Skip to main content

Incentive-Aware Opportunistic Network Routing

  • Chapter
  • First Online:

Abstract

Opportunistic networking relies on cooperation between nodes to perform efficiently. Opportunistic routing protocols depend on nodes forwarding messages for each other, as otherwise the only delivery mechanism would be for the creator of a message to encounter the message destination node and deliver the message directly. Cooperative forwarding, however, incurs a cost to the forwarding nodes, both in terms of energy and storage, as nodes need to dedicate resources to forwarding. Due to these costs, nodes may wish to avoid the costs associated with participation in an opportunistic network, by not forwarding messages for other nodes. We discuss several attacks on opportunistic routing, and in particular, focus on selfishness of nodes. We discuss incentive mechanisms for opportunistic routing, before concluding with a discussion of some of the outstanding challenges in this area.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Anantvalee T, Wu J (2007) Reputation-based system for encouraging the cooperation of nodes in mobile ad hoc networks. In: Proceedings of the IEEE international conference on communications (ICC ’07), June 2007, pp 3383–3388. doi:10.1109/ICC.2007.560

  2. Bigwood G, Henderson T, (2010) Social roles for opportunistic forwarding. In: Proceedings of the 2nd international workshop on mobile opportunistic networking (MobiOpp ’10), February 2010. ACM, New York, pp 199–200. doi:10.1145/1755743.1755787

  3. Bigwood G, Henderson T (2011) IRONMAN: using social networks to add incentives and reputation to opportunistic networks. In: Proceedings of the IEEE 3rd international conference on social computing (SocialCom), IEEE, October 2011, pp 65–72. doi:10.1109/PASSAT/SocialCom.2011.60

  4. Buchegger S, Le Boudec JY, (2002) Performance analysis of the CONFIDANT protocol. In: Proceedings of the 3rd ACM international symposium on mobile ad hoc networking & computing (MobiHoc ’02), 2002. ACM, New York, pp 226–236. doi:10.1145/513800.513828

  5. Burgess J, Bissias GD, Corner MD, Levine BN, (2007) Surviving attacks on disruption-tolerant networks without authentication. In: Proceedings of the 8th ACM international symposium on mobile ad hoc networking and computing (MobiHoc ’07), 2007. ACM, New York, pp 61–70. doi:10.1145/1288107.1288116

  6. Conti M, Di Pietro R, Gabrielli A, Mancini LV, Mei A, (2010) The smallville effect: social ties make mobile networks more secure against node capture attack. In: Proceedings of the 8th ACM international workshop on mobility management and wireless access (MobiWac ’10), 2010. ACM, New York, pp 99–106. doi:10.1145/1868497.1868514

  7. Eagle N, Pentland AS (2005) CRAWDAD data set mit/reality (v. 2005–07-01). http://crawdad.org/mit/reality. Accessed July 2005

  8. Fowler JH, Christakis NA (2010) Cooperative behavior cascades in human social networks. Proc Natl Acad Sci 107(12):5334–5338. doi:10.1073/pnas.0913149107

    Article  Google Scholar 

  9. Ganeriwal S, Balzano LK, Srivastava MB (June 2008) Reputation-based framework for high integrity sensor networks. ACM Trans Sens Netw 4(3):1–37. doi:10.1145/1362542.1362546

    Article  Google Scholar 

  10. He Q, Wu D, Khosla P (2004) SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks. In: Proceeding of the wireless communications and networking conference (WCNC), 2004, vol 2, pp 825–830. doi:10.1109/WCNC.2004.1311293

  11. Huang E, Crowcroft J, Wassell I, Rethinking incentives for mobile ad hoc networks. In: PINS ’04: Proceedings of the ACM SIGCOMM workshop on practice and theory of incentives in networked systems, 2004. ACM, New York, pp 191–196. doi:10.1145/1016527.1016532

  12. Huang KL, Kanhere SS, Hu W, (2010) Are you contributing trustworthy data? The case for a reputation system in participatory sensing. In: Proceedings of the 13th ACM international conference on modeling, analysis, and simulation of wireless and mobile systems (MSWIM ’10), 2010. ACM, New York, pp 14–22. doi:10.1145/1868521.1868526

  13. Kangasharju J, Heinemann A, (2008) Incentives for opportunistic networks. In: 22nd international conference on advanced information networking and applications: Workshops (aina workshops 2008) March 2008. IEEE, Los Alamitos, pp 1684–1689. doi:10.1109/WAINA.2008.90

  14. Karaliopoulos M (2009) Assessing the vulnerability of DTN data relaying schemes to node selfishness. IEEE Commun Lett 13(12):923–925. doi:10.1109/LCOMM.2009.12.091520

    Article  Google Scholar 

  15. Keränen A, Pitkänen M, Vuori M, Ott J (2011) Effect of non-cooperative nodes in mobile DTNs. In: Proceedings of the 12th IEEE international symposium on a world of wireless, mobile and multimedia networks (WoWMoM ’11), June 2011. doi:10.1109/WoWMoM.2011.5986144

  16. Li F, Wu J, Srinivasan A (2009) Thwarting blackhole attacks in disruption-tolerant networks using encounter tickets. In: IEEE INFOCOM 2009: the 28th conference on computer communications, IEEE, April 2009, pp 2428–2436. doi:10.1109/INFCOM.2009.5062170

  17. Li N, Das SK, (2010) RADON: reputation-assisted data forwarding in opportunistic networks. In: Proceedings of the second international workshop on mobile opportunistic networking (MobiOpp ’10), February 2010. ACM, New York, pp 8–14. doi:10.1145/1755743.1755746

  18. Li N, Das SK (2011) A trust-based framework for data forwarding in opportunistic networks. Ad Hoc Netw. doi:10.1016/j.adhoc.2011.01.018

    Google Scholar 

  19. Li Q, Gao W, Zhu S, Cao G (2012) A routing protocol for socially selfish delay tolerant networks. Ad Hoc Netw 10(8):1619–1632. doi:10.1016/j.adhoc.2011.07.007 Special issue on social-based routing in mobile and delay-tolerant networks

    Article  Google Scholar 

  20. Liu J, Issarny V (2004) Enhanced reputation mechanism for mobile ad hoc networks. In: Jensen C, Poslad S, Dimitrakos T (eds), Trust management. Lecture notes in computer science, vol 2995, chapter 5. Springer, Berlin, pp 48–62. doi:10.1007/978-3-540-24747-0_5

    Google Scholar 

  21. Liu Z, Hu H, Liu Y, Ross KW, Wang Y, Mobius M, (2010) P2P trading in social networks: the value of staying connected. In: Proceedings of the 29th conference on information communications (INFOCOM ’10), 2010. IEEE Press, Piscataway, pp 2489–2497. doi:10.1109/INFCOM.2010.5462077

  22. Lu R, Lin X, Zhu H, Shen X, Preiss B (2010) Pi: A practical incentive protocol for delay tolerant networks. IEEE Trans Wireless Commun 9(4):1483–1493. doi:10.1109/TWC.2010.04.090557

    Article  Google Scholar 

  23. Mahajan R, Rodrig M, Wetherall D, Zahorjan J (2005) Sustaining cooperation in multi-hop wireless networks. In: Proceedings of the 2nd conference on symposium on networked systems design & implementation (NSDI’05), 2005, vol 2. USENIX Association, Berkeley, pp 231–244.http://portal.acm.org/citation.cfm?id=1251220

  24. Marti S, Giuli TJ, Lai K, Baker M, (2000) Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th annual international conference on mobile computing and networking (MobiCom ’00), 2000. ACM, New York, pp 255–265. doi:10.1145/345910.345955253C

  25. Michiardi P, Molva R (2002) Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of the IFIP TC6/TC11 sixth joint working conference on communications and multimedia security, 2002. Kluwer, Deventer, pp 107–121. http://portal.acm.org/citation.cfm?id=647802.737297

  26. Palomar E, Alcaide A, Ribagorda A, Zhang Y (2012) The peer’s dilemma: a general framework to examine cooperation in pure peer-to-peer systems. Comput Netw 56(17):3756–3766. doi:10.1016/j.comnet.2012.08.012

    Article  Google Scholar 

  27. Panagakis A, Vaios A, Stavrakakis L (2007) On the effects of cooperation in DTNs. In: Proceedings of the 2nd international conference on communication systems software and middleware (COMSWARE 2007), IEEE, January 2007, pp 1–6. doi:10.1109/COMSWA.2007.382571

  28. Quercia D, Hailes S, Capra L, (2008) Mobirate: making mobile raters stick to their word. In: Proceedings of the 10th international conference on ubiquitous computing (UbiComp ’08), 2008. ACM, New York, pp 212–221. doi:10.1145/1409635.1409664

  29. Resta G, Santi P, (2009) The effects of node cooperation level on routing performance in delay tolerant networks. In: Proceedings of the 6th annual IEEE communications society conference on sensor, mesh and ad hoc communications and networks (SECON’09), 2009. IEEE Press, Piscataway, pp 413–421. doi:10.1109/SAHCN.2009.5168977

  30. Saxena N, Denko M, Banerji D (2011) A hierarchical architecture for detecting selfish behaviour in community wireless mesh networks. Comput Commun 34(4):548–555. doi:10.1016/j.comcom.2010.04.040

    Article  Google Scholar 

  31. Scellato S, Musolesi M, Mascolo C, Latora V, Campbell A, (2011) NextPlace: a spatio-temporal prediction framework for pervasive systems. In: Lyons K, Hightower J, Huang E (eds) Proceedings of the 9th international conference on pervasive computing, June 2011. Springer, Berlin, pp 152–169. doi:10.1007/978-3-642-21726-510

  32. Shevade U, Song HH, Qiu L, Zhang Y (2008) Incentive-aware routing in DTNs. In: 2008 IEEE international conference on network protocols, IEEE, October 2008, pp 238–247. doi:10.1109/ICNP.2008.4697042

  33. Solis J, Asokan N, Kostiainen K, Ginzboorg P, Ott J (2010) Controlling resource hogs in mobile delay-tolerant networks. Comput Commun 33(1):2–10. doi:10.1016/j.comcom.2009.07.019

    Article  Google Scholar 

  34. Spyropoulos T, Psounis K, Raghavendra CS, (2005) Spray and wait: an efficient routing scheme for intermittently connected mobile networks. In: Proceedings of the, (2005) ACM SIGCOMM workshop on delay-tolerant networking (WDTN ’05), 2005. ACM, New York, pp 252–259. doi:10.1145/1080139.1080143

  35. Spyropoulos T, Psounis K, Raghavendra CS (2008) Efficient routing in intermittently connected mobile networks: the multiple-copy case. IEEE/ACM Trans Netw 16(1):77–90. doi:10.1109/TNET.2007.897964

    Article  Google Scholar 

  36. Sun YL, Han Z, Yu W, Ray Liu KJ (2006) A trust evaluation framework in distributed networks: vulnerability analysis and defense against attacks. In: IEEE INFOCOM, 2006, pp. 230–236. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.84.5322

  37. Uddin MY, Godfrey B, Abdelzaher T (2010) RELICS: In-network realization of incentives to combat selfishness in DTNs. In: Proceeding of the 18th IEEE international conference on network protocols (ICNP), October 2010, pp 203–212. doi:10.1109/ICNP.2010.5762769

  38. Vahdat A, Becker D (2000) Epidemic routing for partially-connected ad hoc networks. Technical report, Duke University. http://issg.cs.duke.edu/epidemic/epidemic.pdf. Accessed April 2000

  39. Xu K, Hui P, Li VO-K, Crowcroft J, Latora V, Lio P, (2009) Impact of altruism on opportunistic communications. In: Proceedings of the first international conference on ubiquitous and future networks (ICUFN’09), 2009. IEEE Press, Piscataway, pp 153–158. doi:10.1109/ICUFN.2009.5174303

  40. Yeo J, Kotz D, Henderson T (2006) CRAWDAD: a community resource for archiving wireless data at dartmouth. Comput Commun Review 36(2):21–22

    Article  Google Scholar 

  41. Yu B, Singh MP, Sycara K (2004) Developing trust in large-scale peer-to-peer systems. In: 2004 IEEE 1st symposium on multi-agent security and survivabilty, December 2004, pp 1–10. doi:10.1109/MASSUR.2004.1368412

  42. Zhu H, Lin X, Lu R, Fan Y, Shen X (2009) SMART: a secure multilayer credit-based incentive scheme for delay-tolerant networks. IEEE Trans Veh Technol 58(8):4628–4639. doi:10.1109/TVT.2009.2020105

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Greg Bigwood .

Editor information

Editors and Affiliations

14.1 Electronic supplementary material

Below is the link to the electronic supplementary material.

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this chapter

Cite this chapter

Bigwood, G., Henderson, T. (2013). Incentive-Aware Opportunistic Network Routing. In: Woungang, I., Dhurandher, S., Anpalagan, A., Vasilakos, A. (eds) Routing in Opportunistic Networks. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-3514-3_14

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-3514-3_14

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-3513-6

  • Online ISBN: 978-1-4614-3514-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics