PRI: A Practical Reputation-based Incentive Scheme for Delay Tolerant Networks

Delay tolerant networks (DTNs) characterized by the lack of guaranteed end-to-end paths exploit opportunistic data forwarding mechanism, which depends on the hypothesis that nodes are willing to store, carry, and forward the in-transit messages in an opportunistic way. However, this hypothesis might easily be violated by the presence of selfish nodes constrained with energy, bandwidth, and processing power. To address this problem, we propose a practical reputation-based incentive scheme, named PRI, to stimulate honest forwarding and discipline selfish behavior. A novel concept of successful forwarding credential and an observation protocol are presented to cope with the detection of nodes’ behavior, and a reputation model is proposed to determine egoistic individuals. The simulation results demonstrate the effectiveness and practicality of our proposal.

[1]  Giannis F. Marias,et al.  Cooperation enforcement schemes for MANETs: a survey , 2006, Wirel. Commun. Mob. Comput..

[2]  Azzedine Boukerche,et al.  Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..

[3]  Xiaodong Lin,et al.  SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks , 2009, IEEE Transactions on Vehicular Technology.

[4]  Jean-Yves Le Boudec,et al.  Self-policing mobile ad hoc networks by reputation systems , 2005, IEEE Communications Magazine.

[5]  Qi He,et al.  A secure incentive architecture for ad hoc networks , 2006, Wirel. Commun. Mob. Comput..

[6]  Lieguang Zeng,et al.  The Impact of Node Selfishness on Multicasting in Delay Tolerant Networks , 2011, IEEE Transactions on Vehicular Technology.

[7]  Vinton G. Cerf,et al.  Delay-tolerant networking: an approach to interplanetary Internet , 2003, IEEE Commun. Mag..

[8]  Xiaodong Lin,et al.  Pi: A practical incentive protocol for delay tolerant networks , 2010, IEEE Transactions on Wireless Communications.

[9]  Younghwan Yoo,et al.  Why does it pay to be selfish in a MANET? , 2006, IEEE Wireless Communications.

[10]  Xiaomin Zhu,et al.  Service Composition Based on Niching Particle Swarm Optimization in Service Overlay Networks , 2012, KSII Trans. Internet Inf. Syst..

[11]  Xiaoyong Li,et al.  A Comprehensive and Adaptive Trust Model for Large-Scale P2P Networks , 2009, Journal of Computer Science and Technology.

[12]  Stephen Farrell,et al.  DTN: an architectural retrospective , 2008, IEEE Journal on Selected Areas in Communications.

[13]  Merkourios Karaliopoulos,et al.  Assessing the vulnerability of DTN data relaying schemes to node selfishness , 2009, IEEE Communications Letters.

[14]  Stephen Farrell,et al.  Delay- and Disruption-Tolerant Networking , 2006, IEEE Internet Computing.

[15]  Scott C. Burleigh,et al.  Bundle Protocol Specification , 2007, RFC.

[16]  Vinny Cahill,et al.  When TCP Breaks: Delay- and Disruption- Tolerant Networking , 2006, IEEE Internet Computing.

[17]  Tzong-Chen Wu,et al.  A Threshold-Adaptive Reputation System on Mobile Ad Hoc Networks , 2009, IEICE Trans. Inf. Syst..

[18]  Kevin R. Fall,et al.  A delay-tolerant network architecture for challenged internets , 2003, SIGCOMM '03.

[19]  Rabin K. Patra,et al.  Routing in a delay tolerant network , 2004, SIGCOMM '04.

[20]  Mei Yu,et al.  Fast Mode Decision For Depth Video Coding Based On Depth Segmentation , 2012, KSII Trans. Internet Inf. Syst..

[21]  K. Psounis,et al.  Efficient Routing in Intermittently Connected Mobile Networks: The Single-Copy Case , 2008, IEEE/ACM Transactions on Networking.

[22]  Pan Hui,et al.  Evaluating the Impact of Social Selfishness on the Epidemic Routing in Delay Tolerant Networks , 2010, IEEE Communications Letters.