Incentive-Aware Opportunistic Network Routing

Chapter

Abstract

Opportunistic networking relies on cooperation between nodes to perform efficiently. Opportunistic routing protocols depend on nodes forwarding messages for each other, as otherwise the only delivery mechanism would be for the creator of a message to encounter the message destination node and deliver the message directly. Cooperative forwarding, however, incurs a cost to the forwarding nodes, both in terms of energy and storage, as nodes need to dedicate resources to forwarding. Due to these costs, nodes may wish to avoid the costs associated with participation in an opportunistic network, by not forwarding messages for other nodes. We discuss several attacks on opportunistic routing, and in particular, focus on selfishness of nodes. We discuss incentive mechanisms for opportunistic routing, before concluding with a discussion of some of the outstanding challenges in this area.

References

  1. 1.
    Anantvalee T, Wu J (2007) Reputation-based system for encouraging the cooperation of nodes in mobile ad hoc networks. In: Proceedings of the IEEE international conference on communications (ICC ’07), June 2007, pp 3383–3388. doi:10.1109/ICC.2007.560
  2. 2.
    Bigwood G, Henderson T, (2010) Social roles for opportunistic forwarding. In: Proceedings of the 2nd international workshop on mobile opportunistic networking (MobiOpp ’10), February 2010. ACM, New York, pp 199–200. doi:10.1145/1755743.1755787
  3. 3.
    Bigwood G, Henderson T (2011) IRONMAN: using social networks to add incentives and reputation to opportunistic networks. In: Proceedings of the IEEE 3rd international conference on social computing (SocialCom), IEEE, October 2011, pp 65–72. doi:10.1109/PASSAT/SocialCom.2011.60
  4. 4.
    Buchegger S, Le Boudec JY, (2002) Performance analysis of the CONFIDANT protocol. In: Proceedings of the 3rd ACM international symposium on mobile ad hoc networking & computing (MobiHoc ’02), 2002. ACM, New York, pp 226–236. doi:10.1145/513800.513828
  5. 5.
    Burgess J, Bissias GD, Corner MD, Levine BN, (2007) Surviving attacks on disruption-tolerant networks without authentication. In: Proceedings of the 8th ACM international symposium on mobile ad hoc networking and computing (MobiHoc ’07), 2007. ACM, New York, pp 61–70. doi:10.1145/1288107.1288116
  6. 6.
    Conti M, Di Pietro R, Gabrielli A, Mancini LV, Mei A, (2010) The smallville effect: social ties make mobile networks more secure against node capture attack. In: Proceedings of the 8th ACM international workshop on mobility management and wireless access (MobiWac ’10), 2010. ACM, New York, pp 99–106. doi:10.1145/1868497.1868514
  7. 7.
    Eagle N, Pentland AS (2005) CRAWDAD data set mit/reality (v. 2005–07-01). http://crawdad.org/mit/reality. Accessed July 2005
  8. 8.
    Fowler JH, Christakis NA (2010) Cooperative behavior cascades in human social networks. Proc Natl Acad Sci 107(12):5334–5338. doi:10.1073/pnas.0913149107 CrossRefGoogle Scholar
  9. 9.
    Ganeriwal S, Balzano LK, Srivastava MB (June 2008) Reputation-based framework for high integrity sensor networks. ACM Trans Sens Netw 4(3):1–37. doi:10.1145/1362542.1362546 CrossRefGoogle Scholar
  10. 10.
    He Q, Wu D, Khosla P (2004) SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks. In: Proceeding of the wireless communications and networking conference (WCNC), 2004, vol 2, pp 825–830. doi:10.1109/WCNC.2004.1311293
  11. 11.
    Huang E, Crowcroft J, Wassell I, Rethinking incentives for mobile ad hoc networks. In: PINS ’04: Proceedings of the ACM SIGCOMM workshop on practice and theory of incentives in networked systems, 2004. ACM, New York, pp 191–196. doi:10.1145/1016527.1016532
  12. 12.
    Huang KL, Kanhere SS, Hu W, (2010) Are you contributing trustworthy data? The case for a reputation system in participatory sensing. In: Proceedings of the 13th ACM international conference on modeling, analysis, and simulation of wireless and mobile systems (MSWIM ’10), 2010. ACM, New York, pp 14–22. doi:10.1145/1868521.1868526
  13. 13.
    Kangasharju J, Heinemann A, (2008) Incentives for opportunistic networks. In: 22nd international conference on advanced information networking and applications: Workshops (aina workshops 2008) March 2008. IEEE, Los Alamitos, pp 1684–1689. doi:10.1109/WAINA.2008.90
  14. 14.
    Karaliopoulos M (2009) Assessing the vulnerability of DTN data relaying schemes to node selfishness. IEEE Commun Lett 13(12):923–925. doi:10.1109/LCOMM.2009.12.091520 CrossRefGoogle Scholar
  15. 15.
    Keränen A, Pitkänen M, Vuori M, Ott J (2011) Effect of non-cooperative nodes in mobile DTNs. In: Proceedings of the 12th IEEE international symposium on a world of wireless, mobile and multimedia networks (WoWMoM ’11), June 2011. doi:10.1109/WoWMoM.2011.5986144
  16. 16.
    Li F, Wu J, Srinivasan A (2009) Thwarting blackhole attacks in disruption-tolerant networks using encounter tickets. In: IEEE INFOCOM 2009: the 28th conference on computer communications, IEEE, April 2009, pp 2428–2436. doi:10.1109/INFCOM.2009.5062170
  17. 17.
    Li N, Das SK, (2010) RADON: reputation-assisted data forwarding in opportunistic networks. In: Proceedings of the second international workshop on mobile opportunistic networking (MobiOpp ’10), February 2010. ACM, New York, pp 8–14. doi:10.1145/1755743.1755746
  18. 18.
    Li N, Das SK (2011) A trust-based framework for data forwarding in opportunistic networks. Ad Hoc Netw. doi:10.1016/j.adhoc.2011.01.018 Google Scholar
  19. 19.
    Li Q, Gao W, Zhu S, Cao G (2012) A routing protocol for socially selfish delay tolerant networks. Ad Hoc Netw 10(8):1619–1632. doi:10.1016/j.adhoc.2011.07.007 Special issue on social-based routing in mobile and delay-tolerant networksCrossRefGoogle Scholar
  20. 20.
    Liu J, Issarny V (2004) Enhanced reputation mechanism for mobile ad hoc networks. In: Jensen C, Poslad S, Dimitrakos T (eds), Trust management. Lecture notes in computer science, vol 2995, chapter 5. Springer, Berlin, pp 48–62. doi:10.1007/978-3-540-24747-0_5Google Scholar
  21. 21.
    Liu Z, Hu H, Liu Y, Ross KW, Wang Y, Mobius M, (2010) P2P trading in social networks: the value of staying connected. In: Proceedings of the 29th conference on information communications (INFOCOM ’10), 2010. IEEE Press, Piscataway, pp 2489–2497. doi:10.1109/INFCOM.2010.5462077
  22. 22.
    Lu R, Lin X, Zhu H, Shen X, Preiss B (2010) Pi: A practical incentive protocol for delay tolerant networks. IEEE Trans Wireless Commun 9(4):1483–1493. doi:10.1109/TWC.2010.04.090557 CrossRefGoogle Scholar
  23. 23.
    Mahajan R, Rodrig M, Wetherall D, Zahorjan J (2005) Sustaining cooperation in multi-hop wireless networks. In: Proceedings of the 2nd conference on symposium on networked systems design & implementation (NSDI’05), 2005, vol 2. USENIX Association, Berkeley, pp 231–244.http://portal.acm.org/citation.cfm?id=1251220
  24. 24.
    Marti S, Giuli TJ, Lai K, Baker M, (2000) Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th annual international conference on mobile computing and networking (MobiCom ’00), 2000. ACM, New York, pp 255–265. doi:10.1145/345910.345955253C
  25. 25.
    Michiardi P, Molva R (2002) Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of the IFIP TC6/TC11 sixth joint working conference on communications and multimedia security, 2002. Kluwer, Deventer, pp 107–121. http://portal.acm.org/citation.cfm?id=647802.737297
  26. 26.
    Palomar E, Alcaide A, Ribagorda A, Zhang Y (2012) The peer’s dilemma: a general framework to examine cooperation in pure peer-to-peer systems. Comput Netw 56(17):3756–3766. doi:10.1016/j.comnet.2012.08.012 CrossRefGoogle Scholar
  27. 27.
    Panagakis A, Vaios A, Stavrakakis L (2007) On the effects of cooperation in DTNs. In: Proceedings of the 2nd international conference on communication systems software and middleware (COMSWARE 2007), IEEE, January 2007, pp 1–6. doi:10.1109/COMSWA.2007.382571
  28. 28.
    Quercia D, Hailes S, Capra L, (2008) Mobirate: making mobile raters stick to their word. In: Proceedings of the 10th international conference on ubiquitous computing (UbiComp ’08), 2008. ACM, New York, pp 212–221. doi:10.1145/1409635.1409664
  29. 29.
    Resta G, Santi P, (2009) The effects of node cooperation level on routing performance in delay tolerant networks. In: Proceedings of the 6th annual IEEE communications society conference on sensor, mesh and ad hoc communications and networks (SECON’09), 2009. IEEE Press, Piscataway, pp 413–421. doi:10.1109/SAHCN.2009.5168977
  30. 30.
    Saxena N, Denko M, Banerji D (2011) A hierarchical architecture for detecting selfish behaviour in community wireless mesh networks. Comput Commun 34(4):548–555. doi:10.1016/j.comcom.2010.04.040 CrossRefGoogle Scholar
  31. 31.
    Scellato S, Musolesi M, Mascolo C, Latora V, Campbell A, (2011) NextPlace: a spatio-temporal prediction framework for pervasive systems. In: Lyons K, Hightower J, Huang E (eds) Proceedings of the 9th international conference on pervasive computing, June 2011. Springer, Berlin, pp 152–169. doi:10.1007/978-3-642-21726-510
  32. 32.
    Shevade U, Song HH, Qiu L, Zhang Y (2008) Incentive-aware routing in DTNs. In: 2008 IEEE international conference on network protocols, IEEE, October 2008, pp 238–247. doi:10.1109/ICNP.2008.4697042
  33. 33.
    Solis J, Asokan N, Kostiainen K, Ginzboorg P, Ott J (2010) Controlling resource hogs in mobile delay-tolerant networks. Comput Commun 33(1):2–10. doi:10.1016/j.comcom.2009.07.019 CrossRefGoogle Scholar
  34. 34.
    Spyropoulos T, Psounis K, Raghavendra CS, (2005) Spray and wait: an efficient routing scheme for intermittently connected mobile networks. In: Proceedings of the, (2005) ACM SIGCOMM workshop on delay-tolerant networking (WDTN ’05), 2005. ACM, New York, pp 252–259. doi:10.1145/1080139.1080143
  35. 35.
    Spyropoulos T, Psounis K, Raghavendra CS (2008) Efficient routing in intermittently connected mobile networks: the multiple-copy case. IEEE/ACM Trans Netw 16(1):77–90. doi:10.1109/TNET.2007.897964 CrossRefGoogle Scholar
  36. 36.
    Sun YL, Han Z, Yu W, Ray Liu KJ (2006) A trust evaluation framework in distributed networks: vulnerability analysis and defense against attacks. In: IEEE INFOCOM, 2006, pp. 230–236. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.84.5322
  37. 37.
    Uddin MY, Godfrey B, Abdelzaher T (2010) RELICS: In-network realization of incentives to combat selfishness in DTNs. In: Proceeding of the 18th IEEE international conference on network protocols (ICNP), October 2010, pp 203–212. doi:10.1109/ICNP.2010.5762769
  38. 38.
    Vahdat A, Becker D (2000) Epidemic routing for partially-connected ad hoc networks. Technical report, Duke University. http://issg.cs.duke.edu/epidemic/epidemic.pdf. Accessed April 2000
  39. 39.
    Xu K, Hui P, Li VO-K, Crowcroft J, Latora V, Lio P, (2009) Impact of altruism on opportunistic communications. In: Proceedings of the first international conference on ubiquitous and future networks (ICUFN’09), 2009. IEEE Press, Piscataway, pp 153–158. doi:10.1109/ICUFN.2009.5174303
  40. 40.
    Yeo J, Kotz D, Henderson T (2006) CRAWDAD: a community resource for archiving wireless data at dartmouth. Comput Commun Review 36(2):21–22CrossRefGoogle Scholar
  41. 41.
    Yu B, Singh MP, Sycara K (2004) Developing trust in large-scale peer-to-peer systems. In: 2004 IEEE 1st symposium on multi-agent security and survivabilty, December 2004, pp 1–10. doi:10.1109/MASSUR.2004.1368412
  42. 42.
    Zhu H, Lin X, Lu R, Fan Y, Shen X (2009) SMART: a secure multilayer credit-based incentive scheme for delay-tolerant networks. IEEE Trans Veh Technol 58(8):4628–4639. doi:10.1109/TVT.2009.2020105 CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  1. 1.University of St AndrewsFifeUK

Personalised recommendations