An Evaluation of Routing Reliability in Non-collaborative Opportunistic Networks

An opportunistic network is a type of challenged network that has attracted a great deal of attention in recent years. While a number of schemes have been proposed to facilitate data dissemination in opportunistic networks, there is an implicit assumption that each participating peer behaves collaboratively. Consequently, these schemes may be vulnerable if there are uncooperative or malicious peers in the network. In this study, we identify five types of non-collaborative behavior, namely free rider, black hole, supernova, hypernova, and wormhole behavior, in opportunistic networks. We also evaluate the impacts of the five types of behavior on the data transmission performance of three widely used routing schemes. Using simulations as well as real-world traces of network mobility, we show that the data forwarding performance degrades significantly as the number of non-collaborative peers, except wormholes, increases. Moreover, we find that the three compared routing schemes can benefit from wormhole behavior, especially when the network connectivity is poor and the buffer size is limited.

[1]  Ellen W. Zegura,et al.  Controlling the mobility of multiple data transport ferries in a delay-tolerant network , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[2]  Ellen W. Zegura,et al.  A message ferrying approach for data delivery in sparse mobile ad hoc networks , 2004, MobiHoc '04.

[3]  Lixin Gao,et al.  Estimation based erasure-coding routing in delay tolerant networks , 2006, IWCMC '06.

[4]  Tracy Camp,et al.  A survey of mobility models for ad hoc network research , 2002, Wirel. Commun. Mob. Comput..

[5]  Xiaoyan Hong,et al.  A group mobility model for ad hoc wireless networks , 1999, MSWiM '99.

[6]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[7]  Timur Friedman,et al.  Evaluating Mobility Pattern Space Routing for DTNs , 2005, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[8]  Margaret Martonosi,et al.  Erasure-coding based routing for opportunistic networks , 2005, WDTN '05.

[9]  Ling-Jyh Chen,et al.  On Using Probabilistic Forwarding to Improve HEC-Based Data Forwarding in Opportunistic Networks , 2007, EUC.

[10]  Brian Gallagher,et al.  MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[11]  Ling-Jyh Chen,et al.  A content-centric framework for effective data dissemination in opportunistic networks , 2008, IEEE Journal on Selected Areas in Communications.

[12]  Kevin C. Almeroth,et al.  Delay Tolerant Mobile Networks (DTMNs): Controlled Flooding in Sparse Mobile Networks , 2005, NETWORKING.

[13]  Pan Hui,et al.  Pocket switched networks and human mobility in conference environments , 2005, WDTN '05.

[14]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[15]  Jörg Widmer,et al.  Network coding for efficient communication in extreme networks , 2005, WDTN '05.

[16]  Eytan Adar,et al.  Free Riding on Gnutella , 2000, First Monday.

[17]  Amin Vahdat,et al.  Epidemic Routing for Partially-Connected Ad Hoc Networks , 2009 .

[18]  Timur Friedman,et al.  DTN routing in a mobility pattern space , 2005, WDTN '05.

[19]  Ling-Jyh Chen,et al.  A hybrid routing approach for opportunistic networks , 2006, CHANTS '06.

[20]  Pan Hui,et al.  Impact of Human Mobility on the Design of Opportunistic Forwarding Algorithms , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[21]  Anders Lindgren,et al.  Probabilistic Routing in Intermittently Connected Networks , 2004, SAPIR.

[22]  Rabin K. Patra,et al.  Routing in a delay tolerant network , 2004, SIGCOMM '04.

[23]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).