation in stochastic games. En: Nature 559 (2018), Nr. 7713, p. 246–249 | |
dc.relation | Jayanand, A ; Chenthil Kumaran, N: Trusted and authentication based routing security for MANET. En: International Journal of Applied Engineering Research 10 (2015), Nr. 1, p. 105–120 | |
dc.relation | Katz, M. ; Fitzek, F.H.P. ; Lucani, D.E. ; Seeling, P.: Mobile clouds as the building blocks of shareconomy: Sharing resources locally and widely. En: IEEE Vehicular Technology Magazine 9 (2014), Nr. 3, p. 63–71 | |
dc.relation | Li, W ; Parker, J ; Joshi, A: Security through collaboration and trust in MANETs. En: Mobile Networks and Applications 17 (2012), Nr. 3, p. 342–352 | |
dc.relation | Loo, Jonathan ; Mauri, Jaime L. ; Ortiz, Jesus H.: Mobile ad hoc networks: current status and future trends. CRC Press, 2016 | |
dc.relation | Mandhare, V V. ; Thool, V R. ; Manthalkar, R R.: QoS Routing enhancement using metaheuristic approach in mobile ad-hoc network. En: Computer Networks 110 (2016), p. 180–191. – ISSN 1389–1286 | |
dc.relation | Mani, P ; Kamalakkannan, P: Conviction based packet promotion scheme for efficient detection of selfish nodes in mobile Ad Hoc networks. En: International Review on Computers and Software 9 (2014), Nr. 2, p. 212–218 | |
dc.relation | Marias, Giannis F. ; Georgiadis, Panagiotis ; Flitzanis, D ; Mandalas, K: Cooperation enforcement schemes for MANETs: A survey. En: Wireless Communications and Mobile Computing 6 (2006), Nr. 3, p. 319–332 | |
dc.relation | Mejia, Angela M.: Evolución genética de estrategias para modelos de confianza en redes móviles ad-hoc basados en teoría de juegos. 2010. – unpublished thesis | |
dc.relation | Mejia, M ; Peña, N ; Muñoz, J L. ; Esparza, O ; Alzate, M A.: A game theoretic trust model for on-line distributed evolution of cooperation inMANETs. En: Journal of Network and Computer Applications 34 (2011), Nr. 1, p. 39–51 | |
dc.relation | Mertens, J-F ; Neyman, Abraham: Stochastic games. En: International Journal of Game Theory 10 (1981), Nr. 2, p. 53–66 | |
dc.relation | Michiardi, Pietro ; Molva, Refik: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. En: Advanced communications and multimedia security. Springer, 2002, p. 107–121 | |
dc.relation | Myerson, Roger B.: Game theory. Harvard university press, 2013 | |
dc.relation | Ninu, S B. ; Behin Sam, S: A collaborative Intrusion Detection System for manet using data mining technique. En: ARPN Journal of Engineering and Applied Sciences 13 (2018), Nr. 14, p. 4387–4392 | |
dc.relation | Ochoa, Gabriela: Setting the mutation rate: Scope and limitations of the 1/L heuristic. En: Proceedings of the 4th Annual Conference on Genetic and Evolutionary Computation, 2002, p. 495–502 | |
dc.relation | Pariselvam, S ; Parvathi, R M S.: Trust based security mechanism for service discovery in MANET. En: Journal of Theoretical and Applied Information Technology 56 (2013), Nr. 2, p. 226–234 | |
dc.relation | Pouyan, A A. ; Yadollahzadeh Tabari, M: FPN-SAODV: using fuzzy petri nets for securing AODV routing protocol in mobile Ad hoc network. En: International Journal of Communication Systems 30 (2017), Nr. 1 | |
dc.relation | Rajeshwar, J ; Narsimha, G: Secure way routing protocol for mobile ad hoc network. En: Wireless Networks 23 (2017), Nr. 2, p. 345–354 | |
dc.relation | Rapoport, Anatol ; Chammah, Albert M. ; Orwant, Carol J.: Prisoner’s dilemma: A study in conflict and cooperation. Vol. 165. University of Michigan press, 1965 | |
dc.relation | Raychaudhuri, Dipankar ; Gerla, Mario: Emerging wireless technologies and the future mobile internet. Cambridge University Press, 2011 | |
dc.relation | Raychaudhuri, Dipankar ; Mandayam, Narayan B.: Frontiers of wireless and mobile communications. En: Proceedings of the IEEE 100 (2012), Nr. 4, p. 824–840 | |
dc.relation | Reddy, V B. ; Venkataraman, S ; Negi, A: A dynamic trust evolution model for MANETs based on mobility. En: International Journal of Ad Hoc and Ubiquitous Computing 28 (2018), Nr. 4, p. 230–246 | |
dc.relation | Roughgarden, Tim: Algorithmic game theory. En: Communications of the ACM 53 (2010), Nr. 7, p. 78–86 | |
dc.relation | Saha, H N. ; Singh, R ; Bhattacharyya, D ; Banerjee, P K.: Modified Fidelity Based On-Demand Secure (MFBOD) Routing Protocol in Mobile Ad-Hoc Network. En: Foundations of Computing and Decision Sciences 40 (2015), Nr. 4, p. 267–298 | |
dc.relation | Shannon, Claude E.: A mathematical theory of communication. En: ACM SIGMO- BILE mobile computing and communications review 5 (2001), Nr. 1, p. 3–55 | |
dc.relation | Sridhar, S ; Nagaraju, V ; Bapu, B R T. ; Shankar, R ; Anitha, R: Trusted and optimized routing in mobile ad-hoc networks emphasizing quality of service. En: Applied Mathematics and Information Sciences 12 (2018), Nr. 3, p. 655–663 | |
dc.relation | Thorat, S A. ; Kulkarni, P J.: Opportunistic Routing in Presence of Selfish Nodes for MANET. En: Wireless Personal Communications 82 (2015), Nr. 2, p. 689–708 | |
dc.relation | Tonguz, Ozan K. ; Ferrari, Gianluigi: A communication-theoretic approach to ad hoc wireless networking. En: 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks Vol. 2 IEEE, 2006, p. 715–722 | |
dc.relation | Vega, Diego A. ; Ospina, Juan P. ; Latorre, Julian F. ; Ortiz, Jorge E.: An adaptive trust model for achieving emergent cooperation in ad hoc networks. En: Current Trends in Semantic Web Technologies: Theory and Practice. Springer, 2019, p. 85–100 | |
dc.relation | Vekaria, Kanta ; Clack, Chris: Selective crossover in genetic algorithms: An empirical study. En: International Conference on Parallel Problem Solving from Nature Springer, 1998, p. 438–447 | |
dc.relation | Wooldridge, Michael: An introduction to multiagent systems. John Wiley & Sons, 2009 | |
dc.relation | Yang, Hao ; Shu, James ; Meng, Xiaoqiao ; Lu, Songwu: SCAN: self-organized network-layer security in mobile ad hoc networks. En: IEEE Journal on Selected Areas in Communications 24 (2006), Nr. 2, p. 261–273 | |
dc.relation | Zhang, Qing ; Yu, Ting ; Irwin, Keith: A Classification Scheme for Trust Functions in Reputation-Based Trust Management. En: ISWC Workshop on Trust, Security, and Reputation on the Semantic Web Vol. 127 Citeseer, 2004 | |
dc.relation | Zhang, Yujun ; Yan, Tan ; Tian, Jie ; Hu, Qi ; Wang, Guiling ; Li, Zhongcheng: TOHIP: A topology-hiding multipath routing protocol in mobile ad hoc networks. En: Ad Hoc Networks 21 (2014), p. 109–122. – ISSN 1570–8705 | |
dc.relation | Zhong, Sheng ; Chen, Jiang ; Yang, Yang R.: Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. En: IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No. 03CH37428) Vol. 3 IEEE, 2003, p. 1987–1997 | |
dc.rights | Reconocimiento 4.0 Internacional | |
dc.rights | http://creativecommons.org/licenses/by/4.0/ | |
dc.rights | info:eu-repo/semantics/openAccess | |
dc.title | Modelo de confianza evolutivo para lograr cooperación emergente en redes ad-hoc a través de algoritmos genéticos | |
dc.type | Trabajo de grado - Maestría | |