Skip to main content
Log in

Transmission of multimedia contents in opportunistic networks with social selfish nodes

  • Regular Paper
  • Published:
Multimedia Systems Aims and scope Submit manuscript

Abstract

To share multimedia content and provide reliable communication in an intermittently connected environment, most of the existing transmission schemes of opportunistic networks are taking a class of store-carry-forward schemes to improve the delivery. However, they do not take the social selfish nodes into consideration. To deal with the unpredictability in connections and uncooperative behaviors in the nodes, this paper proposes a transmission scheme to help the social selfish nodes to forward messages for other nodes. In the proposed scheme, priority is given to a message according to the cooperation degree, a cache management strategy is applied, and a delivery probability is calculated to guide nodes to select the better nodes as their relays. Simulation experiments show that the proposed transmission scheme protocol is effective and outperforms the existing transmission schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Jain, S., Fall, K., Patra, R.: Routing in a delay tolerant network. In: Proceedings of ACM SIGCOMM, August 2004, pp. 145–158 (2004)

  2. Chen, Z., Qiu, Y., Liu, J., Xu, L.: Incentive mechanism for selfish nodes in wireless sensor networks based on evolutionary game. Comput. Math. Appl. 62(62), 3378–3388 (2011)

    Article  MATH  MathSciNet  Google Scholar 

  3. Adar, E., Huberman, B.A.: 2002. Free riding on Gnutella. Technical Report, SSL-00-63[R]. Internet Ecologies Area Xerox Palo Alto Research Center, Palo Alto (2002)

  4. He, Q., Wu, D., Khosla, P.: SORI:a secure and objective reputation-based incentive scheme for ad-hoc networks. In: Proceedings of IEEE Wireless Communications and Networking Conference (WCNC’04): vol. 2. March 21–25, Atlanta, GA, USA, Piscataway, NJ, USA: IEEE, pp. 825–830 (2004)

  5. Ram, R., Richard, H., et al.: Prioritized epidemic routing for opportunistic networks. In: Proceedings of MobiOpp (2007)

  6. Hui, P., Xu, K., Li, V.O.K., Crowcroft, J., Latora, V., Lio, P.: Selfishness, altruism and message spreading in mobile social networks, In: Proceedings of First IEEE International Workshop on Network Science For Communication Networks (NetSciCom09) (2009)

  7. Li, Q., Zhu, S., Cao, G.: Routing in socially selfish delay tolerant networks. In: Proceedings of the IEEE INFOCOM 2010, 14–19 March 2010, pp. 1–9 (2010)

  8. Antonis, A.V., Panagakis, I., Stavrakakis: On the effects of cooperation in DTNs. In: Proceedings of the Second International Conference on COMmunication System Software and Middleware (COMSWARE), 2007, pp. 1–6 (2007)

  9. Resta, G., Santi, P.: The effects of node cooperation level on routing performance in delay tolerant networks. In: Proceedings of the 6th Annual Conference on Sensor, Mesh and Ad Hoc Communications and Networks, IEEE Computer Society, Washington, DC, pp. 413–421 (2009)

  10. Eitan, A., Arzad, A., Kherani, Pietro, M., Refik, M.: Non-cooperative forwarding in ad hoc networks. Lect. Notes Comput. Sci. 2005(3462), 100–128 (2005)

    Google Scholar 

  11. Buchegger, S., Boudec, J.L.: Performance analysis of the CONFIDANT protocol. In: Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), pp. 226–236 (2002)

  12. Zhong, S., Chen, J., Yan, Y.R.: Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: Proceedings of 22nd Annual Joint Conference on the IEEE Computer and Communications Society, March 30–April 3, vol. 3, pp. 1987–1997. San Francisco, USA (2003)

  13. Buttyan, L., Hubaux, J.: Stimulating cooperation in self-organizing mobile Ad Hoc networks. Mobile Netw. Appl. 8(5), 579–592 (2003)

    Article  Google Scholar 

  14. Burgess, J., Gallagher, B., Jensen, D. et al.: MaxProp: routing for vehicle-based disruption-tolerant networks. In: Proceedings of the 25th IEEE International Conference on Computer Communications. April 23–29, 2006, Barcelona, Catalunya, Spain, pp. 1–11 (2006)

  15. Michiardi, P., Molva, R.: CORE: a cooperative reputation chanism to enforce node cooperative in mobile ad hoc network (A).Communications and Multimedia security conference (CMS) (C). Portoroz, Slovenia, pp. 107–121 (2002)

  16. Eitan, A., Arzad, A.K., Pietro, M., Refik, M.: Non-cooperative forwarding in ad hoc networks, PIMRC 2004, also available as a technical report at INRIA Sophia Anitpolis (submitted for publication) (2004)

  17. Buchegger, S., Boudec, J.L.: Performance analysis of the CONFIDANT protocol. In: Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc) (2002)

  18. Shevade, U., Song, H., Qiu, L., et al.: Incentive-aware routing in DTNs (A). In: Proceedings of IEEE ICNP (C), pp. 238–247 (2008)

  19. Krifa, A., Barakat, C.: An optimal joint scheduling and drop policy for delay tolerant networks. In: proceeding of World of Wireless, Mobile and Multimedia Networks, Newport Beach, pp. 1–6 (2008)

  20. Seth, A., Keshav, S.: Practical security for disconnected nodes. Workshop Secure Netw. Protoc. (NPSec) 6, 31–36 (2005)

    Google Scholar 

  21. Shevade, U., Song, H., Qiu, L., Zhang, Y.: Incentive-aware routing in dtns. In: Proceedings of the 16th IEEE International Conference on Network Protocols, Orlando, Florida, 19–22 October 2008

Download references

Acknowledgments

This work was supported by the National Natural Science Foundation of China under grant No.61172087 and the Postdoctoral Science Foundation of China under grant No. 2013M530701.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Daru Pan.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Pan, D., Zhang, H., Chen, W. et al. Transmission of multimedia contents in opportunistic networks with social selfish nodes. Multimedia Systems 21, 277–288 (2015). https://doi.org/10.1007/s00530-013-0343-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00530-013-0343-z

Keywords

Navigation