Discovering Socio-Behavioral Metrics in Mobile Ad-Hoc Systems

(*) Corresponding author

Authors' affiliations

DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)


This paper proposed and developed socio-metrics for MANET performance evaluation. It is assumed that a MANET node is a socio-cognitive-technology system whose entities assume the behaviors of human and technology agents. Using the principles of network connectivity, we identify both intrinsic- and system level extrinsic- factors for the model development. The values of the intrinsic- and extrinsic- variables are generated using known fuzzy models. We analyze the contributions of the socio-metrics to the overall MANET system performance. The simulation outcomes inform that: (a) MANET nodes seek to achieve the same system goals after a significant period of interaction. We observe this as (a) MANET with less trust (10%) initially increased its trust level to about 25% after nine iterations of a simulation experiment; (b) Nodes will collaborate to achieve a singular system level goal as shown in balancing elements of the system level performance where high cooperation and self-awareness scores were reduced so as to create more trust and shared information awareness. This was achieved by incorporating behavior updating mechanisms into the simulation model. The learning mechanisms systematically train nodes in the MANET system to cooperate, trust, share information, and have self-awareness by adjusting their individual achievement weights
Copyright © 2013 Praise Worthy Prize - All rights reserved.


Fuzzy Markov Decision Process; Possibility Distribution; MANET

Full Text:



C.A. Ntuen, G. Kim, E. Bowman and I. Purush, An agent-based model simulation of multiple collaborating mobile ad hoc networks (MANETs), Proceedings of the 16th COMMAND and CONTROL RESEARCH TECHNOLOGY SYMPOSIUM, pp. 61-71, June 21-23, 2011, Quebec City, Canada.

M.S. Corson, J.P. Macker and Cirincione G.H., Internet-based mobile ad hoc, IEEE INTERNET COMPUTING, 3 (4), 1999.

C.E. Perkins and P. Bhagwat, Highly dynamic destination sequenced distance-vector routing (DSDV) for mobile computers, Computer Communications Review 24 (4), 1994 pp. 234–244.

V. N. Raghavan, T. Venkatesh, M. L. Peer and D. P. Praveen, Evaluating performance of quality-of-service in large networks, Proceedings of WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, 2007, v. 20.

R. Kalaba and L.Tesfatsion, Exact sequential, smoothing and prediction for non linear systems, Non-Linear Analysis 12 (6), 1998, pp. 599-615.

R. Kumar, P. Raghavan and S. R. D. Sivakumar (2000), “Stochastic models for the web graph”, In FOCS : IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS), pages 57–65.

M. Callon, Techno-economic networks and irreversibility, A Sociology of Monsters: Essays on Power, Technology and Domination, In J. Law (Ed.), London: Routledge, 1991, pp. 132–165.

B. Latour, "Where are the Missing Masses? The Sociology of a Few Mundane Artifacts, Shaping Technology Building Society: Studies in Sociotechnical Change, In W. Bijker & J. Law (Eds.), MIT Press, USA, 1992, pp.225–258.

Y. L. Sun, W. Yu, Z. Han and K. J. Ray Liu, Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks, IEEE Journal on Selected Areas in Communications, v. 24, no. 2, 2006.

X. Luo, C. Zhang and H.Leung, Information sharing between heterogeneous uncertain reasoning models in a multi-agent environment: a case study, International Journal of Approximate Reasoning; v. 27, Issue 1, 200, pp. 27–59.

M. R. Ensley and W.M. Jones, Situation awareness, information dominance, and information warfare, Wright-Patterson AFB, OH: United States Air Force Armstrong Laboratory, 1997.

J. Klewes and R. Wreschniok, Reputation Capital: Building and Maintaining Trust in the 21st Century (Springer Heidelberg Dordrecht London New York, 2009).

L. Zhou,Secure, Ad Hoc Networking, IEEE NETWORK, v.13, Issue: 6, 1999, pp. 24 – 30.

T. Karhima, P. Lindroos, M. Hall, and S. G. Haggman, A link level study of 802.11b mobile ad-hoc network in military environment, Proceedings of MILITARY COMMUNICATIONS CONFERENCE, v.3, 2005, pp. 1883- 1886.

M.S. Thompson, A.B. Mackenzie, L.A. DaSilva, G. Hadjichristofi, A mobile ad hoc networking competition: A retrospective look at the maniac challenge, IEEE COMMUNICATIONS MAGAZINE, v. 50, Issue: 7, 2012, pp. 121 – 127.

V. Srinivasan, P. Nuggehalli, C. F. Chiasserini and R. R. Ramesh, Cooperation in Wireless Ad Hoc Networks, IEEE INFOCOM, 2003.

Theodorakopoulos and J. S. Baras, On Trust Models and Trust Evaluation Metrics for Ad Hoc Networks, IEEE Journal on Selected Areas in Communications, v. 24, no. 2, 2006, pp. 318-328.

T. Yu, M. Winslett and K. E. Seamons, Supporting Structured Credentials and Sensitive Policies through Interoperable Strategies in Automated Trust Negotiation, ACM Transaction on Information and System Security, v.6 issue 1, 2003, pp. 1-42.

W. Gong, Z. You, D. Chen, X. Zhao, M. Gu and K.Lam, Trust Based Malicious Nodes Detection in MANET, International Conference on E-BUSINESS AND INFORMATION SYSTEM SECURITY, 2009.

P. Tompkins (2003) “Truth and trust in cyberspace in World Association of Christian Communication”,

O. Younis, L. Kant, A. Mcauley, K. Manousakis, D. Shallcross, K. Sinkar, K. Chang, K. Young, C. Graff, M. Patel, Cognitive tactical network models, IEEE COMMUNICATIONS MAGAZINE, v. 48 , Issue 10, 2010, pp. 70 – 77.

R. W. Thomas, L. A. DaSilva, and A.B. MacKenzie, Cognitive Networks, Proceedings 1st IEEE Int’l SYMPOSIUM on NEW FRONTIERS in DYNAMIC SPECTRUM ACCESS NETWORKS, 8-11 Nov. 2005, pp. 352-360.

N. Bai, Sadagopan, and A. Helmy, IMPORTANT: a framework to systematically analyze the impact of mobility on performance of routing protocols for adhoc networks, IEEE, INFOCOM, April 2003.

M. Amandeep, B. Bharat, Shelja, and T. Sunil, A Study on the Behavior of MANET Routing Protocols with Varying Densities and Dynamic Mobility Patterns, International Journal of Innovation, Management and Technology, ,v. 2, No. 3.2011.

S. Deepa, D.M. Kadhar Nawaz, A Study on the Behavior of MANET Routing Protocols with Varying Densities and Dynamic Mobility Patterns, IJCA Special Issue on Mobile Ad-hoc Networks, 2010, pp. 124-128.

F.Martinez, V. Stolfo, S. Keromytis and D. Angelos, BARTER: Profile Model Exchange for Behavior-Based Access Control and communication Security in MANETs, Technical reports, Columbia University Computer Science Technical Reports, 2007.

H. Yang, H. Luo, F. Ye, S. Lu and L. Zhang, Security in Mobile Ad-Hoc Wireless Networks: Challenges and Solutions, IEEE Wireless Communications Magazine, 2004, (invited submission).

Y. Zhang, W. Lee and Y. Huang, Intrusion detection techniques for mobile networks, Wireless Networks, v. 9, Issue 5, 2003.

DaSilva and Srivastava, Node Participation in Ad Hoc and Peer-to-Peer Networks: A Game-Theoretic Formulation, Workshop on GAMES and EMERGENT BEHAVIOR in DISTRIBUTED COMPUTING ENVIRONMENTS, 2004.

R. Axelrod, The Evolution of Cooperation (Basic Books, 1984).

S. T. Desney, S. Zhou, J. Ho, J. Mehta and H. Tanabe, Design and Evaluation of an Individually Simulated Mobility Model, WIRELESS AD HOC NETWOKS COMMUNICATION NETWORKS and DISTRIBUTED SYSTEMS MODELING and SIMULATION Conference, 2002.

S. Venkatraman, H. S. Kumar, A. Sundarrajan, and M. Ramakrishna, Reliability Improvement of Real-Time Data in MANET - A Proposal, International Conference on WIRELESS COMMUNICATION and SENSOR COMPUTING, 2010.

J. Cannady, Real-Time Detection of Distributed Zero-Day Attacks in ad hoc networks, Proceedings of the 5th international conference on INFORMATION WARFARE and SECURITY. Wright-Patterson AFB, 2010, Ohio, USA.

D. M. Rousseau, S. B. Sitkin, R. S. Burt and C. Camerer, Not so different after all: A cross-discipline view of trust, Academy of Management Review, 23, 1998, pp. 393– 404.

G. Simmel, The Sociology of Georg Simmel, In K. H.Wolff (Transl., Ed. and Intr.), New York: Free Press, 1950. [German, original, 1908].

M. Granovetter, Economic Action and Social Structure: the Problem of Embeddedness, American Journal of Sociology, 91, 1985, pp. 481-93 (first half).

R. Burt, Structural Holes (Cambridge, MA, Harvard University Press, 1992).

D. Krackhardt, The Ties that Torture: Simmelian Tie Analysis in Organizations, Research in the Sociology of Organizations, 16, 1999, pp.183-210.

D. Krackhardt, The Ties that Torture: Simmelian Tie Analysis in Organizations, Research in the Sociology of Organizations, 16, 1999, pp.183-210.

Weisstein, Eric W, Circle-Circle Intersection, In MathWorld--A Wolfram Web Resource .

W.B. Vasantha Kandasamy, F. Smarandache and K. Ilanthenral, Elementary Fuzzy Matrix Theory and Fuzzy Models for Social Scientists (Los Angeles: American Research Press, 2007).

W. Morgan and R. P. Dilworth, Residuated Lattices, Transactions of the American Mathematical Society, 1939.

J. Chenou, (2012), An Agent-Based Modeling Simulation of Mobile Ad Hoc Networks, Ph.D. Dissertation, Dept. of Ind. and Sys. Eng., North Carolina A & T State Univ., Greensboro, NC, 2012.


  • There are currently no refbacks.

Please send any question about this web site to
Copyright © 2005-2023 Praise Worthy Prize