3 research outputs found

    PROTECT: Proximity-based Trust-advisor using Encounters for Mobile Societies

    Full text link
    Many interactions between network users rely on trust, which is becoming particularly important given the security breaches in the Internet today. These problems are further exacerbated by the dynamics in wireless mobile networks. In this paper we address the issue of trust advisory and establishment in mobile networks, with application to ad hoc networks, including DTNs. We utilize encounters in mobile societies in novel ways, noticing that mobility provides opportunities to build proximity, location and similarity based trust. Four new trust advisor filters are introduced - including encounter frequency, duration, behavior vectors and behavior matrices - and evaluated over an extensive set of real-world traces collected from a major university. Two sets of statistical analyses are performed; the first examines the underlying encounter relationships in mobile societies, and the second evaluates DTN routing in mobile peer-to-peer networks using trust and selfishness models. We find that for the analyzed trace, trust filters are stable in terms of growth with time (3 filters have close to 90% overlap of users over a period of 9 weeks) and the results produced by different filters are noticeably different. In our analysis for trust and selfishness model, our trust filters largely undo the effect of selfishness on the unreachability in a network. Thus improving the connectivity in a network with selfish nodes. We hope that our initial promising results open the door for further research on proximity-based trust

    Competition and cooperation between nodes in Delay Tolerant Networks with Two Hop Routing

    Get PDF
    Abstract. This paper revisits the two-hop forwarding policy in delay tolerant networks (DTNs) and provides a rich study of their performance and optimization which includes (i) Derivation of closed form expressions for the main performance measures such as success delivery probability of a packet (or a message) within a given deadline. (ii) A study of competitive and cooperative operations of DTNs and derivation of the structure of optimal and of equilibrium policies. (iii) A study of the case in which the entity that is forwarded is a chunk rather than a whole message. For a message to be received successfully, all chunks of which it is composed have to arrive at the destination within the deadline. (iv) A study of the benefits of adding redundant chunks. (v) The convergence to the mean field limit.
    corecore