Skip to main content

Reputation-Based Participant Incentive Approach in Opportunistic Cognitive Networks

  • Conference paper
Advanced Computer Architecture

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 451))

  • 972 Accesses

Abstract

Sufficient reputable participants are critical to effective data collections and data disseminations in opportunistic cognitive networks. However, it is difficult to identify reputable or malicious participants in opportunistic networks. Cognitive network technology can be applied to the communication system of opportunistic networks to provide reputation-aware schemes of the participants. Furthermore, keeping participants enthusiasm for activities of networks is also important. In this work, we propose a Reputation-Based Participant Incentive Approach (RBPIA) to motivate reputable participants. RBPIA scores participants using reputation degree according to their sensing data and bid price respectively and encourage them to keep interested in the activities with rewards. Simulations are performed in different scenarios to evaluate efficiency of the approach. The results show that RBPIA can identify participant types well, and remarkably reduce the incentive cost.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Xie, X., Wang, X., Wen, Z., et al.: A QoS Routing Protocol for Cognitive Networks. Chinese Journal of Computers 0936(9), 1807–1815 (2013)

    Google Scholar 

  2. Wang, X., Cheng, H., Li, K., Li, J., Sun, J.: A cross-layer optimization based integrated routing and grooming algorithm for green multi-granularity transport networks. Journal of Parallel and Distributed Computing 0673(6), 807–822 (2013)

    Article  Google Scholar 

  3. Pelusi, L., Passarella, A., Conti, M.: Opportunistic networking: data forwarding in disconnected mobile ad hoc networks. IEEE Comm. Magazine 44(11), 134–141 (2006)

    Article  Google Scholar 

  4. Mun, M., Reddy, S., Shilton, K., et al.: PEIR, the personal environment impact report, as a platform for participatory sensing systems research. In: Proceedings of the 7th International Conference on Mobile Systems, Applications, and Services, MobiSys 2009 (June 2009)

    Google Scholar 

  5. Hull, B., Bychkovsky, V., Chen, K., et al.: CarTel: A Distributed Mobile Sensor Computing System. In: Proc. of 11th ACM SenSys 2006 (November 2006)

    Google Scholar 

  6. Lu, H., Eisenman, S.B., Campbell, A.T.: Bubble-sensing: Binding sensing tasks to the physical world. In: Pervasive and Mobile Computing (2010)

    Google Scholar 

  7. Qu, D., Wang, X., Huang, M.: An Aware Ant Routing Algorithm in Mobile Peer-To-Peer Networks. Chinese Journal of Computers 0736(07), 1456–1464 (2013)

    Google Scholar 

  8. Wang, X., Cheng, H., Huang, M.: Multi-robot navigation based QoS routing in self-organizing networks. Engineering Applications of Artificial Intelligence 26(1), 262–272 (2013)

    Article  Google Scholar 

  9. Intel Urban Atmosphere, http://www.urban-atmospheres.net/

  10. Allen, M., Girod, L., Newton, R., Madden, S., Blumstein, D.T., Estrin, D.: Voxnet: an interactive, rapidly deployable acoustic monitoring platform. In: IPSN 2008: Proceedings of the 2008 International Conference on Information Processing in Sensor Networks, pp. 371–382. IEEE Computer Society, Washington, DC (2008)

    Google Scholar 

  11. Hoh, B., Gruteser, M., Herring, R., Ban, J., Work, D., Herrera, J.C., Bayen, A.M., Annavaram, M., Jacobson, Q.: Virtual trip lines for distributed privacy-preserving traffic monitoring. In: MobiSys 2008, Breckenridge, CO (2008)

    Google Scholar 

  12. Wang, X., Cai, L., Huang, M., et al.: Spatial Tessellation Based k Coverage Scheme for 3D Wireless Sensor. Mini-micro Systems 35(3), 433–436 (2014)

    Google Scholar 

  13. Azizyan, M., Choudhury, R.R.: SurroundSense: mobile phone localization using ambient sound and light. ACM SIGMOBILE Mobile Computing and Communications Review 13(1), 69–72 (2009)

    Article  Google Scholar 

  14. Compbell, A.T., Eisenman, S.B., Fodor, K., et al.: CenceMe: Injecting Sensing Presence into Social Network Applications. In: Proc. of Ninth ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2008), Hong Kong (2008)

    Google Scholar 

  15. MIT Media Lab: The Owl Project, http://owlproject.media.mit.edu

  16. Chen, B.-C., Guo, J., Tseng, B., Yang, J.: User reputation in a comment rating environment. In: Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2011 (2011)

    Google Scholar 

  17. Amazon, http://www.amazon.com

  18. Li, W., Wu, D., Xu, H.: Reputation in China’s online auction market: Evidence from Taobao.com. Frontiers of Business Research in China 2, 323–328 (2008)

    Article  Google Scholar 

  19. Buchegger, S., Le Boudec, J.Y.: Performance Analysis of the CONFIDANT Protocol. In: Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (2002)

    Google Scholar 

  20. Michiardi, P., Molva, R.: Core: a Collaborative Reputation mechanism to enforce node cooperation in mobile ad-hoc networks. In: Jerman-Blažič, B., Klobučar, T. (eds.) Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security. IFIP, vol. 100, pp. 107–121. Springer, Boston (2002)

    Google Scholar 

  21. Buchegger, S., Le Boudec, J.Y.: Coping with False Accusations in Misbehavior Reputation System for Mobile Ad-hoc Networks. EPEL Technical Report Number IC/2003/31 (2003)

    Google Scholar 

  22. Buchegger, S., Le Boudec, J.Y.: The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks. In: WiOpt 2003: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (March 2003)

    Google Scholar 

  23. Josang, A., Ismail, R.: The Beta Reputation System. In: Proceedings of the 15th Bled Electronic Commerce Conference (June 2002)

    Google Scholar 

  24. Gelman, A., Carlin, J.B., Stern, H.S., Rubin, D.B.: Bayesian Data Analysis. Chapman and Hall (2003)

    Google Scholar 

  25. Ganeriwal, S., Srivastava, M.: Reputation-based Framework for High Integrity Sensor Networks. ACM Transactions on Sensor Networks (TOSN) 4(3) (May 2008)

    Google Scholar 

  26. Huang, K.L., Kanhere, S.S., Hu, W.: On the need for a reputation system in mobile phone based sensing. Ad Hoc Netw. (2012), doi:10.1016/j.adhoc.2011.12.002

    Google Scholar 

  27. Yang, H., Zhang, J., Roe, P.: Using reputation management in participatory sensing for data classification. In: 2nd International Conference on Ambient Systems, Networks and Technologies, ANT-2011/8th International Conference on Mobile Web Information Systems, MobiWIS 2011 (2011)

    Google Scholar 

  28. Yang, B., Garcia-Molina, H.: PPay: micropayments for peer-to-peer systems. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, Washington, D.C., USA, pp. 300–310 (2003)

    Google Scholar 

  29. Habib, A., Chuang, J.: Service differentiated peer selection: an incentive mechanism for peer-to-peer media streaming. IEEE Transactions on Multimedia 8(3), 610–621 (2006)

    Article  Google Scholar 

  30. Lee, J.-S., Hoh, B.: Dynamic pricing incentive for participatory sensing. In: Pervasive and Mobile Computing (December 2010)

    Google Scholar 

  31. Bichler, M.: The Future of e-Markets: Multidimensional Market Mechanism. Cambridge University Press (2001)

    Google Scholar 

  32. Bichler, M., Kaukal, M., Segev, A.: Multi-attribute auctions for electronic procurement. In: Proc. 1st IBM IAC Workshop on Internet Based Negotiation Technologies, Yorktown Heights, NY (1999)

    Google Scholar 

  33. Chou, C.T., Ignjatovic, A., Hu, W.: Efficient Computation of Robust Average in Wireless Sensor Networks using Compressive Sensing. Technical Report: UNSW-CSE-TR-0915

    Google Scholar 

  34. Gompertz, B.: On the Nature of the Function Expressive of the Law of Human Mortality, and on a New Mode of Determining the Value of Life Contingencies. Philosophical Transactions of the Royal Society of London 115, 513–585 (1825), doi:10.1098/rstl.1825.0026

    Google Scholar 

  35. MacQueen, J.B.: Some Methods for classification and Analysis of Multivariate Observations. In: Proceedings of 5th Berkeley Symposium on Mathematical Statistics and Probability, pp. 281–297. University of California Press (2009) (retreived)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Li, J., Liu, R., Yu, R., Wang, X., Zhao, Z. (2014). Reputation-Based Participant Incentive Approach in Opportunistic Cognitive Networks. In: Wu, J., Chen, H., Wang, X. (eds) Advanced Computer Architecture. Communications in Computer and Information Science, vol 451. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-44491-7_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-44491-7_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-44490-0

  • Online ISBN: 978-3-662-44491-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics