A Secure Credit-Based Incentive Mechanism for Message Forwarding in Noncooperative DTNs

被引:33
作者
Chen, Honglong [1 ,2 ]
Lou, Wei [2 ,3 ]
Wang, Zhibo [4 ]
Wang, Qian [4 ]
机构
[1] China Univ Petr, Coll Informat & Control Engn, Qingdao 266580, Peoples R China
[2] Hong Kong Polytech Univ, Dept Comp, Kowloon, Hong Kong, Peoples R China
[3] Hong Kong Polytech Univ, Shenzhen Res Inst, Shenzhen 518057, Peoples R China
[4] Wuhan Univ, Sch Comp, Wuhan 430072, Peoples R China
基金
中国国家自然科学基金;
关键词
Cooperation; noncooperative delay-tolerant networks (DTNs); rewarding schemes; secure; TOLERANT NETWORKS; SYSTEM;
D O I
10.1109/TVT.2015.2477164
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Delay-tolerant networks (DTNs) are an emergent communication paradigm characterized by intermittent connectivity. The nodes in DTNs can take advantage of their contact opportunities to forward messages. However, in noncooperative DTNs, the nodes may be selfish and reluctant to cooperate with each other in message forwarding. In such DTNs, stimulating cooperation among the nodes will be indispensable. Recently, many incentive mechanisms have been proposed to motivate nodes to cooperate in message forwarding. However, most of them cannot guarantee systematic security. To resolve the drawback of the previous incentive mechanisms, we first propose a credit-based rewarding scheme called the earliest path singular rewarding (EPSR) scheme to motivate the nodes to truthfully forward the messages during every contact opportunity. Then, we propose another credit-based rewarding scheme called the earliest path cumulative rewarding (EPCR) scheme by further considering that a node may get more contact information on others. We prove that both the EPSR and EPCR schemes are incentive compatible, and the payment for each delivered message is upper bounded. Furthermore, the proposed schemes can prevent selfish nodes having malicious behaviors. We have conducted real-trace-based simulations to illustrate the effectiveness of the proposed EPSR and EPCR schemes.
引用
收藏
页码:6377 / 6388
页数:12
相关论文
共 29 条
[1]  
[Anonymous], P 2 INT C SIMUTOOLS
[2]  
[Anonymous], CYBERN SYST ANAL
[3]  
[Anonymous], P ACM MOBICOM
[4]  
[Anonymous], 2000, HDB SYSTEMIC AUTOIMM
[5]  
[Anonymous], SIGMOBILE MOB
[6]  
Buchegger S., 2002, MOBIHOC 2002. Proceedings of the Third ACM International Symposium on Mobile Ad Hoc Networking and Computing, P226, DOI 10.1145/513800.513828
[7]  
Burgess J., 2006, INFOCOM, V6, P1
[8]   Impact of human mobility on opportunistic forwarding algorithms [J].
Chaintreau, Augustin ;
Hui, Pan ;
Crowcroft, Jon ;
Diot, Christophe ;
Gass, Richard ;
Scott, James .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2007, 6 (06) :606-620
[9]   Immediate and Long-Term Results of Coronary Angioplasty in Patients Aged 80 Years and Older [J].
Chen, Bo ;
Zhang, Dingguo ;
Zhu, Tiebing ;
Wang, Liansheng ;
Li, Chunjian ;
Wang, Hui ;
Zhang, Fumin ;
Cao, Kejiang ;
Ma, Wenzhu ;
Yang, Zhijian .
CARDIOLOGY RESEARCH AND PRACTICE, 2010, 2010
[10]  
Chen HC, 2013, INTELL SYST SER, P1, DOI [10.1155/2013/213234, 10.1007/978-3-642-38868-2_1, 10.1016/B978-0-12-404702-0.00001-X]