761 research outputs found

    PROTECT: Proximity-based Trust-advisor using Encounters for Mobile Societies

    Full text link
    Many interactions between network users rely on trust, which is becoming particularly important given the security breaches in the Internet today. These problems are further exacerbated by the dynamics in wireless mobile networks. In this paper we address the issue of trust advisory and establishment in mobile networks, with application to ad hoc networks, including DTNs. We utilize encounters in mobile societies in novel ways, noticing that mobility provides opportunities to build proximity, location and similarity based trust. Four new trust advisor filters are introduced - including encounter frequency, duration, behavior vectors and behavior matrices - and evaluated over an extensive set of real-world traces collected from a major university. Two sets of statistical analyses are performed; the first examines the underlying encounter relationships in mobile societies, and the second evaluates DTN routing in mobile peer-to-peer networks using trust and selfishness models. We find that for the analyzed trace, trust filters are stable in terms of growth with time (3 filters have close to 90% overlap of users over a period of 9 weeks) and the results produced by different filters are noticeably different. In our analysis for trust and selfishness model, our trust filters largely undo the effect of selfishness on the unreachability in a network. Thus improving the connectivity in a network with selfish nodes. We hope that our initial promising results open the door for further research on proximity-based trust

    Reputation and credit based incentive mechanism for data-centric message delivery in delay tolerant networks

    Get PDF
    In a Data-centric Delay Tolerant Networks (DTNs), it is essential for nodes to cooperate in message forwarding in order to enable successful delivery of a message in an opportunistic fashion with nodes having their social interests defined. In the data-centric dissemination protocol proposed here, a source annotates messages (images) with keywords, and then intermediate nodes are presented with an option of adding keyword-based annotations in order to create higher content strength messages on path toward the destination. Hence, contents like images get enriched as there is situation evolution or learned by these intermediate nodes, such as in a battlefield, or in a disaster situation. Nodes might turn selfish and not participate in relaying messages due to relative scarcity of battery and storage capacity in mobile devices. Therefore, in addition to content enrichment, an incentive mechanism is proposed in this thesis which considers factors like message quality, battery usage, level of interests, etc. for the calculation of incentives. Moreover, with the goal of preventing the nodes from turning malicious by adding inappropriate message tags in the quest of acquiring more incentive, a distributed reputation model (DRM) is developed and consolidated with the proposed incentive scheme. DRM takes into account inputs from multiple users like ratings for the relevance of annotations in the message, message quality, etc. The proposed scheme safeguards the network from congestion due to uncooperative or selfish nodes in the system. The performance evaluation shows that our approach delivers more high priority and high quality messages while reducing traffic at a slightly lower message delivery ratio compared to ChitChat --Abstract, page iv

    A Taxonomy on Misbehaving Nodes in Delay Tolerant Networks

    Get PDF
    Delay Tolerant Networks (DTNs) are type of Intermittently Connected Networks (ICNs) featured by long delay, intermittent connectivity, asymmetric data rates and high error rates. DTNs have been primarily developed for InterPlanetary Networks (IPNs), however, have shown promising potential in challenged networks i.e. DakNet, ZebraNet, KioskNet and WiderNet. Due to unique nature of intermittent connectivity and long delay, DTNs face challenges in routing, key management, privacy, fragmentation and misbehaving nodes. Here, misbehaving nodes i.e. malicious and selfish nodes launch various attacks including flood, packet drop and fake packets attack, inevitably overuse scarce resources (e.g., buffer and bandwidth) in DTNs. The focus of this survey is on a review of misbehaving node attacks, and detection algorithms. We firstly classify various of attacks depending on the type of misbehaving nodes. Then, detection algorithms for these misbehaving nodes are categorized depending on preventive and detective based features. The panoramic view on misbehaving nodes and detection algorithms are further analyzed, evaluated mathematically through a number of performance metrics. Future directions guiding this topic are also presented

    Social Data Offloading in D2D-Enhanced Cellular Networks by Network Formation Games

    Full text link
    Recently, cellular networks are severely overloaded by social-based services, such as YouTube, Facebook and Twitter, in which thousands of clients subscribe a common content provider (e.g., a popular singer) and download his/her content updates all the time. Offloading such traffic through complementary networks, such as a delay tolerant network formed by device-to-device (D2D) communications between mobile subscribers, is a promising solution to reduce the cellular burdens. In the existing solutions, mobile users are assumed to be volunteers who selfishlessly deliver the content to every other user in proximity while moving. However, practical users are selfish and they will evaluate their individual payoffs in the D2D sharing process, which may highly influence the network performance compared to the case of selfishless users. In this paper, we take user selfishness into consideration and propose a network formation game to capture the dynamic characteristics of selfish behaviors. In the proposed game, we provide the utility function of each user and specify the conditions under which the subscribers are guaranteed to converge to a stable network. Then, we propose a practical network formation algorithm in which the users can decide their D2D sharing strategies based on their historical records. Simulation results show that user selfishness can highly degrade the efficiency of data offloading, compared with ideal volunteer users. Also, the decrease caused by user selfishness can be highly affected by the cost ratio between the cellular transmission and D2D transmission, the access delays, and mobility patterns
    • …
    corecore