Skip to main content
Log in

Cooperation in Opportunistic Networks: An Overlay Approach for Destination-Dependent Utility-Based Schemes

  • Research Article - Computer Engineering and Computer Science
  • Published:
Arabian Journal for Science and Engineering Aims and scope Submit manuscript

Abstract

In destination-dependent utility-based schemes, data forwarding is stimulated when a node presents next-hop fitness to destination higher than the current custodian of a message. However, these schemes do not enforce any mechanism to ensure cooperative participation, and altruistic behavior is taken as an assumption, instead. Therefore, a wide range of existing schemes known to provide effective performance may fail in pragmatic settings afflicted with selfish participants. In this paper, we propose a novel cooperation framework which is deployed as an overlay to assist data forwarding utility-based schemes. Effectiveness of our framework is evaluated through intensive simulations with PRoPHET and MARS routing.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Grasic, S.; Davies, E.; Lindgren, A.; Doria, A. In: Proceedings of the 6th ACM workshop on Challenged networks (ACM, 2011), pp. 27–30

  2. Nelson, S.C.; Bakht, M.; Kravets, R. In: INFOCOM 2009 (IEEE, 2009), pp. 846–854

  3. Balasubramanian A., Levine B.N., Venkataramani A.: Replication routing in DTNs: a resource allocation approach. Netw. IEEE/ACM Trans. 18(2), 596 (2010)

    Article  Google Scholar 

  4. Vahdat, A.; Becker, D., et al.: Epidemic routing for partially connected ad hoc networks. Tech. rep., Technical Report CS-200006, Duke University (2000)

  5. Cerf, V.; Burleigh, S.; Hooke, A.; Torgerson, L.; Durst, R.; Scott, K.; Fall, K.; Weiss, H.: IRTF DTN Research Group 2(4), 6 (2007)

  6. Yasmin, S.; Rais, R.N.B.; Qayyum, A. In: International Conference on Computer Communications and Networks (IEEE, August 7, 2014)

  7. Elwhishi, A.; Ho, P.H. In: Global Telecommunications Conference, GLOBECOM (IEEE, 2009), pp. 1–7

  8. Panagakis, A.; Vaios, A.; Stavrakakis, I. In: Communication Systems Software and Middleware, 2007. COMSWARE 2007. 2nd International Conference on (IEEE, 2007), pp. 1–6

  9. Miao J., Hasan O., Mokhtar S.B., Brunie L., Yim K.: An investigation on the unwillingness of nodes to participate in mobile delay tolerant network routing. Int. J. Inf. Manag. 33(2), 252 (2013)

    Article  Google Scholar 

  10. Zhu, H.; Lin, X.; Lu, R.; Fan, Y.; Shen, X.: SMART: a secure multilayer credit-based incentive scheme for delay-tolerant networks. Veh. Technol. IEEE Trans. 58(8), 4628 (2009)

  11. Chen, B.B.; Chan, M.C. In: INFOCOM, 2010 Proceedings IEEE (IEEE, 2010), pp. 1–9

  12. Liu G., Ji S., Cai Z.: Strengthen nodal cooperation for data dissemination in mobile social networks. Pers. Ubiquitous Comput. 18(8), 1797 (2014)

    Article  Google Scholar 

  13. Lu R., Lin X., Zhu H., Shen X., Preiss B.: Pi: A practical incentive protocol for delay tolerant networks. Wirel. Commun. IEEE Trans. 9(4), 1483 (2010)

    Article  Google Scholar 

  14. Mei A., Stefa J.: Give2Get: forwarding in social mobile wireless networks of selfish individuals. Dependable Secur. Comput. IEEE Trans. 9(4), 569 (2012)

    Article  Google Scholar 

  15. Li N., Das S.K.: A trust-based framework for data forwarding in opportunistic networks. Ad Hoc Netw. 11(4), 1497 (2013)

    Article  Google Scholar 

  16. Dini G., Lo Duca A.: Towards a reputation-based routing protocol to contrast blackholes in a delay tolerant network. Ad Hoc Netw. 10(7), 1167 (2012)

    Article  Google Scholar 

  17. Wei L., Zhu H., Cao Z., Shen X.S.: Ad-hoc, Mobile, and Wireless Networks, pp. 177–190. Springer, Berlin Heidelberg (1976)

    Google Scholar 

  18. Bigwood, G.; Henderson, T. In: Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third International Conference on Social Computing (SocialCom), 2011 IEEE Third International Conference on (IEEE, 2011), pp. 65–72

  19. Marti, S.; Giuli, T.J.; Lai, K.; Baker, M. In: Proceedings of the 6th annual international conference on Mobile computing and networking (ACM, 2000), pp. 255–265

  20. Li, F.; Wu, J. In: INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE (IEEE, 2007), pp. 1946–1954

  21. Nagrath, P.; Aneja, S.; Gupta, N.; Madria, S.: Wireless Networks, pp. 1–12 (2015)

  22. Buttyán L., Dóra L., Félegyházi M., Vajda I.: Barter trade improves message delivery in opportunistic networks. Ad Hoc Netw. 8(1), 1 (2010)

    Article  Google Scholar 

  23. Shevade, U.; Song, H.H.; Qiu, L.; Zhang, Y. In: Network Protocols, 2008. ICNP 2008. IEEE International Conference on (IEEE, 2008), pp. 238–247

  24. Fishbein M.: Mathematical Models in Marketing, pp. 87–88. Springer, Berlin Heidelberg (1976)

    Book  Google Scholar 

  25. Ganeriwal S., Balzano L.K., Srivastava M.B.: Reputation-based framework for high integrity sensor networks. ACM Trans. Sensor Netw. (TOSN) 4(3), 15 (2008)

    Google Scholar 

  26. Jsang, A.; Ismail, R. In: In Proceedings of the 15th Bled Electronic Commerce Conference (Citeseer, 2002)

  27. Liu Y., Li K., Jin Y., Zhang Y., Qu W.: A novel reputation computation model based on subjective logic for mobile ad hoc networks. Future Gener. Comput. Syst. 27(5), 547 (2011)

    Article  Google Scholar 

  28. Shafer G. et al.: A mathematical theory of evidence, vol. 1. Princeton university press, Princeton (1976)

    MATH  Google Scholar 

  29. Musolesi M., Mascolo C.: Car: context-aware adaptive routing for delay-tolerant mobile networks. Mobile Comput. IEEE Trans. 8(2), 246 (2009)

    Article  Google Scholar 

  30. Burgess, J.; Gallagher, B.; Jensen, D.; Levine, B.N. In: INFOCOM, vol. 6 (2006), vol. 6, pp. 1–11

  31. Karlof C., Wagner D.: Secure routing in wireless sensor networks: Attacks and countermeasures. Ad hoc Netw. 1(2), 293 (2003)

    Article  Google Scholar 

  32. Fall, K. In: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications (ACM, 2003), pp. 27–34

  33. Liu, A.; Ning, P. In: Information Processing in Sensor Networks, 2008. IPSN’08. International Conference on (IEEE, 2008), pp. 245–256

  34. Shamir A.: Advances in cryptology, pp. 47–53. Springer, Berlin Heidelberg (1976)

    Google Scholar 

  35. Spyropoulos, T.; Psounis, K.; Raghavendra, C.S. In: Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking (ACM, 2005), pp. 252–259

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sadaf Yasmin.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yasmin, S., Qayyum, A. & Rais, R.N.B. Cooperation in Opportunistic Networks: An Overlay Approach for Destination-Dependent Utility-Based Schemes. Arab J Sci Eng 42, 467–482 (2017). https://doi.org/10.1007/s13369-016-2253-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13369-016-2253-9

Keywords

Navigation