Skip to main content
Log in

CRSG: A congestion control routing algorithm for security defense based on social psychology and game theory in DTN

  • Published:
Journal of Central South University Aims and scope Submit manuscript

Abstract

The inherent selfishness of each node for the enhancement of message successful delivery ratio and the network overall performance improvement are reflected in the contradiction relationship of competition and cooperation in delay/disruption tolerant networks (DTN). In particular, the existence of malicious node aggravates this contradiction. To resolve this contradiction, social relationship theory and group theory of social psychology were adopted to do an in-depth analysis. The concrete balancing approach which leveraged Nash equilibrium theory of game theory was proposed to resolve this contradiction in reality. Thus, a new congestion control routing algorithm for security defense based on social psychology and game theory (CRSG) was put forward. Through the experiment, this algorithm proves that it can enhance the message successful delivery ratio by more than 15% and reduce the congestion ratio over 15% as well. This algorithm balances the contradiction relationship between the two key performance targets and made all nodes exhibit strong cooperation relationship in DTN.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. DTNRG: Delay-tolerant networking research group [EB/OL] 2012-07-01. http://www.dtnrg.org.

  2. PENTLAND A S, FLETCHER R, HASSON A. Dak Net: Rethinking connectivity in developing nations [J]. Computer, 2004, 37(1), 78–83.

    Article  Google Scholar 

  3. BURGESS J, GALLAGHER B, JENSEN D, LEVINE B N. Maxprop: Routing for vehicle-based disruption-tolerant networks [C]// Proceedings of INFOCOM, Barcelona, 2006: 1–11.

  4. BURLEIGH S, HOOKE A, TORGERSON L, FALL K, CERF V, DURST B, SCOTT K. Delay-tolerant networking: An approach to interplanetary internet [J]. IEEE Communications Magazine, 2003, 41(6): 128–136.

    Article  Google Scholar 

  5. SCOTT K, BURLEIGH S. Bundle protocol specification [R] Mclean, Virginia: Internet RFC 5050, 2007.

    Google Scholar 

  6. FALL K, HONG W, MADDEN S. Custody transfer for reliable delivery in delay tolerant networks [R]. Berkeley: Intel Research, IRB-TR-03-030, 2003.

    Google Scholar 

  7. VAHDAT A, BECKER D. Epidemic routing for partially connected ad hoc networks [R]. Durham: Duke University, CS-2000-06, 2000.

    Google Scholar 

  8. LINDGREN A, DORIA A, SCHELÉN O. Probabilistic routing in intermittently connected networks [J]. SIGMOBILE Mobile Computing Communications Review, 2003, 7(3): 19–20.

    Article  Google Scholar 

  9. JAIN R, RAMAKRISHNAN K K. Congestion avoidance in computer networks with a connectionless network layer: Concepts, goals, and methodology[C]// IEEE Comp Networking Symp, Washington DC, 1988, 134–143.

  10. SELIGMAN M, FALL K, MUNDUR P. Storage routing for DTN congestion control [J]. Wireless Communications and Mobile Computing, 2007, 7(10), 1183–1196.

    Article  Google Scholar 

  11. HOLLOT C V, MISRA V, TOWSLEY D, GONG W B. A control theoretic analysis of RED [C]// IEEE INFOCOM, Anchorage, 2001: 1510–1519.

  12. FENG L, JIE W, AVINASH S. Thwarting black hole attacks in disruption-tolerant networks using encounter tickets [C]// IEEE INFOCOM, Rio de Janeiro, 2009: 2428–2436.

  13. VIVEK N, YI Y, SENCUN Z. Resource-Misuse attack detection in delay-tolerant networks [C]// Performance Computing and Communications Conference (IPCCC), IEEE, University Park, 2011: 1–8.

    Google Scholar 

  14. TAYLOR S E, PEPLAU L A, SEARS D O. Social psychology 10th Edition [M]. New York: Pearson Education Press, 1993.

    Google Scholar 

  15. OSBORNE M J. An Introduction to game theory [M]. Oxford: University Press, 2004.

    Google Scholar 

  16. SPYROPOULOS T, PSOUNIS K, RAGHAVENDRA C S. Spray and wait: An efficient routing scheme for intermittently connected mobile networks [C]// Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerant Networking(WDTN’ 05), 2005, New York, NY, USA: ACM, 252–259.

  17. SPYROPOULOS T, PSOUNIS K, RAGHAVENDRA C S. Efficient routing in intermittently connected mobile networks: the multiple-copy case [J]. IEEE/ACM Transactions on Networking, 2008, 16(1), 77–90.

    Article  Google Scholar 

  18. ZHAO W, AMMAR M, ZEGURA E. A message ferrying approach for data delivery in sparse mobile ad hoc networks [C]// Proc of the ACM Mobihoc, Roppongi, 2004, 187–198.

  19. COSTA P, MASCOLO C, MUSOLESI M, PICCO G P. Socially-Aware routing for publish-subscribe in delay-tolerant mobile ad hoc networks [J]. IEEE Journal of Selected Areas in Communication, 2008, 26(5): 748–760.

    Article  Google Scholar 

  20. FLOYD S, JACOBSON V. Random early detection gateways for congestion avoidance [J]. IEEE/ACM Transactions on Networking, 1993, 1(4): 397–413.

    Article  Google Scholar 

  21. SELIGMAN M, FALL K, MUNDUR P. Alternative custodians for congestion control in delay tolerant networks [C]//. SIGCOMM Workshops, Pisa, Italy. 2006: 229–236.

  22. TAO Yong, GONG Zheng-hu, LIN Ya-ping, ZHOU Si-wang. Congestion aware routing algorithm for delay-disruption tolerance networks [J]. Journal of Central South University of Technology, 2011, 18(1): 133–139.

    Article  Google Scholar 

  23. NISHIYAMA H, ANSARI N, KATO N. Wireless loss-tolerant congestion control protocol based on dynamic aimed theory [J]. IEEE Wireless Communications, 2010, 17(2): 7–14.

    Article  Google Scholar 

  24. CHIU D M, JAIN R. Analysis of the increase and decrease algorithms for congestion avoidance in computer networks [J]. Computer Networks ISDN Sys, 1989, 17, 1–14.

    Article  MATH  Google Scholar 

  25. GODFREY P B, SCHAPIRA M, ZOHAR A, SHENKER S. Incentive compatibility and dynamics of congestion control [C]// SIGMETRICS, New York, USA, 2010: 95–106.

  26. FIROIU V, BORDEN M. A Study of active queue management for congestion control [C]// IEEE INFOCOM, Tel Aviv, 2000: 1435–1444.

  27. PAGANINI F, WANG Z K, DOYLE J C, LOW S H. Congestion control for high performance, stability, and fairness in general networks [J]. IEEE/ACM Transactions on Networking, 2005, 13(1), 43–56.

    Article  Google Scholar 

  28. DEUTSCH M. An Experimental study of the effects of cooperation and competition upon group process [J]. Human Relations, 1949, 2(3): 197–292.

    Article  Google Scholar 

  29. COTA A A, EVANS R C, DION L K, KILIK, L, LONGMAN, S R. The structure of group cohesion [J]. Personality and Social Psychology Bulletin, 1995, 21(6): 527–580.

    Article  Google Scholar 

  30. GOWEN C R. Managing work group performance by individual goals and group goals for an interdependent group task [J]. Journal of Organizational Behavior, 1986, 7(3): 5–27.

    Article  Google Scholar 

  31. BRAIKER B H, KELLEY H H. Conflict in the development of close relationships. In BURGESS R L, HUSTON T L (Eds.), Social exchange in developing relationships [M]. New York: Academic Press, 1979: 256–280.

    Google Scholar 

  32. BREWER, B M, KRAMER, M R. Choice behavior in social dilemmas: Effects of social identity, group size, and decision framing [J]. Journal of Personality and Social Psychology, 1986, 50(3): 543–549.

    Article  Google Scholar 

  33. LUCE D R, RAIFFA H. Games and Decisions [M]. New York: Wiley Press, 1957: 87–126.

    Google Scholar 

  34. DEUTSCH M, KRAUSS R M. The effect of the threat on interpersonal bargaining [J]. Journal of Abnormal and Social Psychology, 1960, 61(1): 181–189.

    Google Scholar 

  35. ORBELL M J, van de Kragt, C A J, DAWES M R. Explaining discussion induced cooperation [J]. Journal of Personality and Social Psychology, 1988, 54(5): 811–819.

    Article  Google Scholar 

  36. GLANCE S N, HUBERMAN A B. The dynamics of social dilemmas [J]. Scientific American, 1994, 270(3): 76–81.

    Article  Google Scholar 

  37. CIALNIDI R B, TROST M R. Social influence: Social norms, conformity, and compliance. In Gilbert D T, Fiske S T, Lindzey G (Eds.), Handbook of social psychology [M]. Boston: MA: McGraw-Hill Press, 1998: 151–192.

    Google Scholar 

  38. TYLER R T, DEGOEY P. Collective restraint in social dilemmas: Procedural justice and social identification effects on support for authorities [J]. Journal of Personality and Social Psychology, 1995, 69(3): 482–497.

    Article  Google Scholar 

  39. CLARK S M, MILLS J. Interpersonal attraction in exchange and communal relationships [J]. Journal of Personality and Social Psychology, 1979, 37(1): 12–24.

    Article  Google Scholar 

  40. DEUTSCH M. Distributive justice: A social psychological perspective [M]. New Haven, CT: Yale University Press, 1985: 122–155

    Google Scholar 

  41. HUSTON L T, Kelley H H. Close relationships [M]. New York: W. H. Freeman Press, 1983: 169–219.

    Google Scholar 

  42. WILLARD W REUBEN H. The family: A dynamic interpretation [M]. Ft Worth, TX, US: Dryden Press, 1951: 437–482.

    Google Scholar 

  43. BROWN JOHN P. Toward an economic theory of liability [J]. Journal of Legal Studies, 1973, 2(2): 323–349.

    Article  Google Scholar 

  44. BUSS H A, PERRY M. The aggression questionnaire [J]. Journal of Personality and Social Psychology, 1992, 63(3): 452–459.

    Article  Google Scholar 

  45. ANDERSON A C, MORROW M. Competitive aggression without interaction: Effects of competitive versus cooperative instructions on aggressive behavior in video games [J]. Personality and Social Psychology Bulletin, 1995, 21(10): 1020–1030.

    Article  Google Scholar 

  46. SCHACHTER S. The psychology of affiliation [M]. Stanford: CA: Stanford University Press, 1959: 21–35.

    Google Scholar 

  47. SCHACHTER S. The interaction of cognitive and physiological determinants of emotional state. In L. Berkowitz (Ed.), Advances in experimental social psychology [M]. New York: Academic Press, 1964: 49–80.

    Google Scholar 

  48. LATANE B. The psychology of social impact [J]. American Psychologist, 1981, 36(4): 343–356.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cheng-jun Wang  (王珵珺).

Additional information

Foundation item: Projects(61202488, 61070199, 61103182) supported by the National Natural Science Foundation of China

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wang, Cj., Gong, Zh., Tao, Y. et al. CRSG: A congestion control routing algorithm for security defense based on social psychology and game theory in DTN. J. Cent. South Univ. 20, 440–450 (2013). https://doi.org/10.1007/s11771-013-1505-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11771-013-1505-z

Key words

Navigation