Modelo de confianza evolutivo para lograr cooperación emergente en redes ad-hoc a través de algoritmos genéticos

dc.contributor.advisorOrtiz Triviño, Jorge Eduardospa
dc.contributor.authorVega Vega, Diego Alejandrospa
dc.contributor.researchgroupTLÖN - Grupo de Investigación en Redes de Telecomunicaciones Dinámicas y Lenguajes de Programación Distribuidosspa
dc.date.accessioned2021-10-26T14:19:59Z
dc.date.available2021-10-26T14:19:59Z
dc.date.issued2021-09-15
dc.descriptionilustraciones, gráficas, tablasspa
dc.description.abstractEn esta tesis, se propone un modelo evolutivo para interacciones de agentes en redes ad-hoc. Para esto, primero se hizo una revisión general sobre los diferentes tipos de modelos existentes en la literatura, con el fin de elegir un modelo en función de su pertinencia. El modelo escogido utiliza algoritmos genéticos complementados con juegos estocásticos, que se espera que ofrezcan un comportamiento adaptativo y dinámico. A continuación, se diseñaron las simulaciones con el fin de involucrar la naturaleza de las redes ad-hoc, donde se demostró que los algoritmos genéticos son capaces de adaptarse a la red, pero el proceso toma 1.000 interacciones para alcanzar indicadores favorables. En consecuencia, se propuso la inclusión de juegos estocásticos, los cuales alcanzan los mismos indicadores con solo 250 interacciones. Este resultado evidencia las ventajas del modelo propuesto. Finalmente, se realizó la implementación de una prueba piloto sobre una red ad-hoc real, validando el comportamiento de las simulaciones. La principal contribución de este trabajo es el modelo adaptativo, que además presenta una mejora en la velocidad de adaptación en entornos adversos en comparación con trabajos encontrados en la literatura. (Texto tomado de la fuente).spa
dc.description.abstractThis thesis proposes an evolutional model for agent interactions in ad-hoc networks. For this purpose, an overview is presented of the different types of existing models in the literature, in order to choose a model based on its relevance to the objective. The choosen model uses genetic algorithms improved by including stochastic games that are expected to offer an adaptative and dynamic behavior. After defining the model to be studied, the simulations were designed to involve the nature of ad-hoc networks. The simulations show that the genetic algorithms are able to adapt to the network, but the process takes 1.000 interactions to reach favorable indicators. In consecuence, the inclusion of stochastic games is proposed. With this improvement, the algorithm reaches the same indicators with only 250 interactions. This result evidences the advantages of the model proposed. Finally, the implementation in a real ad-hoc network showed results that validate the behavior observed in the simulations. The main contribution of this work is the adaptative model that also presents an improvement in the velocity of adaptation in adverse environments in comparison with previous works in the literature.eng
dc.description.curricularareaDepartamento de Ingeniería de Sistemas e Industrialspa
dc.description.degreelevelMaestríaspa
dc.description.degreenameMagíster en Ingeniería - Ingeniería de Sistemas y Computaciónspa
dc.description.methodsSimulación basada en agentesspa
dc.description.notesEsta tesis de maestría se sustentó el 15 de Septiembre de 2021 a las 10:00 am, y fue evaluada por los siguientes jurados: Luis Fernando Niño Vásquez (Ph.D.) Universidad Nacional de Colombia Departamento de ingeniería de sistemas e industrial Jeisson Andrés Vergara Vargas (Ph.D.) Universidad Nacional de Colombia Departamento de ingeniería de sistemas e industrialspa
dc.description.researchareaComputación aplicadaspa
dc.description.technicalinfoTesis presentada como requisito parcial para optar al título de: Magister en Ingeniería de Sistemas y Computaciónspa
dc.format.extentxvi, 57 páginasspa
dc.format.mimetypeapplication/pdfspa
dc.identifier.instnameUniversidad Nacional de Colombiaspa
dc.identifier.reponameRepositorio Institucional Universidad Nacional de Colombiaspa
dc.identifier.repourlhttps://repositorio.unal.edu.co/spa
dc.identifier.urihttps://repositorio.unal.edu.co/handle/unal/80614
dc.language.isospaspa
dc.publisherUniversidad Nacional de Colombiaspa
dc.publisher.branchUniversidad Nacional de Colombia - Sede Bogotáspa
dc.publisher.departmentDepartamento de Ingeniería de Sistemas e Industrialspa
dc.publisher.facultyFacultad de Ingenieríaspa
dc.publisher.placeBogotá, Colombiaspa
dc.publisher.programBogotá - Ingeniería - Maestría en Ingeniería - Ingeniería de Sistemas y Computaciónspa
dc.relation.referencesAbdel-Halim, I T. ; Fahmy, H M A. ; Bahaa-Eldin, A M.: Agent-based trusted on-demand routing protocol for mobile ad-hoc networks. En: Wireless Networks 21 (2014), Nr. 2, p. 467–483spa
dc.relation.referencesAnderegg, Luzi ; Eidenbenz, Stephan: Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. En: Proceedings of the 9th annual international conference on Mobile computing and networking, 2003, p. 245–259spa
dc.relation.referencesAshwin, M ; Kamalraj, S ; Azath, M: Weighted Clustering Trust Model for Mobile Ad Hoc Networks. En: Wireless Personal Communications 94 (2017), Nr. 4, p. 2203– 2212spa
dc.relation.referencesAxelrod, Robert ; Hamilton, William D.: The evolution of cooperation. En: science 211 (1981), Nr. 4489, p. 1390–1396spa
dc.relation.referencesAyday, E ; Fekri, F: An Iterative Algorithm for Trust Management and Adversary Detection for Delay-Tolerant Networks. En: IEEE Transactions on Mobile Computing 11 (2012), Nr. 9, p. 1514–1531spa
dc.relation.referencesBansal, Sorav ; Baker, Mary: Observation-based cooperation enforcement in ad hoc networks. En: arXiv preprint cs/0307012 (2003)spa
dc.relation.referencesBauer, Paul C.: Conceptualizing trust and trustworthiness. (2017)spa
dc.relation.referencesBauer, Paul C. ; Keusch, Florian ; Kreuter, Frauke: Trust and cooperative behavior: Evidence from the realm of data-sharing. En: PloS one 14 (2019), Nr. 8, p. e0220115spa
dc.relation.referencesBisen, D ; Sharma, S: An enhanced performance through agent-based secure approach for mobile ad hoc networks. En: International Journal of Electronics 105 (2018), Nr. 1, p. 116–136spa
dc.relation.referencesBuchegger, Sonja ; Le Boudec, Jean-Yves: Performance analysis of the CONFI- DANT protocol. En: Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing, 2002, p. 226–236spa
dc.relation.referencesChatterjee, P ; Sengupta, I ; Ghosh, S K.: STACRP: A secure trusted auction oriented clustering based routing protocol for MANET. En: Cluster Computing 15 (2012), Nr. 3, p. 303–320spa
dc.relation.referencesFadel, Etimad ; Gungor, Vehbi C. ; Nassef, Laila ; Akkari, Nadine ; Malik, MG A. ; Almasri, Suleiman ; Akyildiz, Ian F.: A survey on wireless sensor networks for smart grid. En: Computer Communications 71 (2015), p. 22–33spa
dc.relation.referencesFitzek, F.H.P. ; Katz, M.D.: Cooperation in wireless networks: Principles and applications: Real egoistic behavior is to cooperate! Springer, 2006. – 1–641 p.. – cited By 186spa
dc.relation.referencesFriedman, Linda W. ; Friedman, Hershey H.: Analyzing simulation output using the bootstrap method. En: Simulation 64 (1995), Nr. 2, p. 95–100spa
dc.relation.referencesGera, P ; Garg, K ; Misra, M: Trust-based multi-path routing for enhancing data security in MANETs. En: International Journal of Network Security 16 (2014), Nr. 2, p. 102–111spa
dc.relation.referencesGershenson, Carlos ; Heylighen, Francis: When can we call a system self-organizing? En: European Conference on Artificial Life Springer, 2003, p. 606–614spa
dc.relation.referencesGhosekar, Pravin ; Katkar, Girish ; Ghorpade, Pradip: Mobile ad hoc networking: imperatives and challenges. En: IJCA Special issue on MANETs 3 (2010), p. 153–158spa
dc.relation.referencesHanbali, Ahmad ; Ibrahim, Mouhamad ; Simon, Vilmos ; Varga, Endre ; Carreras, Iacopo: A Survey of Message Diffusion Protocols in Mobile Ad Hoc Networks, 2008spa
dc.relation.referencesHardin, Garrett: The tragedy of the commons. En: science 162 (1968), Nr. 3859, p. 1243–1248spa
dc.relation.referencesHe, Qi ; Wu, Dapeng ; Khosla, Pradeep: SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks. En: 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No. 04TH8733) Vol. 2 IEEE, 2004, p. 825–830spa
dc.relation.referencesHegde, S B. ; Babu, B S. ; Venkataram, P: A Cognitive Theory-based Opportunistic Resource-Pooling Scheme for Ad hoc Networks. En: Journal of Intelligent Systems 26 (2017), Nr. 1, p. 47–68spa
dc.relation.referencesHilbe, Christian ; Šimsa, Štěpán ; Chatterjee, Krishnendu ; Nowak, Martin A.: Evolution of cooperation in stochastic games. En: Nature 559 (2018), Nr. 7713, p. 246–249spa
dc.relation.referencesJayanand, A ; Chenthil Kumaran, N: Trusted and authentication based routing security for MANET. En: International Journal of Applied Engineering Research 10 (2015), Nr. 1, p. 105–120spa
dc.relation.referencesKatz, M. ; Fitzek, F.H.P. ; Lucani, D.E. ; Seeling, P.: Mobile clouds as the building blocks of shareconomy: Sharing resources locally and widely. En: IEEE Vehicular Technology Magazine 9 (2014), Nr. 3, p. 63–71spa
dc.relation.referencesLi, W ; Parker, J ; Joshi, A: Security through collaboration and trust in MANETs. En: Mobile Networks and Applications 17 (2012), Nr. 3, p. 342–352spa
dc.relation.referencesLoo, Jonathan ; Mauri, Jaime L. ; Ortiz, Jesus H.: Mobile ad hoc networks: current status and future trends. CRC Press, 2016spa
dc.relation.referencesMandhare, V V. ; Thool, V R. ; Manthalkar, R R.: QoS Routing enhancement using metaheuristic approach in mobile ad-hoc network. En: Computer Networks 110 (2016), p. 180–191. – ISSN 1389–1286spa
dc.relation.referencesMani, P ; Kamalakkannan, P: Conviction based packet promotion scheme for efficient detection of selfish nodes in mobile Ad Hoc networks. En: International Review on Computers and Software 9 (2014), Nr. 2, p. 212–218spa
dc.relation.referencesMarias, Giannis F. ; Georgiadis, Panagiotis ; Flitzanis, D ; Mandalas, K: Cooperation enforcement schemes for MANETs: A survey. En: Wireless Communications and Mobile Computing 6 (2006), Nr. 3, p. 319–332spa
dc.relation.referencesMejia, Angela M.: Evolución genética de estrategias para modelos de confianza en redes móviles ad-hoc basados en teoría de juegos. 2010. – unpublished thesisspa
dc.relation.referencesMejia, M ; Peña, N ; Muñoz, J L. ; Esparza, O ; Alzate, M A.: A game theoretic trust model for on-line distributed evolution of cooperation inMANETs. En: Journal of Network and Computer Applications 34 (2011), Nr. 1, p. 39–51spa
dc.relation.referencesMertens, J-F ; Neyman, Abraham: Stochastic games. En: International Journal of Game Theory 10 (1981), Nr. 2, p. 53–66spa
dc.relation.referencesMichiardi, Pietro ; Molva, Refik: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. En: Advanced communications and multimedia security. Springer, 2002, p. 107–121spa
dc.relation.referencesMyerson, Roger B.: Game theory. Harvard university press, 2013spa
dc.relation.referencesNinu, S B. ; Behin Sam, S: A collaborative Intrusion Detection System for manet using data mining technique. En: ARPN Journal of Engineering and Applied Sciences 13 (2018), Nr. 14, p. 4387–4392spa
dc.relation.referencesOchoa, Gabriela: Setting the mutation rate: Scope and limitations of the 1/L heuristic. En: Proceedings of the 4th Annual Conference on Genetic and Evolutionary Computation, 2002, p. 495–502spa
dc.relation.referencesPariselvam, S ; Parvathi, R M S.: Trust based security mechanism for service discovery in MANET. En: Journal of Theoretical and Applied Information Technology 56 (2013), Nr. 2, p. 226–234spa
dc.relation.referencesPouyan, A A. ; Yadollahzadeh Tabari, M: FPN-SAODV: using fuzzy petri nets for securing AODV routing protocol in mobile Ad hoc network. En: International Journal of Communication Systems 30 (2017), Nr. 1spa
dc.relation.referencesRajeshwar, J ; Narsimha, G: Secure way routing protocol for mobile ad hoc network. En: Wireless Networks 23 (2017), Nr. 2, p. 345–354spa
dc.relation.referencesRapoport, Anatol ; Chammah, Albert M. ; Orwant, Carol J.: Prisoner’s dilemma: A study in conflict and cooperation. Vol. 165. University of Michigan press, 1965spa
dc.relation.referencesRaychaudhuri, Dipankar ; Gerla, Mario: Emerging wireless technologies and the future mobile internet. Cambridge University Press, 2011spa
dc.relation.referencesRaychaudhuri, Dipankar ; Mandayam, Narayan B.: Frontiers of wireless and mobile communications. En: Proceedings of the IEEE 100 (2012), Nr. 4, p. 824–840spa
dc.relation.referencesReddy, V B. ; Venkataraman, S ; Negi, A: A dynamic trust evolution model for MANETs based on mobility. En: International Journal of Ad Hoc and Ubiquitous Computing 28 (2018), Nr. 4, p. 230–246spa
dc.relation.referencesRoughgarden, Tim: Algorithmic game theory. En: Communications of the ACM 53 (2010), Nr. 7, p. 78–86spa
dc.relation.referencesSaha, H N. ; Singh, R ; Bhattacharyya, D ; Banerjee, P K.: Modified Fidelity Based On-Demand Secure (MFBOD) Routing Protocol in Mobile Ad-Hoc Network. En: Foundations of Computing and Decision Sciences 40 (2015), Nr. 4, p. 267–298spa
dc.relation.referencesShannon, Claude E.: A mathematical theory of communication. En: ACM SIGMO- BILE mobile computing and communications review 5 (2001), Nr. 1, p. 3–55spa
dc.relation.referencesSridhar, S ; Nagaraju, V ; Bapu, B R T. ; Shankar, R ; Anitha, R: Trusted and optimized routing in mobile ad-hoc networks emphasizing quality of service. En: Applied Mathematics and Information Sciences 12 (2018), Nr. 3, p. 655–663spa
dc.relation.referencesThorat, S A. ; Kulkarni, P J.: Opportunistic Routing in Presence of Selfish Nodes for MANET. En: Wireless Personal Communications 82 (2015), Nr. 2, p. 689–708spa
dc.relation.referencesTonguz, Ozan K. ; Ferrari, Gianluigi: A communication-theoretic approach to ad hoc wireless networking. En: 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks Vol. 2 IEEE, 2006, p. 715–722spa
dc.relation.referencesVega, Diego A. ; Ospina, Juan P. ; Latorre, Julian F. ; Ortiz, Jorge E.: An adaptive trust model for achieving emergent cooperation in ad hoc networks. En: Current Trends in Semantic Web Technologies: Theory and Practice. Springer, 2019, p. 85–100spa
dc.relation.referencesVekaria, Kanta ; Clack, Chris: Selective crossover in genetic algorithms: An empirical study. En: International Conference on Parallel Problem Solving from Nature Springer, 1998, p. 438–447spa
dc.relation.referencesWooldridge, Michael: An introduction to multiagent systems. John Wiley & Sons, 2009spa
dc.relation.referencesYang, Hao ; Shu, James ; Meng, Xiaoqiao ; Lu, Songwu: SCAN: self-organized network-layer security in mobile ad hoc networks. En: IEEE Journal on Selected Areas in Communications 24 (2006), Nr. 2, p. 261–273spa
dc.relation.referencesZhang, Qing ; Yu, Ting ; Irwin, Keith: A Classification Scheme for Trust Functions in Reputation-Based Trust Management. En: ISWC Workshop on Trust, Security, and Reputation on the Semantic Web Vol. 127 Citeseer, 2004spa
dc.relation.referencesZhang, Yujun ; Yan, Tan ; Tian, Jie ; Hu, Qi ; Wang, Guiling ; Li, Zhongcheng: TOHIP: A topology-hiding multipath routing protocol in mobile ad hoc networks. En: Ad Hoc Networks 21 (2014), p. 109–122. – ISSN 1570–8705spa
dc.relation.referencesZhong, Sheng ; Chen, Jiang ; Yang, Yang R.: Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. En: IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No. 03CH37428) Vol. 3 IEEE, 2003, p. 1987–1997spa
dc.rights.accessrightsinfo:eu-repo/semantics/openAccessspa
dc.rights.licenseReconocimiento 4.0 Internacionalspa
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/spa
dc.subject.ddc000 - Ciencias de la computación, información y obras generalesspa
dc.subject.lembLocal area networks (Computer networks)eng
dc.subject.lembRedes de área local (Computadores)spa
dc.subject.lembComputer algorithmseng
dc.subject.lembAlgoritmos (Computadores)spa
dc.subject.lembComputer networks - design and constructioneng
dc.subject.lembRedes de computadores - Diseño y construcciónspa
dc.subject.proposalAuto-organizaciónspa
dc.subject.proposalCooperaciónspa
dc.subject.proposalConfianzaspa
dc.subject.proposalAdaptaciónspa
dc.subject.proposalRedes ad-hocspa
dc.subject.proposalSelf-organizationeng
dc.subject.proposalCooperationeng
dc.subject.proposalTrusteng
dc.subject.proposalAdaptationeng
dc.subject.proposalAd-hoc networkseng
dc.titleModelo de confianza evolutivo para lograr cooperación emergente en redes ad-hoc a través de algoritmos genéticosspa
dc.title.translatedEvolutionary trust model to achieve emergent cooperation in ad-hoc networks through genetic algorithmseng
dc.typeTrabajo de grado - Maestríaspa
dc.type.coarhttp://purl.org/coar/resource_type/c_bdccspa
dc.type.coarversionhttp://purl.org/coar/version/c_ab4af688f83e57aaspa
dc.type.contentTextspa
dc.type.driverinfo:eu-repo/semantics/masterThesisspa
dc.type.redcolhttp://purl.org/redcol/resource_type/TMspa
dc.type.versioninfo:eu-repo/semantics/acceptedVersionspa
dcterms.audience.professionaldevelopmentEstudiantesspa
dcterms.audience.professionaldevelopmentInvestigadoresspa
dcterms.audience.professionaldevelopmentMaestrosspa
dcterms.audience.professionaldevelopmentPúblico generalspa
oaire.accessrightshttp://purl.org/coar/access_right/c_abf2spa

Archivos

Bloque original

Mostrando 1 - 1 de 1
Cargando...
Miniatura
Nombre:
1015453545.2021.pdf
Tamaño:
2.31 MB
Formato:
Adobe Portable Document Format
Descripción:
Tesis de Maestría en Ingeniería de Sistemas y Computación

Bloque de licencias

Mostrando 1 - 1 de 1
Cargando...
Miniatura
Nombre:
license.txt
Tamaño:
3.98 KB
Formato:
Item-specific license agreed upon to submission
Descripción: