{"title":"Performance evaluation of cheating host in ALM over wireless multi-hop networks","authors":"K. Kitayama, Kunihiko Takahashi, M. Yamamoto","doi":"10.1109/APCC.2009.5375478","DOIUrl":null,"url":null,"abstract":"ALM (Application Level Multicast) is one of the promising ways for resolving multicast incentive problem of non-multicast hosts not implementing multicast routing protocol. ALM protocol is implemented in application layer, which means it is easier to be altered by end users than lower layer protocols. Malicious users would like to get higher position in ALM tree because it can obtain higher throughput and lower delay. They also would not like other hosts to be connected because of forwarding burden will bring them wireless throughput degradation. This paper evaluates performance improvement perceived by a malicious user and shows that surprisingly it can obtain performance improvement only with almost 50% probability. We also investigate the reason why this performance effect and show that link sharing with other ALM hosts in long hops is one of the reasons of performance degradation of malicious users.","PeriodicalId":217893,"journal":{"name":"2009 15th Asia-Pacific Conference on Communications","volume":"140 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 15th Asia-Pacific Conference on Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/APCC.2009.5375478","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
ALM (Application Level Multicast) is one of the promising ways for resolving multicast incentive problem of non-multicast hosts not implementing multicast routing protocol. ALM protocol is implemented in application layer, which means it is easier to be altered by end users than lower layer protocols. Malicious users would like to get higher position in ALM tree because it can obtain higher throughput and lower delay. They also would not like other hosts to be connected because of forwarding burden will bring them wireless throughput degradation. This paper evaluates performance improvement perceived by a malicious user and shows that surprisingly it can obtain performance improvement only with almost 50% probability. We also investigate the reason why this performance effect and show that link sharing with other ALM hosts in long hops is one of the reasons of performance degradation of malicious users.