Browse > Article
http://dx.doi.org/10.3837/tiis.2012.04.001

PRI: A Practical Reputation-based Incentive Scheme for Delay Tolerant Networks  

Zhang, Xi (School of Electronic Science and Engineering, National University of Defense Technology)
Wang, Xiaofei (School of Electronic Science and Engineering, National University of Defense Technology)
Liu, Anna (School of Electronic Science and Engineering, National University of Defense Technology)
Zhang, Quan (School of Electronic Science and Engineering, National University of Defense Technology)
Tang, Chaojing (School of Electronic Science and Engineering, National University of Defense Technology)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.6, no.4, 2012 , pp. 973-988 More about this Journal
Abstract
Delay tolerant networks (DTNs) characterized by the lack of guaranteed end-to-end paths exploit opportunistic data forwarding mechanism, which depends on the hypothesis that nodes are willing to store, carry, and forward the in-transit messages in an opportunistic way. However, this hypothesis might easily be violated by the presence of selfish nodes constrained with energy, bandwidth, and processing power. To address this problem, we propose a practical reputation-based incentive scheme, named PRI, to stimulate honest forwarding and discipline selfish behavior. A novel concept of successful forwarding credential and an observation protocol are presented to cope with the detection of nodes' behavior, and a reputation model is proposed to determine egoistic individuals. The simulation results demonstrate the effectiveness and practicality of our proposal.
Keywords
DTNs; reputation; incentive; cooperation; security;
Citations & Related Records

Times Cited By Web Of Science : 0  (Related Records In Web of Science)
연도 인용수 순위
  • Reference
1 S. Burleigh, A. Hooke, L. Torgerson, K. Fall, V. Cerf, B. Durst, K. Scott, and H. Weiss, "Delay-tolerant networking: An approach to interplanetary Internet," IEEE Communications Magazine, vol.41, no.6, pp.128-136, Jun.2003.   DOI   ScienceOn
2 K. Fall, "A delay-tolerant network architecture for challenged Internets," Computer Communication Review, vol.33, no.4, pp.27-34, Oct.2003.
3 K. Fall and S. Farrell, "DTN: An architectural retrospective," IEEE Journal on Selected Areas in Communications, vol.26, no.5, pp.828-836, Jun.2008.
4 A. McMahon and S. Farrell, "Delay- and Disruption-Tolerant Networking," IEEE Internet Computing, vol.13, no.6, pp.82-87, Nov.2009.
5 S. Farrell, V. Cahill, D. Geraghty, I. Humphreys and P. McDonald, "When TCP breaks - Delayand disruption-tolerant networking," IEEE Internet Computing, vol.10, no.4, pp.72-78, Jul.2006.
6 S. Jain, K. Fall and R. Patra, "Routing in a delay tolerant network," Computer Communication Review, vol.34, no.4, pp.145-157, Oct.2004.   DOI   ScienceOn
7 T. Spyropoulos, K. Psounis and C. S. Raghavendra, "Efficient routing in intermittently connected mobile networks: The single-copy case," IEEE-ACM Transactions on Networking, vol.16, no.1, pp.63-76, Feb.2008.
8 T. Spyropoulos, K. Psounis and C. S. Raghavendra, "Efficient routing in intermittently connected mobile networks: The multiple-copy case," IEEE-ACM Transactions on Networking, vol.16, no.1, pp.77-90, Feb.2008.
9 H. J. Zhu, X. D. Lin, R. X. Lu, Y. F. Fan and X. M. Shen, "SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks," IEEE Transactions on Vehicular Technology, vol.58, no.8, pp.4628-4639, Oct.2009.   DOI
10 R. Lu, X. Lin, H. Zhu and X. Shen, "Pi:A Practical Incentive Protocol for Delay Tolerant Networks," IEEE Transactions on Wireless Communications, vol.9, no.4, pp.1483-1493, Apr. 2010.
11 Y. Li, G. L. Su, D. O. Wu, D. P. Jin, L. Su and L. G. Zeng, "The Impact of Node Selfishness on Multicasting in Delay Tolerant Networks," IEEE Transactions on Vehicular Technology, vol.60, no.5, pp.2224-2238, Jun.2011.
12 Q. He, D. P. Wu and P. Khosla, "A secure incentive architecture for ad hoc networks," Wireless Communications & Mobile Computing, vol.6, no.3, pp.333-346, May.2006.   DOI   ScienceOn
13 G. F. Marias, P. Georgiadis, D. Flitzanis and K. Mandalas, "Cooperation enforcement schemes for MANETs: a survey," Wireless Communications & Mobile Computing, vol.6, no.3, pp.319-332, May.2006.   DOI   ScienceOn
14 R. Sakai, K. Ohgishi and M. Kasahara, "Cryptosystems based on pairing," in Proc. of Symposium on Cryptography and Information Security, pp. 26-28, Jan.2000.
15 Y. Yoo and D. P. Agrawal, "Why does it pay,to be selfish in a MANET?," IEEE Wireless Communications, vol.13, no.6, pp.87-97, Dec.2006.   DOI
16 S. Buchegger and J. Y. Le Boudec, "Self-policing mobile ad hoc networks by reputation systems," IEEE Communications Magazine, vol.43, no.7, pp.101-107, Jul.2005.
17 H. C. Tsai, N. W. Lo and T. C. Wu, "A Threshold-Adaptive Reputation System on Mobile Ad Hoc Networks," IEICE Transactions on Information and Systems, vol.E92D, no.5, pp.777-786, May.2009.
18 X. Y. Li and X. L. Gui, "A Comprehensive and Adaptive Trust Model for Large-Scale P2P Networks," Journal of Computer Science and Technology, vol.24, no.5, pp.868-882, Sep.2009.   DOI   ScienceOn
19 A. Boukerch, L. Xu and K. El-Khatib, "Trust-based security for wireless ad hoc and sensor networks," Computer Communications, vol.30, no.18, pp.2413-2427, Sep.2007.
20 M. Karaliopoulos, "Assessing the Vulnerability of DTN data relaying schemes to node selfishness," IEEE Communications Letters, vol.13, no.12, pp.923-925, Dec.2009.   DOI
21 Q. H. Li, S. C. Zhu, G. H. Cao and IEEE, "Routing in socially selfish delay tolerant networks," in Proc. of 2010 IEEE Infocom, pp.1-9, Mar.2010.
22 Y. Li, P. Hui, D. P. Jin, L. Su and L. G. Zeng, "Evaluating the impact of social selfishness on the epidemic routing in delay tolerant networks," IEEE Communications Letters, vol.14, vol.11, pp.1026-1028, Nov.2010.   DOI
23 K. Scott and S. Burleigh, "Bundle protocol specification," IETF RFC 5050, Nov.2007.
24 The One Simulator. Available: http://www.netlab.tkk.fi/tutkimus/dtn/theone/