A secure, service priority-based incentive scheme for delay tolerant networks

被引:9
作者
Xie, Yongming [1 ]
Zhang, Yan [2 ]
机构
[1] Hunan Normal Univ, Dept Comp Sci, Changsha 410081, Hunan, Peoples R China
[2] Changsha Med Univ, Dept Comp Sci, Changsha 410219, Hunan, Peoples R China
关键词
delay tolerant networks; incentive scheme; selfish behavior; service priority; DESIGN;
D O I
10.1002/sec.1372
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Delay tolerant networks are resource-constrained networks, where nodes are required to cooperate with each other to relay messages (bundles) in a store-carry-forward fashion. Because of the constrained resources, some selfish nodes are reluctant to relay bundles for other nodes in order to save their own resources. Previous studies focus on one kind of credit-based incentive schemes in which a source pays credits (virtual coins) to intermediates to compensate for their resources consumption. Although these schemes can restrain selfish behaviors to a certain extent, they may cause an undesirable effect on some honest nodes, especially on boundary nodes and inactive nodes. To mitigate this issue, first we propose a service priority-based incentive scheme (SIS) where a relaying (viewed as a service) priority, instead of credits, is used as an incentive metric to stimulate nodes to fairly cooperate. In the SIS, a node which relayed more bundles is granted a higher service priority, and it will obtain a higher bundle delivery ratio correspondingly. Then, to deal with the potential attacks against the SIS, we also present three security solutions including the signature chain, cooperation frequency statistics, and combination clearance. We evaluate the proposed scheme on the opportunistic network environment simulator. The extensive results show that the SIS is able to improve the bundle delivery ratio of honest nodes and efficiently inhibits the selfish behaviors in comparison with credit-based incentive schemes. Copyright (C) 2015 John Wiley & Sons, Ltd.
引用
收藏
页码:5 / 18
页数:14
相关论文
共 35 条
[1]   Mitigating Blackhole Attacks in Delay Tolerant Networks [J].
Al Hinai, Aysha ;
Zhang, Haibo ;
Chen, Yawen .
2012 13TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS, AND TECHNOLOGIES (PDCAT 2012), 2012, :329-334
[2]  
[Anonymous], GLOBECOM 2009
[3]  
[Anonymous], NETW PROTOC ALGOR
[4]  
[Anonymous], 2013, TEL C IEEE
[5]  
[Anonymous], 2013, 2013 15 EUR C POW EL
[6]  
Ansa G, 2011, PERS SAT SERV P INT, P213
[7]  
Ansa G, 2010, L N INST COMP SCI SO, V43, P221
[8]  
Ansa G, 2011, INT WIREL COMMUN, P424, DOI 10.1109/IWCMC.2011.5982571
[9]  
Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
[10]   Enforcing service availability in mobile ad-hoc WANs [J].
Buttyán, L ;
Hubaux, JP .
MOBIHOC: 2000 FIRST ANNUAL WORKSHOP ON MOBILE AND AD HOC NETWORKING AND COMPUTING, 2000, :87-96