A secure, service priority-based incentive scheme for delay tolerant networks

Delay tolerant networks are resource-constrained networks, where nodes are required to cooperate with each other to relay messages bundles in a store-carry-forward fashion. Because of the constrained resources, some selfish nodes are reluctant to relay bundles for other nodes in order to save their own resources. Previous studies focus on one kind of credit-based incentive schemes in which a source pays credits virtual coins to intermediates to compensate for their resources consumption. Although these schemes can restrain selfish behaviors to a certain extent, they may cause an undesirable effect on some honest nodes, especially on boundary nodes and inactive nodes. To mitigate this issue, first we propose a service priority-based incentive scheme SIS where a relaying viewed as a service priority, instead of credits, is used as an incentive metric to stimulate nodes to fairly cooperate. In the SIS, a node which relayed more bundles is granted a higher service priority, and it will obtain a higher bundle delivery ratio correspondingly. Then, to deal with the potential attacks against the SIS, we also present three security solutions including the signature chain, cooperation frequency statistics, and combination clearance. We evaluate the proposed scheme on the opportunistic network environment simulator. The extensive results show that the SIS is able to improve the bundle delivery ratio of honest nodes and efficiently inhibits the selfish behaviors in comparison with credit-based incentive schemes. Copyright © 2015 John Wiley & Sons, Ltd.

[1]  Yan Wang,et al.  Incentive Based Data Sharing in Delay Tolerant Mobile Networks , 2014, IEEE Transactions on Wireless Communications.

[2]  Jean C. Walrand,et al.  Incentive mechanisms based on Minority Games in heterogeneous Delay Tolerant Networks , 2013, Proceedings of the 2013 25th International Teletraffic Congress (ITC).

[3]  Haibo Zhang,et al.  Mitigating Blackhole Attacks in Delay Tolerant Networks , 2012, 2012 13th International Conference on Parallel and Distributed Computing, Applications and Technologies.

[4]  Mario Marchese,et al.  A Model of Buffer Occupancy for ICNs , 2012, IEEE Communications Letters.

[5]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[6]  Hovav Shacham,et al.  Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.

[7]  Vikram Srinivasan,et al.  Cooperation in wireless ad hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[8]  Gianluca Dini,et al.  Towards a reputation-based routing protocol to contrast blackholes in a delay tolerant network , 2012, Ad Hoc Networks.

[9]  Xiaodong Lin,et al.  Pi: A practical incentive protocol for delay tolerant networks , 2010, IEEE Transactions on Wireless Communications.

[10]  Xiaodong Lin,et al.  An Opportunistic Batch Bundle Authentication Scheme for Energy Constrained DTNs , 2010, 2010 Proceedings IEEE INFOCOM.

[11]  Rachid El Azouzi,et al.  Coordination minority games in delay tolerant networks , 2013, 2013 11th International Symposium and Workshops on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt).

[12]  R. Durst,et al.  Interplanetary internet (ipn): architectural definition , 2001 .

[13]  Zhenfu Cao,et al.  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks , 2014 .

[14]  Xiaodong Lin,et al.  SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks , 2009, IEEE Transactions on Vehicular Technology.

[15]  Weihua Zhuang,et al.  Preventing Unauthorized Messages in DTN Based Mobile Ad Hoc Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[16]  Honglong Chen,et al.  Making Nodes Cooperative: A Secure Incentive Mechanism for Message Forwarding in DTNs , 2013, 2013 22nd International Conference on Computer Communication and Networks (ICCCN).

[17]  Haitham S. Cruickshank,et al.  Delay- and Disruption-Tolerant Networking (DTN): An Alternative Solution for Future Satellite Networking Applications , 2011, Proceedings of the IEEE.

[18]  Xiaofei Wang,et al.  PRI: A Practical Reputation-based Incentive Scheme for Delay Tolerant Networks , 2012, KSII Trans. Internet Inf. Syst..

[19]  Ciprian Dobre,et al.  Collaborative selfish node detection with an incentive mechanism for opportunistic networks , 2013, 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013).

[20]  Kevin R. Fall,et al.  A delay-tolerant network architecture for challenged internets , 2003, SIGCOMM '03.

[21]  R. Srikant,et al.  DARWIN: distributed and adaptive reputation mechanism for wireless ad-hoc networks , 2007, MobiCom '07.

[22]  Lars C. Wolf,et al.  Detecting blackhole and greyhole attacks in vehicular Delay Tolerant Networks , 2013, 2013 Fifth International Conference on Communication Systems and Networks (COMSNETS).

[23]  Yin Zhang,et al.  Incentive-aware routing in DTNs , 2008, 2008 IEEE International Conference on Network Protocols.

[24]  P. Balasubramanie,et al.  Improving QoS in Delay Tolerant Mobile Ad Hoc Network Using Multiple Message Ferries , 2011, Netw. Protoc. Algorithms.

[25]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[26]  Godwin Ansa,et al.  A Proactive DOS Filter Mechanism for Delay Tolerant Networks , 2011, PSATS.

[27]  Godwin Ansa,et al.  A DOS-resilient design for delay tolerant networks , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.

[28]  John G. Proakis,et al.  Evolution of Seaweb underwater acoustic networking , 2000, OCEANS 2000 MTS/IEEE Conference and Exhibition. Conference Proceedings (Cat. No.00CH37158).

[29]  Konstantin Avrachenkov,et al.  A game theoretic analysis of network design with socially-aware users , 2011, Comput. Networks.

[30]  Kang Chen,et al.  Multicent: A multifunctional incentive scheme adaptive to diverse performance objectives for DTN routing , 2013, 2013 IEEE International Conference on Sensing, Communications and Networking (SECON).

[31]  Sandeep Sharma,et al.  Delay tolerant and energy efficient QoS-based approach for wireless sensor network , 2014 .

[32]  Scott C. Burleigh,et al.  Bundle Protocol Specification , 2007, RFC.

[33]  Songwu Lu,et al.  Secure Incentives for Commercial Ad Dissemination in Vehicular Networks , 2012, IEEE Trans. Veh. Technol..

[34]  Godwin Ansa,et al.  Mitigating Denial of Service Attacks in Delay-and Disruption-Tolerant Networks , 2010, PSATS.

[35]  J.-P. Hubaux,et al.  Enforcing service availability in mobile ad-hoc WANs , 2000, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444).