Browse > Article
http://dx.doi.org/10.3837/tiis.2019.03.021

Node Incentive Mechanism in Selfish Opportunistic Network  

WANG, Hao-tian (School of Software, Central South University)
Chen, Zhi-gang (School of Software, Central South University)
WU, Jia (School of Software, Central South University)
WANG, Lei-lei (School of Software, Central South University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.13, no.3, 2019 , pp. 1481-1501 More about this Journal
Abstract
In opportunistic network, the behavior of a node is autonomous and has social attributes such as selfishness.If a node wants to forward information to another node, it is bound to be limited by the node's own resources such as cache, power, and energy.Therefore, in the process of communication, some nodes do not help to forward information of other nodes because of their selfish behavior. This will lead to the inability to complete cooperation, greatly reduce the success rate of message transmission, increase network delay, and affect the overall network performance. This article proposes a hybrid incentive mechanism (Mim) based on the Reputation mechanism and the Credit mechanism.The selfishness model, energy model (The energy in the article exists in the form of electricity) and transaction model constitute our Mim mechanism. The Mim classifies the selfishness of nodes and constantly pay attention to changes in node energy, and manage the wealth of both sides of the node by introducing the Central Money Management Center. By calculating the selfishness of the node, the currency trading model is used to differentiate pricing of the node's services. Simulation results show that by using the Mim, the information delivery rate in the network and the fairness of node transactions are improved. At the same time, it also greatly increases the average life of the network.
Keywords
Selfish node; Incentives; Cooperative; Diversity; Hybrid Mechanism (Mim); Credit; Reputation;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Hui-Juan L I, Zhang Z Y, Yang W Z, et al., "Node incentive mechanism in opportunistic networks[J]," Computer Engineering and Design, 2016.
2 Alese B K, Thompson A F, Oni P Y, "A location privacy system in mobile network using game theory[C]," in Proc. of International Conference on Cyber Situational Awareness, Data Analytics and Assessment, pp. 1-5, 2017.
3 Ning T, Yang Z, Wu H, et al., "Self-Interest-Driven incentives for ad dissemination in autonomous mobile social networks[C]," in Proc. of IEEE INFOCOM, 2310-2318, 2013.
4 Boulis A, Srivastava M B, "Node-level energy management for sensor networks in the presence of multiple applications[C]," in Proc. of the First IEEE International Conference on Pervasive Computing and Communications, 41-49, 2003.
5 Shevade U, Song H H, Qiu L, et al., "Incentive-aware routing in DTNs[C]," in Proc. of 2008 IEEE Inernational Conference on Network Protocols, 238-247, 2008.
6 Zhou H, Chen J, Fan J, et al., "ConSub: Incentive-Based Content Subscribing in Selfish Opportunistic Mobile Networks[J]," IEEE Journal on Selected Areas in Communications, Vol. 31, no. 9, 669-679, 2013.   DOI
7 Mota V F S, Macedo D F, Ghamridoudane Y, et al., "A message-based incentive mechanism for opportunistic networking applications[C]," in Proc. of IEEE Symposium on Computers and Communication (ISCC), 277-282, 2015.
8 He G, Debbah M, Lasaulce S, "Game theory for OFDM systems with incomplete information[J]," Game Theory for Wireless Communications and Networking, 2009.
9 Bigwood G, Henderson T, "IRONMAN: Using Social Networks to Add Incentives and Reputation to Opportunistic Networks[C]," in Proc. of 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing, 65-72, 2011.
10 Wu J, Chen Z G and Zhao M, "Effective information transmission based on socialization nodes in opportunistic networks," Computer networks, Vol. 129, Part 1, 297-305, December 24, 2017.   DOI
11 Burgess J, Bissias G D, Corner M D, et al., "Surviving attacks on disruption-tolerant networks without authentication[C]," in Proc. of ACM international symposium on Mobile ad hoc networking and computing, 61-70, 2007.
12 Li F, Wu J, Srinivasan A, "Thwarting Blackhole Attacks in Disruption-Tolerant Networks using Encounter Tickets [C]," in Proc. of IEEE INFOCOM 2009, 2428-2436, 2009.
13 Lilien L, Kamal Z H, Bhuse V, et al., "The Concept of Opportunistic Networks and their Research Challenges in Privacy and Security [J]," Mobile and Wireless Network Security and Privacy, 85-117, 2007.
14 Lindgren A, Hui P, "The quest for a killer app for opportunistic and delay tolerant networks:(invited paper) [C]," in Proc. of the 4th ACM workshop on Challenged networks, 59-66, 2009.
15 Boldrini, Chiara, M. Conti, and A. Passarella, "Exploiting users' social relations to forward data in opportunistic networks: The HiBOp solution," Pervasive and Mobile Computing, Vol. 4, no. 5, 633-657, 2008.   DOI
16 Xiao M, Wu J, Huang L, "Community-Aware Opportunistic Routing in Mobile Social Networks[M]," IEEE Transactions on Computers, Vol. 63, no. 7, 1682-1695, 2014.   DOI
17 M. Jo, L. Han, D. Kim and H. P. In, "Selfish attacks and detection in cognitive radio Ad-Hoc networks," IEEE Network, vol. 27, no. 3, 46-50, May-June 2013.   DOI
18 Wu J, Chen Z G, "Sensor communication area and node extend routing algorithm in opportunistic networks," Peer-to-Peer Networking and Applications, Vol. 11, no. 1, 90-100, January 2018.   DOI
19 Das D, Majumder K, Dasgupta A, "Selfish Node Detection and Low Cost Data Transmission in MANET using Game Theory [J]," Procedia Computer Science, Vol. 54, 92-101, 2015.   DOI
20 Wang, Eric Ke, et al., "Analyzing Selfish Behavior in Opportunistic Networks," in Proc. of 2017 14th International Symposium on Pervasive Systems, Algorithms and Networks & 2017, International Conference on Frontier of Computer Science and Technology & 2017 Third International Symposium of Creative Computing (ISPAN-FCST-ISCC), 218-225, 2017.
21 Li Y, Su G, Wang Z, "Evaluating the effects of node cooperation on DTN routing[J]," AEU - International Journal of Electronics and Communications, Vol. 66, no. 1, 62-67, 2012.   DOI
22 Xu N,Rangwala S, Chintalapudi K, et al., "AA wireless sensor network for structural monitoring [C]," in Proc. of the ACM Conference on Embedded Networked Sensor Systems.Baltimore MD, 2004.
23 Alajeely M, Ahmad A, Doss R, "Malicious Node Traceback in Opportunistic Networks Using Merkle Trees[C]," in Proc. of 2015 IEEE International Conference on Data Science and Data Intensive Systems, 147-152, 2015.
24 Liu H, Lee P P C, Lui J C S, "On the credit evolution of credit-based incentive protocols in wireless mesh networks[J]," Computer Networks, Vol. 57, no. 17, 3327-3343, 2013.   DOI
25 Li Y, Yu J, Wang C, et al., "A novel bargaining based incentive protocol for opportunistic networks[J]," in Proc. of 2012 IEEE Global Communications Conference (GLOBECOM), 5285-5289, 2012.
26 Wu J, Chen Z G and Zhao M, "Information cache management and data transmission algorithm in opportunistic social networks", Wireless networks, Vol. 25, no. 160, pp 1-12, 2018.   DOI
27 Lu X, Hui P, "An Energy-Efficient n-Epidemic Routing Protocol for Delay Tolerant Networks[C]," in Proc. of IEEE Fifth International Conference on Networking, Architecture, and Storage, 341-347, 2010.
28 Liu L, "A Survey on Reputation-Based Incentive Mechanism in Opportunistic Networks[J]," Applied Mechanics and Materials, Vol. 543-547, 4288-4290, 2014.   DOI