MobiID: A User-Centric and Social-Aware Reputation Based Incentive Scheme for Delay/Disruption Tolerant Networks

作者: Lifei Wei , Haojin Zhu , Zhenfu Cao , Xuemin Shen

DOI: 10.1007/978-3-642-22450-8_14

关键词:

摘要: Delay/Disruption tolerant networks (DTNs) are wireless ad-hoc networks, where end-to-end connectivity can not be guaranteed and communications rely on the assumption that nodes willing to store-carry-and-forward bundles in an opportunistic way. However, this would easily violated due selfish which unwilling consume precious resources by serving as bundle relays. Incentive issue DTNs is extraordinarily challenging unique network characteristics. To tackle issue, paper, we propose MobiID, a novel user-centric social-aware reputation based incentive scheme for DTNs. Different from conventional schemes neighboring monitor traffic keep track of each other's reputation, MobiID allows node manage its evidence show demonstrate whenever necessary. We also define concepts self-check community-check speed up establishment allow form consensus views towards targets same community, our social metric forwarding willingness. Performance simulation given security, effectiveness efficiency proposed scheme.

参考文章(28)
Topics in Cryptology – CT-RSA 2009 Lecture Notes in Computer Science. ,vol. 5473, ,(2009) , 10.1007/978-3-642-00862-7
Vincenzo Capasso, V Capasso, Mathematical structures of epidemic systems ,(1993)
Audun Josang, Roslan Ismail, The Beta Reputation System bled econference. pp. 41- ,(2002)
Sorav Bansal, Mary Baker, Observation-based Cooperation Enforcement in Ad Hoc Networks arXiv: Networking and Internet Architecture. ,(2003)
Mohamed M. E. A. Mahmoud, Xuemin Shen, FESCIM: Fair, Efficient, and Secure Cooperation Incentive Mechanism for Multihop Cellular Networks IEEE Transactions on Mobile Computing. ,vol. 11, pp. 753- 766 ,(2012) , 10.1109/TMC.2011.92
Feng Li, Yinying Yang, Jie Wu, CPMC: An Efficient Proximity Malware Coping Scheme in Smartphone-based Mobile Networks international conference on computer communications. pp. 2811- 2819 ,(2010) , 10.1109/INFCOM.2010.5462113
Na Li, Sajal K. Das, RADON: reputation-assisted data forwarding in opportunistic networks Proceedings of the Second International Workshop on Mobile Opportunistic Networking. pp. 8- 14 ,(2010) , 10.1145/1755743.1755746
Guohong Cao, Qinghua Li, Sencun Zhu, Routing in Socially Selfish Delay Tolerant Networks international conference on computer communications. pp. 857- 865 ,(2010) , 10.1109/INFCOM.2010.5462138
M. E. Mahmoud, Xuemin Shen, ESIP: Secure Incentive Protocol with Limited Use of Public-Key Cryptography for Multihop Wireless Networks IEEE Transactions on Mobile Computing. ,vol. 10, pp. 997- 1010 ,(2011) , 10.1109/TMC.2010.211
Audun Jøsang, Roslan Ismail, Colin Boyd, A survey of trust and reputation systems for online service provision decision support systems. ,vol. 43, pp. 618- 644 ,(2007) , 10.1016/J.DSS.2005.05.019