Skip to main content

ONSIDE-SELF: A Selfish Node Detection and Incentive Mechanism for Opportunistic Dissemination

  • Chapter
  • First Online:
Internet of Things (IoT) in 5G Mobile Technologies

Abstract

The advent of IoT (the Internet of Things) has led to the necessity of fast and secure communication between devices, ranging from small sensors to top-of-the-line smartphones or laptops. One proposal for IoT communication is through 5G, which is estimated to be rolled out by 2020. However, the infrastructure for 5G communication might not always be present, or it should be avoided because of congestion. Moreover, employing it in smaller IoT networks can prove too expensive in some cases, while some small devices such as sensors might not even have 5G capabilities (or having them would greatly increase their price). For these reasons, opportunistic communication is an alternative for IoTs where mobile broadband connections cannot be used. Opportunistic networks are formed of mobile devices (such as smartphones and tablets belonging to social users) that communicate using close-range protocols such as Bluetooth or WiFi Direct. These networks are based on the store-carry-and-forward paradigm, where contacts between nodes are used opportunistically to transport data from a source to a destination, even though the two nodes might never be in direct communication range. Data dissemination assumes that nodes do not send directed messages (i.e., from a source to a pre-set destination), instead using channels to perform communication. Nodes are able to subscribe to channels, which are represented by interests (e.g., a node interested in “IT” will need to receive all messages marked with that tag). The main requirement of opportunistic networks is that the participating nodes should be altruistic, since communication is performed with the help of other nodes. However, this might not always be the case, since selfish nodes might decide that they do not want to help others. Such nodes should be detected and not allowed to participate in the dissemination process. This way, their messages will not be delivered, so they will be forced to become altruistic if they want a good networking experience. In this chapter, we propose a method for detecting and punishing selfish nodes in opportunistic networks dissemination, using gossiping mechanisms over the dynamic social network. Nodes learn about the behavior of other nodes and, when a contact occurs, share this information with an encountered device. We apply this method to an existing social and interest-based dissemination algorithm (ONSIDE) and show that it correctly detects and punishes selfish nodes, thus increasing the network’s behavior in terms of message delivery and congestion.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bigwood, G., Henderson, T.: IRONMAN: using social networks to add incentives and reputation to opportunistic networks. In: SocialCom/PASSAT, pp. 65–72. IEEE (2011)

    Google Scholar 

  2. Ciobanu, R.I., Dobre, C.: Predicting encounters in opportunistic networks. In: Proceedings of the 1st ACM Workshop on High Performance Mobile Opportunistic Systems, HP-MOSys’12, pp. 9–14. ACM, New York, NY, USA (2012). doi:10.1145/2386980.2386983, http://doi.acm.org/10.1145/2386980.2386983

  3. Ciobanu, R.I., Dobre, C., Cristea, V.: Social aspects to support opportunistic networks in an academic environment. In: Proceedings of the 11th International Conference on Ad-hoc, Mobile, and Wireless Networks, ADHOC-NOW’12, pp. 69–82. Springer, Berlin (2012). doi:10.1007/978-3-642-31638-8_6

    Google Scholar 

  4. Ciobanu, R.I., Dobre, C., Dascalu, M., Trausan-Matu, S., Cristea, V.: SENSE: A collaborative selfish node detection and incentive mechanism for opportunistic networks. J. Netw. Comput. Appl. 41(0), 240–249 (2014). doi:10.1016/j.jnca.2014.01.009

    Google Scholar 

  5. Ciobanu, R.I., Marin, R.C., Dobre, C., Cristea, V.: Interest-awareness in data dissemination for opportunistic networks. Ad Hoc Netw. (2014). doi:10.1016/j.adhoc.2014.07.004

    Google Scholar 

  6. Costa, P., Mascolo, C., Musolesi, M., Picco, G.P.: Socially-aware routing for publish-subscribe in delay-tolerant mobile ad hoc networks. IEEE J. Sel. Areas Commun. 26(5), 748–760 (2008). doi:10.1109/JSAC.2008.080602

    Google Scholar 

  7. Goncalves, M.R.P., dos Santos Moreira, E., Martimiano, L.A.F.: Trust management in opportunistic networks. In: 2010 Ninth International Conference on Networks (ICN), pp. 209–214 (2010). doi:10.1109/ICN.2010.41

  8. Hernández-Orallo, E., Serrat Olmos, M.D., Cano, J.C., Calafate, C.T., Manzoni, P.: Evaluation of collaborative selfish node detection in MANETs and DTNs. In: Proceedings of the 15th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, MSWiM’12, pp. 159–166. ACM, New York, NY, USA (2012). doi:10.1145/2387238.2387266

  9. Hui, P., Crowcroft, J.: Bubble Rap: forwarding in small world DTNs in ever decreasing circles. Technical Report UCAM-CL-TR-684, University of Cambridge Computer Laboratory (2007)

    Google Scholar 

  10. Lavinia, A., Dobre, C., Pop, F., Cristea, V.: A failure detection system for large scale distributed systems. In: 2010 International Conference on Complex, Intelligent and Software Intensive Systems (CISIS), pp. 482–489 (2010). doi:10.1109/CISIS.2010.29

  11. Li, N., Das, S.K.: RADON: Reputation-assisted data forwarding in opportunistic networks. In: Proceedings of the Second International Workshop on Mobile Opportunistic Networking, MobiOpp’10, pp. 8–14. ACM, New York, NY, USA (2010). doi:10.1145/1755743.1755746, http://doi.acm.org/10.1145/1755743.1755746

  12. Li, N., Das, S.K.: A trust-based framework for data forwarding in opportunistic networks. Ad Hoc Netw. 11(4), 1497–1509 (2013). doi:10.1016/j.adhoc.2011.01.018, http://dx.doi.org/10.1016/j.adhoc.2011.01.018

    Google Scholar 

  13. Marin, R.C., Dobre, C., Xhafa, F.: Exploring predictability in mobile interaction. In: 2012 Third International Conference on Emerging Intelligent Data and Web Technologies (EIDWT), pp. 133–139. IEEE (2012). doi:10.1109/EIDWT.2012.29

  14. Mei, A., Morabito, G., Santi, P., Stefa, J.: Social-aware stateless forwarding in pocket switched networks. In: 2011 Proceedings IEEE INFOCOM, pp. 251–255 (2011). doi:10.1109/INFCOM.2011.5935076

  15. Moghadam, A., Schulzrinne, H.: Interest-aware content distribution protocol for mobile disruption-tolerant networks. In: 2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks Workshops, WoWMoM 2009, pp. 1–7 (2009). doi:10.1109/WOWMOM.2009.5282479

  16. Mtibaa, A., Harras, K.A.: Social-based trust in mobile opportunistic networks. In: 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN), pp. 1–6 (2011). doi:10.1109/ICCCN.2011.6006047

  17. Pietiläinen, A.K., Oliver, E., LeBrun, J., Varghese, G., Diot, C.: MobiClique: middleware for mobile social networking. In: Proceedings of the 2nd ACM Workshop on Online Social Networks, WOSN’09, pp. 49–54. ACM, New York, NY, USA (2009). doi:10.1145/1592665.1592678

  18. Socievole, A., Yoneki, E., De Rango, F., Crowcroft, J.: Opportunistic message routing using multi-layer social networks. In: Proceedings of the 2nd ACM Workshop on High Performance Mobile Opportunistic Systems, HP-MOSys’13, pp. 39–46. ACM, New York, NY, USA (2013). doi:10.1145/2507908.2507923

  19. Trifunovic, S., Legendre, F.: Trust in opportunistic networks (2009)

    Google Scholar 

  20. Trifunovic, S., Legendre, F., Anastasiades, C.: Social trust in opportunistic networks. In: 2010 INFOCOM IEEE Conference on Computer Communications Workshops, pp. 1–6 (2010). doi:10.1109/INFCOMW.2010.5466696

  21. Vahdat, A., Becker, D.: Epidemic routing for partially connected ad hoc networks (2000)

    Google Scholar 

  22. Wu, Y., Zhao, Y., Riguidel, M., Wang, G., Yi, P.: Security and trust management in opportunistic networks: a survey. Secur. Commun. Netw. 8(9), 1812–1827 (2015). doi:10.1002/sec.1116, http://dx.doi.org/10.1002/sec.1116

    Google Scholar 

  23. Xu, K., Hui, P., Li, V.O., Crowcroft, J., Latora, V., Lio, P.: Impact of altruism on opportunistic communications. In: Proceedings of the First International Conference on Ubiquitous and Future Networks, ICUFN’09, pp. 153–158. IEEE Press, Piscataway, NJ, USA (2009)

    Google Scholar 

  24. Zhou, H., Wu, J., Zhao, H., Tang, S., Chen, C., Chen, J.: Incentive-driven and freshness-aware content dissemination in selfish opportunistic mobile networks. In: 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS), pp. 333–341 (2013). doi:10.1109/MASS.2013.54

Download references

Acknowledgments

The presented work is co-funded by project MobiWay, PN-II-PT-PCCA-2013-4-0321.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ciprian Dobre .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Ciobanu, RI., Marin, RC., Dobre, C., Cristea, V. (2016). ONSIDE-SELF: A Selfish Node Detection and Incentive Mechanism for Opportunistic Dissemination. In: Mavromoustakis, C., Mastorakis, G., Batalla, J. (eds) Internet of Things (IoT) in 5G Mobile Technologies. Modeling and Optimization in Science and Technologies, vol 8. Springer, Cham. https://doi.org/10.1007/978-3-319-30913-2_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-30913-2_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-30911-8

  • Online ISBN: 978-3-319-30913-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics