DOI QR코드

DOI QR Code

PRI: A Practical Reputation-based Incentive Scheme for Delay Tolerant Networks

  • Zhang, Xi (School of Electronic Science and Engineering, National University of Defense Technology) ;
  • Wang, Xiaofei (School of Electronic Science and Engineering, National University of Defense Technology) ;
  • Liu, Anna (School of Electronic Science and Engineering, National University of Defense Technology) ;
  • Zhang, Quan (School of Electronic Science and Engineering, National University of Defense Technology) ;
  • Tang, Chaojing (School of Electronic Science and Engineering, National University of Defense Technology)
  • Received : 2011.12.13
  • Accepted : 2012.04.06
  • Published : 2012.04.30

Abstract

Delay tolerant networks (DTNs) characterized by the lack of guaranteed end-to-end paths exploit opportunistic data forwarding mechanism, which depends on the hypothesis that nodes are willing to store, carry, and forward the in-transit messages in an opportunistic way. However, this hypothesis might easily be violated by the presence of selfish nodes constrained with energy, bandwidth, and processing power. To address this problem, we propose a practical reputation-based incentive scheme, named PRI, to stimulate honest forwarding and discipline selfish behavior. A novel concept of successful forwarding credential and an observation protocol are presented to cope with the detection of nodes' behavior, and a reputation model is proposed to determine egoistic individuals. The simulation results demonstrate the effectiveness and practicality of our proposal.

Keywords

References

  1. S. Burleigh, A. Hooke, L. Torgerson, K. Fall, V. Cerf, B. Durst, K. Scott, and H. Weiss, "Delay-tolerant networking: An approach to interplanetary Internet," IEEE Communications Magazine, vol.41, no.6, pp.128-136, Jun.2003. https://doi.org/10.1109/MCOM.2003.1204759
  2. K. Fall, "A delay-tolerant network architecture for challenged Internets," Computer Communication Review, vol.33, no.4, pp.27-34, Oct.2003.
  3. K. Fall and S. Farrell, "DTN: An architectural retrospective," IEEE Journal on Selected Areas in Communications, vol.26, no.5, pp.828-836, Jun.2008.
  4. A. McMahon and S. Farrell, "Delay- and Disruption-Tolerant Networking," IEEE Internet Computing, vol.13, no.6, pp.82-87, Nov.2009.
  5. S. Farrell, V. Cahill, D. Geraghty, I. Humphreys and P. McDonald, "When TCP breaks - Delayand disruption-tolerant networking," IEEE Internet Computing, vol.10, no.4, pp.72-78, Jul.2006.
  6. S. Jain, K. Fall and R. Patra, "Routing in a delay tolerant network," Computer Communication Review, vol.34, no.4, pp.145-157, Oct.2004. https://doi.org/10.1145/1030194.1015484
  7. T. Spyropoulos, K. Psounis and C. S. Raghavendra, "Efficient routing in intermittently connected mobile networks: The single-copy case," IEEE-ACM Transactions on Networking, vol.16, no.1, pp.63-76, Feb.2008.
  8. T. Spyropoulos, K. Psounis and C. S. Raghavendra, "Efficient routing in intermittently connected mobile networks: The multiple-copy case," IEEE-ACM Transactions on Networking, vol.16, no.1, pp.77-90, Feb.2008.
  9. H. J. Zhu, X. D. Lin, R. X. Lu, Y. F. Fan and X. M. Shen, "SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks," IEEE Transactions on Vehicular Technology, vol.58, no.8, pp.4628-4639, Oct.2009. https://doi.org/10.1109/TVT.2009.2020105
  10. R. Lu, X. Lin, H. Zhu and X. Shen, "Pi:A Practical Incentive Protocol for Delay Tolerant Networks," IEEE Transactions on Wireless Communications, vol.9, no.4, pp.1483-1493, Apr. 2010.
  11. Y. Li, G. L. Su, D. O. Wu, D. P. Jin, L. Su and L. G. Zeng, "The Impact of Node Selfishness on Multicasting in Delay Tolerant Networks," IEEE Transactions on Vehicular Technology, vol.60, no.5, pp.2224-2238, Jun.2011.
  12. Q. He, D. P. Wu and P. Khosla, "A secure incentive architecture for ad hoc networks," Wireless Communications & Mobile Computing, vol.6, no.3, pp.333-346, May.2006. https://doi.org/10.1002/wcm.399
  13. G. F. Marias, P. Georgiadis, D. Flitzanis and K. Mandalas, "Cooperation enforcement schemes for MANETs: a survey," Wireless Communications & Mobile Computing, vol.6, no.3, pp.319-332, May.2006. https://doi.org/10.1002/wcm.398
  14. Y. Yoo and D. P. Agrawal, "Why does it pay,to be selfish in a MANET?," IEEE Wireless Communications, vol.13, no.6, pp.87-97, Dec.2006. https://doi.org/10.1109/MWC.2006.275203
  15. S. Buchegger and J. Y. Le Boudec, "Self-policing mobile ad hoc networks by reputation systems," IEEE Communications Magazine, vol.43, no.7, pp.101-107, Jul.2005.
  16. H. C. Tsai, N. W. Lo and T. C. Wu, "A Threshold-Adaptive Reputation System on Mobile Ad Hoc Networks," IEICE Transactions on Information and Systems, vol.E92D, no.5, pp.777-786, May.2009.
  17. R. Sakai, K. Ohgishi and M. Kasahara, "Cryptosystems based on pairing," in Proc. of Symposium on Cryptography and Information Security, pp. 26-28, Jan.2000.
  18. X. Y. Li and X. L. Gui, "A Comprehensive and Adaptive Trust Model for Large-Scale P2P Networks," Journal of Computer Science and Technology, vol.24, no.5, pp.868-882, Sep.2009. https://doi.org/10.1007/s11390-009-9278-4
  19. A. Boukerch, L. Xu and K. El-Khatib, "Trust-based security for wireless ad hoc and sensor networks," Computer Communications, vol.30, no.18, pp.2413-2427, Sep.2007.
  20. M. Karaliopoulos, "Assessing the Vulnerability of DTN data relaying schemes to node selfishness," IEEE Communications Letters, vol.13, no.12, pp.923-925, Dec.2009. https://doi.org/10.1109/LCOMM.2009.12.091520
  21. Q. H. Li, S. C. Zhu, G. H. Cao and IEEE, "Routing in socially selfish delay tolerant networks," in Proc. of 2010 IEEE Infocom, pp.1-9, Mar.2010.
  22. Y. Li, P. Hui, D. P. Jin, L. Su and L. G. Zeng, "Evaluating the impact of social selfishness on the epidemic routing in delay tolerant networks," IEEE Communications Letters, vol.14, vol.11, pp.1026-1028, Nov.2010. https://doi.org/10.1109/LCOMM.2010.093010.100492
  23. K. Scott and S. Burleigh, "Bundle protocol specification," IETF RFC 5050, Nov.2007.
  24. The One Simulator. Available: http://www.netlab.tkk.fi/tutkimus/dtn/theone/

Cited by

  1. A secure, service priority‐based incentive scheme for delay tolerant networks vol.9, pp.1, 2016, https://doi.org/10.1002/sec.1372
  2. A Credit-Based Congestion-Aware Incentive Scheme for DTNs vol.7, pp.4, 2012, https://doi.org/10.3390/info7040071
  3. Attacks and countermeasures in the internet of vehicles vol.72, pp.5, 2012, https://doi.org/10.1007/s12243-016-0551-6