PRI: A Practical Reputation-based Incentive Scheme for Delay Tolerant Networks
![]() |
Zhang, Xi
(School of Electronic Science and Engineering, National University of Defense Technology)
Wang, Xiaofei (School of Electronic Science and Engineering, National University of Defense Technology) Liu, Anna (School of Electronic Science and Engineering, National University of Defense Technology) Zhang, Quan (School of Electronic Science and Engineering, National University of Defense Technology) Tang, Chaojing (School of Electronic Science and Engineering, National University of Defense Technology) |
1 | S. Burleigh, A. Hooke, L. Torgerson, K. Fall, V. Cerf, B. Durst, K. Scott, and H. Weiss, "Delay-tolerant networking: An approach to interplanetary Internet," IEEE Communications Magazine, vol.41, no.6, pp.128-136, Jun.2003. DOI ScienceOn |
2 | K. Fall, "A delay-tolerant network architecture for challenged Internets," Computer Communication Review, vol.33, no.4, pp.27-34, Oct.2003. |
3 | K. Fall and S. Farrell, "DTN: An architectural retrospective," IEEE Journal on Selected Areas in Communications, vol.26, no.5, pp.828-836, Jun.2008. |
4 | A. McMahon and S. Farrell, "Delay- and Disruption-Tolerant Networking," IEEE Internet Computing, vol.13, no.6, pp.82-87, Nov.2009. |
5 | S. Farrell, V. Cahill, D. Geraghty, I. Humphreys and P. McDonald, "When TCP breaks - Delayand disruption-tolerant networking," IEEE Internet Computing, vol.10, no.4, pp.72-78, Jul.2006. |
6 | S. Jain, K. Fall and R. Patra, "Routing in a delay tolerant network," Computer Communication Review, vol.34, no.4, pp.145-157, Oct.2004. DOI ScienceOn |
7 | T. Spyropoulos, K. Psounis and C. S. Raghavendra, "Efficient routing in intermittently connected mobile networks: The single-copy case," IEEE-ACM Transactions on Networking, vol.16, no.1, pp.63-76, Feb.2008. |
8 | T. Spyropoulos, K. Psounis and C. S. Raghavendra, "Efficient routing in intermittently connected mobile networks: The multiple-copy case," IEEE-ACM Transactions on Networking, vol.16, no.1, pp.77-90, Feb.2008. |
9 | H. J. Zhu, X. D. Lin, R. X. Lu, Y. F. Fan and X. M. Shen, "SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks," IEEE Transactions on Vehicular Technology, vol.58, no.8, pp.4628-4639, Oct.2009. DOI |
10 | R. Lu, X. Lin, H. Zhu and X. Shen, "Pi:A Practical Incentive Protocol for Delay Tolerant Networks," IEEE Transactions on Wireless Communications, vol.9, no.4, pp.1483-1493, Apr. 2010. |
11 | Y. Li, G. L. Su, D. O. Wu, D. P. Jin, L. Su and L. G. Zeng, "The Impact of Node Selfishness on Multicasting in Delay Tolerant Networks," IEEE Transactions on Vehicular Technology, vol.60, no.5, pp.2224-2238, Jun.2011. |
12 | Q. He, D. P. Wu and P. Khosla, "A secure incentive architecture for ad hoc networks," Wireless Communications & Mobile Computing, vol.6, no.3, pp.333-346, May.2006. DOI ScienceOn |
13 | G. F. Marias, P. Georgiadis, D. Flitzanis and K. Mandalas, "Cooperation enforcement schemes for MANETs: a survey," Wireless Communications & Mobile Computing, vol.6, no.3, pp.319-332, May.2006. DOI ScienceOn |
14 | R. Sakai, K. Ohgishi and M. Kasahara, "Cryptosystems based on pairing," in Proc. of Symposium on Cryptography and Information Security, pp. 26-28, Jan.2000. |
15 | Y. Yoo and D. P. Agrawal, "Why does it pay,to be selfish in a MANET?," IEEE Wireless Communications, vol.13, no.6, pp.87-97, Dec.2006. DOI |
16 | S. Buchegger and J. Y. Le Boudec, "Self-policing mobile ad hoc networks by reputation systems," IEEE Communications Magazine, vol.43, no.7, pp.101-107, Jul.2005. |
17 | H. C. Tsai, N. W. Lo and T. C. Wu, "A Threshold-Adaptive Reputation System on Mobile Ad Hoc Networks," IEICE Transactions on Information and Systems, vol.E92D, no.5, pp.777-786, May.2009. |
18 | X. Y. Li and X. L. Gui, "A Comprehensive and Adaptive Trust Model for Large-Scale P2P Networks," Journal of Computer Science and Technology, vol.24, no.5, pp.868-882, Sep.2009. DOI ScienceOn |
19 | A. Boukerch, L. Xu and K. El-Khatib, "Trust-based security for wireless ad hoc and sensor networks," Computer Communications, vol.30, no.18, pp.2413-2427, Sep.2007. |
20 | M. Karaliopoulos, "Assessing the Vulnerability of DTN data relaying schemes to node selfishness," IEEE Communications Letters, vol.13, no.12, pp.923-925, Dec.2009. DOI |
21 | Q. H. Li, S. C. Zhu, G. H. Cao and IEEE, "Routing in socially selfish delay tolerant networks," in Proc. of 2010 IEEE Infocom, pp.1-9, Mar.2010. |
22 | Y. Li, P. Hui, D. P. Jin, L. Su and L. G. Zeng, "Evaluating the impact of social selfishness on the epidemic routing in delay tolerant networks," IEEE Communications Letters, vol.14, vol.11, pp.1026-1028, Nov.2010. DOI |
23 | K. Scott and S. Burleigh, "Bundle protocol specification," IETF RFC 5050, Nov.2007. |
24 | The One Simulator. Available: http://www.netlab.tkk.fi/tutkimus/dtn/theone/ |
![]() |