Node Incentive Mechanism in Selfish Opportunistic Network |
WANG, Hao-tian
(School of Software, Central South University)
Chen, Zhi-gang (School of Software, Central South University) WU, Jia (School of Software, Central South University) WANG, Lei-lei (School of Software, Central South University) |
1 | Hui-Juan L I, Zhang Z Y, Yang W Z, et al., "Node incentive mechanism in opportunistic networks[J]," Computer Engineering and Design, 2016. |
2 | Alese B K, Thompson A F, Oni P Y, "A location privacy system in mobile network using game theory[C]," in Proc. of International Conference on Cyber Situational Awareness, Data Analytics and Assessment, pp. 1-5, 2017. |
3 | Ning T, Yang Z, Wu H, et al., "Self-Interest-Driven incentives for ad dissemination in autonomous mobile social networks[C]," in Proc. of IEEE INFOCOM, 2310-2318, 2013. |
4 | Boulis A, Srivastava M B, "Node-level energy management for sensor networks in the presence of multiple applications[C]," in Proc. of the First IEEE International Conference on Pervasive Computing and Communications, 41-49, 2003. |
5 | Shevade U, Song H H, Qiu L, et al., "Incentive-aware routing in DTNs[C]," in Proc. of 2008 IEEE Inernational Conference on Network Protocols, 238-247, 2008. |
6 | Zhou H, Chen J, Fan J, et al., "ConSub: Incentive-Based Content Subscribing in Selfish Opportunistic Mobile Networks[J]," IEEE Journal on Selected Areas in Communications, Vol. 31, no. 9, 669-679, 2013. DOI |
7 | Mota V F S, Macedo D F, Ghamridoudane Y, et al., "A message-based incentive mechanism for opportunistic networking applications[C]," in Proc. of IEEE Symposium on Computers and Communication (ISCC), 277-282, 2015. |
8 | He G, Debbah M, Lasaulce S, "Game theory for OFDM systems with incomplete information[J]," Game Theory for Wireless Communications and Networking, 2009. |
9 | Bigwood G, Henderson T, "IRONMAN: Using Social Networks to Add Incentives and Reputation to Opportunistic Networks[C]," in Proc. of 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing, 65-72, 2011. |
10 | Wu J, Chen Z G and Zhao M, "Effective information transmission based on socialization nodes in opportunistic networks," Computer networks, Vol. 129, Part 1, 297-305, December 24, 2017. DOI |
11 | Burgess J, Bissias G D, Corner M D, et al., "Surviving attacks on disruption-tolerant networks without authentication[C]," in Proc. of ACM international symposium on Mobile ad hoc networking and computing, 61-70, 2007. |
12 | Li F, Wu J, Srinivasan A, "Thwarting Blackhole Attacks in Disruption-Tolerant Networks using Encounter Tickets [C]," in Proc. of IEEE INFOCOM 2009, 2428-2436, 2009. |
13 | Lilien L, Kamal Z H, Bhuse V, et al., "The Concept of Opportunistic Networks and their Research Challenges in Privacy and Security [J]," Mobile and Wireless Network Security and Privacy, 85-117, 2007. |
14 | Lindgren A, Hui P, "The quest for a killer app for opportunistic and delay tolerant networks:(invited paper) [C]," in Proc. of the 4th ACM workshop on Challenged networks, 59-66, 2009. |
15 | Boldrini, Chiara, M. Conti, and A. Passarella, "Exploiting users' social relations to forward data in opportunistic networks: The HiBOp solution," Pervasive and Mobile Computing, Vol. 4, no. 5, 633-657, 2008. DOI |
16 | Xiao M, Wu J, Huang L, "Community-Aware Opportunistic Routing in Mobile Social Networks[M]," IEEE Transactions on Computers, Vol. 63, no. 7, 1682-1695, 2014. DOI |
17 | M. Jo, L. Han, D. Kim and H. P. In, "Selfish attacks and detection in cognitive radio Ad-Hoc networks," IEEE Network, vol. 27, no. 3, 46-50, May-June 2013. DOI |
18 | Wu J, Chen Z G, "Sensor communication area and node extend routing algorithm in opportunistic networks," Peer-to-Peer Networking and Applications, Vol. 11, no. 1, 90-100, January 2018. DOI |
19 | Das D, Majumder K, Dasgupta A, "Selfish Node Detection and Low Cost Data Transmission in MANET using Game Theory [J]," Procedia Computer Science, Vol. 54, 92-101, 2015. DOI |
20 | Wang, Eric Ke, et al., "Analyzing Selfish Behavior in Opportunistic Networks," in Proc. of 2017 14th International Symposium on Pervasive Systems, Algorithms and Networks & 2017, International Conference on Frontier of Computer Science and Technology & 2017 Third International Symposium of Creative Computing (ISPAN-FCST-ISCC), 218-225, 2017. |
21 | Li Y, Su G, Wang Z, "Evaluating the effects of node cooperation on DTN routing[J]," AEU - International Journal of Electronics and Communications, Vol. 66, no. 1, 62-67, 2012. DOI |
22 | Xu N,Rangwala S, Chintalapudi K, et al., "AA wireless sensor network for structural monitoring [C]," in Proc. of the ACM Conference on Embedded Networked Sensor Systems.Baltimore MD, 2004. |
23 | Alajeely M, Ahmad A, Doss R, "Malicious Node Traceback in Opportunistic Networks Using Merkle Trees[C]," in Proc. of 2015 IEEE International Conference on Data Science and Data Intensive Systems, 147-152, 2015. |
24 | Liu H, Lee P P C, Lui J C S, "On the credit evolution of credit-based incentive protocols in wireless mesh networks[J]," Computer Networks, Vol. 57, no. 17, 3327-3343, 2013. DOI |
25 | Li Y, Yu J, Wang C, et al., "A novel bargaining based incentive protocol for opportunistic networks[J]," in Proc. of 2012 IEEE Global Communications Conference (GLOBECOM), 5285-5289, 2012. |
26 | Wu J, Chen Z G and Zhao M, "Information cache management and data transmission algorithm in opportunistic social networks", Wireless networks, Vol. 25, no. 160, pp 1-12, 2018. DOI |
27 | Lu X, Hui P, "An Energy-Efficient n-Epidemic Routing Protocol for Delay Tolerant Networks[C]," in Proc. of IEEE Fifth International Conference on Networking, Architecture, and Storage, 341-347, 2010. |
28 | Liu L, "A Survey on Reputation-Based Incentive Mechanism in Opportunistic Networks[J]," Applied Mechanics and Materials, Vol. 543-547, 4288-4290, 2014. DOI |