A Secure Social-aware Incentive Scheme for Delay Tolerant Networks

被引:4
作者
Wu, Guowei [1 ]
Wang, Jia [1 ]
Yao, Lin [1 ]
Lin, Chi [1 ]
机构
[1] Dalian Univ Technol, Sch Software, Dalian, Peoples R China
来源
2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013) | 2013年
关键词
Delay Tolerant Networks; social awareness; selfish node; security; stimulating mechanism;
D O I
10.1109/TrustCom.2013.99
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In Delay Tolerant Networks, the message forwarding process follows an opportunistic way due to the character that lacks end-to-end link between mobile nodes. The selfish and malicious nodes managed by rational individuals may refuse to lend a hand with relaying to conserve their resources such as power and storage space, in which case the network performance can be considerably degraded. In this paper, to address the selfish problem, a secure social-aware incentive scheme for delay tolerant networks is proposed. The proposed scheme uses identity based cryptosystem with social attributes as the identity to ensure the security of nodes and messages. In addition, credits are adopted to stimulate the cooperation in relaying messages between nodes. Security analysis and performance evaluation via simulations illustrate that the proposed scheme can effectively inspire the cooperation of nodes while keeping the confidentiality and integrity of messages
引用
收藏
页码:813 / 820
页数:8
相关论文
共 31 条
[1]  
[Anonymous], 2010, Int. J. Netw. Secur
[2]  
[Anonymous], 2007, 2007 IEEE INT S WORL
[3]  
Bigwood G., 2011, Proceedings of the 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and IEEE Third International Conference on Social Computing (PASSAT/SocialCom 2011), P65, DOI 10.1109/PASSAT/SocialCom.2011.60
[4]   Context- and social-aware middleware for opportunistic networks [J].
Boldrini, C. ;
Conti, M. ;
Delmastro, F. ;
Passarella, A. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2010, 33 (05) :525-541
[5]  
Butty L., 2000, P 1 ACM INT S MOB AD
[6]   Stimulating cooperation in self-organizing mobile ad hoc networks [J].
Buttyán, L ;
Hubaux, JP .
MOBILE NETWORKS & APPLICATIONS, 2003, 8 (05) :579-592
[7]   Barter trade improves message delivery in opportunistic networks [J].
Buttyan, Levente ;
Dora, Laszlo ;
Felegyhazi, Mark ;
Vajda, Istvan .
AD HOC NETWORKS, 2010, 8 (01) :1-14
[8]  
Buttyn Levente., 2007, Proceedings of the 4th IEEE International Conferenceon Mobile Ad Hoc and Sensor Systems (MASS), P1, DOI DOI 10.1109/MOBHOC.2007.4428643
[9]  
Fall K, 2003, ACM SIGCOMM COMP COM, V33, P27
[10]   Mobility increases the capacity of ad hoc wireless networks [J].
Grossglauser, M ;
Tse, DNC .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2002, 10 (04) :477-486