Skip to main content

MobiID: A User-Centric and Social-Aware Reputation Based Incentive Scheme for Delay/Disruption Tolerant Networks

  • Conference paper
Ad-hoc, Mobile, and Wireless Networks (ADHOC-NOW 2011)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 6811))

Included in the following conference series:

Abstract

Delay/Disruption tolerant networks (DTNs) are wireless ad-hoc networks, where end-to-end connectivity can not be guaranteed and communications rely on the assumption that the nodes are willing to store-carry-and-forward bundles in an opportunistic way. However, this assumption would be easily violated due to the selfish nodes which are unwilling to consume precious wireless resources by serving as bundle relays. Incentive issue in DTNs is extraordinarily challenging due to the unique network characteristics. To tackle this issue, in this paper, we propose MobiID, a novel user-centric and social-aware reputation based incentive scheme for DTNs. Different from conventional reputation schemes which rely on neighboring nodes to monitor the traffic and keep track of each other’s reputation, MobiID allows a node to manage its reputation evidence and show to demonstrate its reputation whenever necessary. We also define the concepts of self-check and community-check to speed up reputation establishment and allow nodes to form consensus views towards targets in the same community, which is based on our social metric by forwarding willingness. Performance simulation are given to demonstrate the security, effectiveness and efficiency of the proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Fall, K., Farrell, S.: DTN: an architectural retrospective. IEEE Journal on Selected Areas in Communications 26(5), 828–836 (2008)

    Article  Google Scholar 

  2. Zhu, H., Lin, X., Lu, R., Fan, Y., Shen, X.: SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks. IEEE Transactions on Vehicular Technology 58(8), 4628–4639 (2009)

    Article  Google Scholar 

  3. Chen, B., Chan, M.: MobiCent: a Credit-Based Incentive System for Disruption Tolerant Network. In: INFOCOM 2010, San Diego, California, USA, March 14-19 (2010)

    Google Scholar 

  4. Lu, R., Lin, X., Zhu, H., Shen, X., Preiss, B.: Pi: a practical incentive protocol for delay tolerant networks. IEEE Trans. on Wireless Communications 9(4), 1483–1493 (2010)

    Article  Google Scholar 

  5. Buttyan, L., Hubaux, J.P.: Stimulating cooperation in self-organizing mobile ad hoc networks. Mobile Networks and Applications 8(5), 579–592 (2003)

    Article  Google Scholar 

  6. Zhong, S., Chen, J., Yang, Y.: Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: INFOCOM 2003, San Franciso, USA, March 30-April 3 (2003)

    Google Scholar 

  7. Anderegg, L., Eidenbenz, S.: Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. In: MOBICOM 2003, San Diego, CA, USA, September 14-19 (2003)

    Google Scholar 

  8. Zhang, Y., Lou, W., Liu, W., Fang, Y.: A secure incentive protocol for mobile ad hoc networks. Wireless Networks 13(5), 569–582 (2007)

    Article  Google Scholar 

  9. Mahmoud, M.E., Shen, X.: FESCIM: Fair, Efficient, and Secure Cooperation Incentive Mechanism for Multi-hop Cellular Networks. IEEE Trans. on Mobile Computing (to appear)

    Google Scholar 

  10. Shevade, U., Song, H., Qiu, L., Zhang, Y.: Incentive-Aware Routing in DTNs. In: ICNP 2008, Orlando, Florida, USA, October 19-22 (2008)

    Google Scholar 

  11. Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: MOBICOM 2000, Boston, MA, USA, August 6-11 (2000)

    Google Scholar 

  12. Jøsang, A., Ismail, R.: The beta reputation system. In: The 15th Bled Electronic Commerce Conference, Bled, Slovenia, June 17-19 (2002)

    Google Scholar 

  13. Michiardi, P., Molva, R.: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Sixth Joint Working Conference on Communications and Multimedia Security, Portorož, Slovenia, September 26-27 (2002)

    Google Scholar 

  14. Bansal, S., Baker, M.: Observation-based cooperation enforcement in ad hoc networks. Arxiv preprint cs/0307012 (2003)

    Google Scholar 

  15. He, Q., Wu, D., Khosla, P.: SORI: A Secure and Objective Reputation-based Incentive Scheme for Ad hoc Networks. In: WCNC 2004, Atlanta, GA, USA, March 21-25 (2004)

    Google Scholar 

  16. Anantvalee, T., Wu, J.: Reputation-based system for encouraging the cooperation of nodes in mobile ad hoc networks. In: ICC 2007, SECC, Glasgow, Scotland, June 24-28 (2007)

    Google Scholar 

  17. Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems 43(2), 618–644 (2007)

    Article  Google Scholar 

  18. Li, N., Das, S.: RADON: reputation-assisted data forwarding in opportunistic networks. In: MobiOpp 2010, Pisa, Italy, February 22-23 (2010)

    Google Scholar 

  19. Mei, A., Stefa, J.: Give2get: Forwarding in social mobile wireless networks of selfish individuals. In: ICDCS 2010, Genova, Italy, June 21-25 (2010)

    Google Scholar 

  20. Li, Q., Zhu, S., Cao, G.: Routing in socially selfish delay tolerant networks. In: INFOCOM 2010, San Diego, California, USA, March 14-19 (2010)

    Google Scholar 

  21. Li, F., Yang, Y., Wu, J.: CPMC: An Efficient Proximity Malware Coping Scheme in Smartphone-based Mobile Networks. In: INFOCOM 2010, San Diego, California, USA, March 14-19 (2010)

    Google Scholar 

  22. Von Luxburg, U.: A tutorial on spectral clustering. Statistics and Computing 17(4), 395–416 (2007)

    Article  Google Scholar 

  23. Cha, J., Cheon, J.: An Identity-Based Signature From Gap Diffie-Hellman Groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 18–30. Springer, Heidelberg (2002)

    Google Scholar 

  24. Ferrara, A.L., Green, M., Hohenberger, S., Pedersen, M.Ø.: Practical short signature batch verification. In: Fischlin, M. (ed.) CT-RSA 2009. LNCS, vol. 5473, pp. 309–324. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  25. Capasso, V.: Mathematical structures of epidemic systems. Springer, Heidelberg (1993)

    Book  MATH  Google Scholar 

  26. Lynn, B.: The Pairing-Based Cryptography Library (PBC), http://crypto.stanford.edu/pbc/

  27. The Opportunistic Network Environment simulator (The ONE) Version 1.4.0 (March 18, 2010), http://www.netlab.tkk.fi/tutkimus/dtn/theone/

  28. Mahmoud, M.E., Shen, X.: ESIP: Secure Incentive Protocol with Limited Use of Public-Key Cryptography for Multi-hop Wireless Networks. IEEE Trans. on Mobile Computing (to appear)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wei, L., Zhu, H., Cao, Z., Shen, X.(. (2011). MobiID: A User-Centric and Social-Aware Reputation Based Incentive Scheme for Delay/Disruption Tolerant Networks. In: Frey, H., Li, X., Ruehrup, S. (eds) Ad-hoc, Mobile, and Wireless Networks. ADHOC-NOW 2011. Lecture Notes in Computer Science, vol 6811. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22450-8_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22450-8_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22449-2

  • Online ISBN: 978-3-642-22450-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics