Mostrar el registro sencillo del documento

dc.rights.licenseReconocimiento 4.0 Internacional
dc.contributor.advisorOrtiz Triviño, Jorge Eduardo
dc.contributor.authorVega Vega, Diego Alejandro
dc.date.accessioned2021-10-26T14:19:59Z
dc.date.available2021-10-26T14:19:59Z
dc.date.issued2021-09-15
dc.identifier.urihttps://repositorio.unal.edu.co/handle/unal/80614
dc.descriptionilustraciones, gráficas, tablas
dc.description.abstractEn esta tesis, se propone un modelo evolutivo para interacciones de agentes en redes ad-hoc. Para esto, primero se hizo una revisión general sobre los diferentes tipos de modelos existentes en la literatura, con el fin de elegir un modelo en función de su pertinencia. El modelo escogido utiliza algoritmos genéticos complementados con juegos estocásticos, que se espera que ofrezcan un comportamiento adaptativo y dinámico. A continuación, se diseñaron las simulaciones con el fin de involucrar la naturaleza de las redes ad-hoc, donde se demostró que los algoritmos genéticos son capaces de adaptarse a la red, pero el proceso toma 1.000 interacciones para alcanzar indicadores favorables. En consecuencia, se propuso la inclusión de juegos estocásticos, los cuales alcanzan los mismos indicadores con solo 250 interacciones. Este resultado evidencia las ventajas del modelo propuesto. Finalmente, se realizó la implementación de una prueba piloto sobre una red ad-hoc real, validando el comportamiento de las simulaciones. La principal contribución de este trabajo es el modelo adaptativo, que además presenta una mejora en la velocidad de adaptación en entornos adversos en comparación con trabajos encontrados en la literatura. (Texto tomado de la fuente).
dc.description.abstractThis thesis proposes an evolutional model for agent interactions in ad-hoc networks. For this purpose, an overview is presented of the different types of existing models in the literature, in order to choose a model based on its relevance to the objective. The choosen model uses genetic algorithms improved by including stochastic games that are expected to offer an adaptative and dynamic behavior. After defining the model to be studied, the simulations were designed to involve the nature of ad-hoc networks. The simulations show that the genetic algorithms are able to adapt to the network, but the process takes 1.000 interactions to reach favorable indicators. In consecuence, the inclusion of stochastic games is proposed. With this improvement, the algorithm reaches the same indicators with only 250 interactions. This result evidences the advantages of the model proposed. Finally, the implementation in a real ad-hoc network showed results that validate the behavior observed in the simulations. The main contribution of this work is the adaptative model that also presents an improvement in the velocity of adaptation in adverse environments in comparison with previous works in the literature.
dc.format.extentxvi, 57 páginas
dc.format.mimetypeapplication/pdf
dc.language.isospa
dc.publisherUniversidad Nacional de Colombia
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/
dc.subject.ddc000 - Ciencias de la computación, información y obras generales
dc.titleModelo de confianza evolutivo para lograr cooperación emergente en redes ad-hoc a través de algoritmos genéticos
dc.typeTrabajo de grado - Maestría
dc.type.driverinfo:eu-repo/semantics/masterThesis
dc.type.versioninfo:eu-repo/semantics/acceptedVersion
dc.publisher.programBogotá - Ingeniería - Maestría en Ingeniería - Ingeniería de Sistemas y Computación
dc.description.notesEsta tesis de maestría se sustentó el 15 de Septiembre de 2021 a las 10:00 am, y fue evaluada por los siguientes jurados: Luis Fernando Niño Vásquez (Ph.D.) Universidad Nacional de Colombia Departamento de ingeniería de sistemas e industrial Jeisson Andrés Vergara Vargas (Ph.D.) Universidad Nacional de Colombia Departamento de ingeniería de sistemas e industrial
dc.contributor.researchgroupTLÖN - Grupo de Investigación en Redes de Telecomunicaciones Dinámicas y Lenguajes de Programación Distribuidos
dc.description.degreelevelMaestría
dc.description.degreenameMagíster en Ingeniería - Ingeniería de Sistemas y Computación
dc.description.methodsSimulación basada en agentes
dc.description.researchareaComputación aplicada
dc.description.technicalinfoTesis presentada como requisito parcial para optar al título de: Magister en Ingeniería de Sistemas y Computación
dc.identifier.instnameUniversidad Nacional de Colombia
dc.identifier.reponameRepositorio Institucional Universidad Nacional de Colombia
dc.identifier.repourlhttps://repositorio.unal.edu.co/
dc.publisher.departmentDepartamento de Ingeniería de Sistemas e Industrial
dc.publisher.facultyFacultad de Ingeniería
dc.publisher.placeBogotá, Colombia
dc.publisher.branchUniversidad Nacional de Colombia - Sede Bogotá
dc.relation.referencesAbdel-Halim, I T. ; Fahmy, H M A. ; Bahaa-Eldin, A M.: Agent-based trusted on-demand routing protocol for mobile ad-hoc networks. En: Wireless Networks 21 (2014), Nr. 2, p. 467–483
dc.relation.referencesAnderegg, Luzi ; Eidenbenz, Stephan: Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. En: Proceedings of the 9th annual international conference on Mobile computing and networking, 2003, p. 245–259
dc.relation.referencesAshwin, M ; Kamalraj, S ; Azath, M: Weighted Clustering Trust Model for Mobile Ad Hoc Networks. En: Wireless Personal Communications 94 (2017), Nr. 4, p. 2203– 2212
dc.relation.referencesAxelrod, Robert ; Hamilton, William D.: The evolution of cooperation. En: science 211 (1981), Nr. 4489, p. 1390–1396
dc.relation.referencesAyday, E ; Fekri, F: An Iterative Algorithm for Trust Management and Adversary Detection for Delay-Tolerant Networks. En: IEEE Transactions on Mobile Computing 11 (2012), Nr. 9, p. 1514–1531
dc.relation.referencesBansal, Sorav ; Baker, Mary: Observation-based cooperation enforcement in ad hoc networks. En: arXiv preprint cs/0307012 (2003)
dc.relation.referencesBauer, Paul C.: Conceptualizing trust and trustworthiness. (2017)
dc.relation.referencesBauer, Paul C. ; Keusch, Florian ; Kreuter, Frauke: Trust and cooperative behavior: Evidence from the realm of data-sharing. En: PloS one 14 (2019), Nr. 8, p. e0220115
dc.relation.referencesBisen, D ; Sharma, S: An enhanced performance through agent-based secure approach for mobile ad hoc networks. En: International Journal of Electronics 105 (2018), Nr. 1, p. 116–136
dc.relation.referencesBuchegger, Sonja ; Le Boudec, Jean-Yves: Performance analysis of the CONFI- DANT protocol. En: Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing, 2002, p. 226–236
dc.relation.referencesChatterjee, P ; Sengupta, I ; Ghosh, S K.: STACRP: A secure trusted auction oriented clustering based routing protocol for MANET. En: Cluster Computing 15 (2012), Nr. 3, p. 303–320
dc.relation.referencesFadel, Etimad ; Gungor, Vehbi C. ; Nassef, Laila ; Akkari, Nadine ; Malik, MG A. ; Almasri, Suleiman ; Akyildiz, Ian F.: A survey on wireless sensor networks for smart grid. En: Computer Communications 71 (2015), p. 22–33
dc.relation.referencesFitzek, F.H.P. ; Katz, M.D.: Cooperation in wireless networks: Principles and applications: Real egoistic behavior is to cooperate! Springer, 2006. – 1–641 p.. – cited By 186
dc.relation.referencesFriedman, Linda W. ; Friedman, Hershey H.: Analyzing simulation output using the bootstrap method. En: Simulation 64 (1995), Nr. 2, p. 95–100
dc.relation.referencesGera, P ; Garg, K ; Misra, M: Trust-based multi-path routing for enhancing data security in MANETs. En: International Journal of Network Security 16 (2014), Nr. 2, p. 102–111
dc.relation.referencesGershenson, Carlos ; Heylighen, Francis: When can we call a system self-organizing? En: European Conference on Artificial Life Springer, 2003, p. 606–614
dc.relation.referencesGhosekar, Pravin ; Katkar, Girish ; Ghorpade, Pradip: Mobile ad hoc networking: imperatives and challenges. En: IJCA Special issue on MANETs 3 (2010), p. 153–158
dc.relation.referencesHanbali, Ahmad ; Ibrahim, Mouhamad ; Simon, Vilmos ; Varga, Endre ; Carreras, Iacopo: A Survey of Message Diffusion Protocols in Mobile Ad Hoc Networks, 2008
dc.relation.referencesHardin, Garrett: The tragedy of the commons. En: science 162 (1968), Nr. 3859, p. 1243–1248
dc.relation.referencesHe, Qi ; Wu, Dapeng ; Khosla, Pradeep: SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks. En: 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No. 04TH8733) Vol. 2 IEEE, 2004, p. 825–830
dc.relation.referencesHegde, S B. ; Babu, B S. ; Venkataram, P: A Cognitive Theory-based Opportunistic Resource-Pooling Scheme for Ad hoc Networks. En: Journal of Intelligent Systems 26 (2017), Nr. 1, p. 47–68
dc.relation.referencesHilbe, Christian ; Šimsa, Štěpán ; Chatterjee, Krishnendu ; Nowak, Martin A.: Evolution of cooperation in stochastic games. En: Nature 559 (2018), Nr. 7713, p. 246–249
dc.relation.referencesJayanand, A ; Chenthil Kumaran, N: Trusted and authentication based routing security for MANET. En: International Journal of Applied Engineering Research 10 (2015), Nr. 1, p. 105–120
dc.relation.referencesKatz, M. ; Fitzek, F.H.P. ; Lucani, D.E. ; Seeling, P.: Mobile clouds as the building blocks of shareconomy: Sharing resources locally and widely. En: IEEE Vehicular Technology Magazine 9 (2014), Nr. 3, p. 63–71
dc.relation.referencesLi, W ; Parker, J ; Joshi, A: Security through collaboration and trust in MANETs. En: Mobile Networks and Applications 17 (2012), Nr. 3, p. 342–352
dc.relation.referencesLoo, Jonathan ; Mauri, Jaime L. ; Ortiz, Jesus H.: Mobile ad hoc networks: current status and future trends. CRC Press, 2016
dc.relation.referencesMandhare, V V. ; Thool, V R. ; Manthalkar, R R.: QoS Routing enhancement using metaheuristic approach in mobile ad-hoc network. En: Computer Networks 110 (2016), p. 180–191. – ISSN 1389–1286
dc.relation.referencesMani, P ; Kamalakkannan, P: Conviction based packet promotion scheme for efficient detection of selfish nodes in mobile Ad Hoc networks. En: International Review on Computers and Software 9 (2014), Nr. 2, p. 212–218
dc.relation.referencesMarias, Giannis F. ; Georgiadis, Panagiotis ; Flitzanis, D ; Mandalas, K: Cooperation enforcement schemes for MANETs: A survey. En: Wireless Communications and Mobile Computing 6 (2006), Nr. 3, p. 319–332
dc.relation.referencesMejia, Angela M.: Evolución genética de estrategias para modelos de confianza en redes móviles ad-hoc basados en teoría de juegos. 2010. – unpublished thesis
dc.relation.referencesMejia, M ; Peña, N ; Muñoz, J L. ; Esparza, O ; Alzate, M A.: A game theoretic trust model for on-line distributed evolution of cooperation inMANETs. En: Journal of Network and Computer Applications 34 (2011), Nr. 1, p. 39–51
dc.relation.referencesMertens, J-F ; Neyman, Abraham: Stochastic games. En: International Journal of Game Theory 10 (1981), Nr. 2, p. 53–66
dc.relation.referencesMichiardi, Pietro ; Molva, Refik: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. En: Advanced communications and multimedia security. Springer, 2002, p. 107–121
dc.relation.referencesMyerson, Roger B.: Game theory. Harvard university press, 2013
dc.relation.referencesNinu, S B. ; Behin Sam, S: A collaborative Intrusion Detection System for manet using data mining technique. En: ARPN Journal of Engineering and Applied Sciences 13 (2018), Nr. 14, p. 4387–4392
dc.relation.referencesOchoa, Gabriela: Setting the mutation rate: Scope and limitations of the 1/L heuristic. En: Proceedings of the 4th Annual Conference on Genetic and Evolutionary Computation, 2002, p. 495–502
dc.relation.referencesPariselvam, S ; Parvathi, R M S.: Trust based security mechanism for service discovery in MANET. En: Journal of Theoretical and Applied Information Technology 56 (2013), Nr. 2, p. 226–234
dc.relation.referencesPouyan, A A. ; Yadollahzadeh Tabari, M: FPN-SAODV: using fuzzy petri nets for securing AODV routing protocol in mobile Ad hoc network. En: International Journal of Communication Systems 30 (2017), Nr. 1
dc.relation.referencesRajeshwar, J ; Narsimha, G: Secure way routing protocol for mobile ad hoc network. En: Wireless Networks 23 (2017), Nr. 2, p. 345–354
dc.relation.referencesRapoport, Anatol ; Chammah, Albert M. ; Orwant, Carol J.: Prisoner’s dilemma: A study in conflict and cooperation. Vol. 165. University of Michigan press, 1965
dc.relation.referencesRaychaudhuri, Dipankar ; Gerla, Mario: Emerging wireless technologies and the future mobile internet. Cambridge University Press, 2011
dc.relation.referencesRaychaudhuri, Dipankar ; Mandayam, Narayan B.: Frontiers of wireless and mobile communications. En: Proceedings of the IEEE 100 (2012), Nr. 4, p. 824–840
dc.relation.referencesReddy, V B. ; Venkataraman, S ; Negi, A: A dynamic trust evolution model for MANETs based on mobility. En: International Journal of Ad Hoc and Ubiquitous Computing 28 (2018), Nr. 4, p. 230–246
dc.relation.referencesRoughgarden, Tim: Algorithmic game theory. En: Communications of the ACM 53 (2010), Nr. 7, p. 78–86
dc.relation.referencesSaha, H N. ; Singh, R ; Bhattacharyya, D ; Banerjee, P K.: Modified Fidelity Based On-Demand Secure (MFBOD) Routing Protocol in Mobile Ad-Hoc Network. En: Foundations of Computing and Decision Sciences 40 (2015), Nr. 4, p. 267–298
dc.relation.referencesShannon, Claude E.: A mathematical theory of communication. En: ACM SIGMO- BILE mobile computing and communications review 5 (2001), Nr. 1, p. 3–55
dc.relation.referencesSridhar, S ; Nagaraju, V ; Bapu, B R T. ; Shankar, R ; Anitha, R: Trusted and optimized routing in mobile ad-hoc networks emphasizing quality of service. En: Applied Mathematics and Information Sciences 12 (2018), Nr. 3, p. 655–663
dc.relation.referencesThorat, S A. ; Kulkarni, P J.: Opportunistic Routing in Presence of Selfish Nodes for MANET. En: Wireless Personal Communications 82 (2015), Nr. 2, p. 689–708
dc.relation.referencesTonguz, Ozan K. ; Ferrari, Gianluigi: A communication-theoretic approach to ad hoc wireless networking. En: 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks Vol. 2 IEEE, 2006, p. 715–722
dc.relation.referencesVega, Diego A. ; Ospina, Juan P. ; Latorre, Julian F. ; Ortiz, Jorge E.: An adaptive trust model for achieving emergent cooperation in ad hoc networks. En: Current Trends in Semantic Web Technologies: Theory and Practice. Springer, 2019, p. 85–100
dc.relation.referencesVekaria, Kanta ; Clack, Chris: Selective crossover in genetic algorithms: An empirical study. En: International Conference on Parallel Problem Solving from Nature Springer, 1998, p. 438–447
dc.relation.referencesWooldridge, Michael: An introduction to multiagent systems. John Wiley & Sons, 2009
dc.relation.referencesYang, Hao ; Shu, James ; Meng, Xiaoqiao ; Lu, Songwu: SCAN: self-organized network-layer security in mobile ad hoc networks. En: IEEE Journal on Selected Areas in Communications 24 (2006), Nr. 2, p. 261–273
dc.relation.referencesZhang, Qing ; Yu, Ting ; Irwin, Keith: A Classification Scheme for Trust Functions in Reputation-Based Trust Management. En: ISWC Workshop on Trust, Security, and Reputation on the Semantic Web Vol. 127 Citeseer, 2004
dc.relation.referencesZhang, Yujun ; Yan, Tan ; Tian, Jie ; Hu, Qi ; Wang, Guiling ; Li, Zhongcheng: TOHIP: A topology-hiding multipath routing protocol in mobile ad hoc networks. En: Ad Hoc Networks 21 (2014), p. 109–122. – ISSN 1570–8705
dc.relation.referencesZhong, Sheng ; Chen, Jiang ; Yang, Yang R.: Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. En: IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No. 03CH37428) Vol. 3 IEEE, 2003, p. 1987–1997
dc.rights.accessrightsinfo:eu-repo/semantics/openAccess
dc.subject.lembLocal area networks (Computer networks)
dc.subject.lembRedes de área local (Computadores)
dc.subject.lembComputer algorithms
dc.subject.lembAlgoritmos (Computadores)
dc.subject.lembComputer networks - design and construction
dc.subject.lembRedes de computadores - Diseño y construcción
dc.subject.proposalAuto-organización
dc.subject.proposalCooperación
dc.subject.proposalConfianza
dc.subject.proposalAdaptación
dc.subject.proposalRedes ad-hoc
dc.subject.proposalSelf-organization
dc.subject.proposalCooperation
dc.subject.proposalTrust
dc.subject.proposalAdaptation
dc.subject.proposalAd-hoc networks
dc.title.translatedEvolutionary trust model to achieve emergent cooperation in ad-hoc networks through genetic algorithms
dc.type.coarhttp://purl.org/coar/resource_type/c_bdcc
dc.type.coarversionhttp://purl.org/coar/version/c_ab4af688f83e57aa
dc.type.contentText
dc.type.redcolhttp://purl.org/redcol/resource_type/TM
oaire.accessrightshttp://purl.org/coar/access_right/c_abf2
dcterms.audience.professionaldevelopmentEstudiantes
dcterms.audience.professionaldevelopmentInvestigadores
dcterms.audience.professionaldevelopmentMaestros
dcterms.audience.professionaldevelopmentPúblico general
dc.description.curricularareaDepartamento de Ingeniería de Sistemas e Industrial


Archivos en el documento

Thumbnail

Este documento aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del documento

Reconocimiento 4.0 InternacionalEsta obra está bajo licencia internacional Creative Commons Reconocimiento-NoComercial 4.0.Este documento ha sido depositado por parte de el(los) autor(es) bajo la siguiente constancia de depósito