Abstract
The advent of IoT (the Internet of Things) has led to the necessity of fast and secure communication between devices, ranging from small sensors to top-of-the-line smartphones or laptops. One proposal for IoT communication is through 5G, which is estimated to be rolled out by 2020. However, the infrastructure for 5G communication might not always be present, or it should be avoided because of congestion. Moreover, employing it in smaller IoT networks can prove too expensive in some cases, while some small devices such as sensors might not even have 5G capabilities (or having them would greatly increase their price). For these reasons, opportunistic communication is an alternative for IoTs where mobile broadband connections cannot be used. Opportunistic networks are formed of mobile devices (such as smartphones and tablets belonging to social users) that communicate using close-range protocols such as Bluetooth or WiFi Direct. These networks are based on the store-carry-and-forward paradigm, where contacts between nodes are used opportunistically to transport data from a source to a destination, even though the two nodes might never be in direct communication range. Data dissemination assumes that nodes do not send directed messages (i.e., from a source to a pre-set destination), instead using channels to perform communication. Nodes are able to subscribe to channels, which are represented by interests (e.g., a node interested in “IT” will need to receive all messages marked with that tag). The main requirement of opportunistic networks is that the participating nodes should be altruistic, since communication is performed with the help of other nodes. However, this might not always be the case, since selfish nodes might decide that they do not want to help others. Such nodes should be detected and not allowed to participate in the dissemination process. This way, their messages will not be delivered, so they will be forced to become altruistic if they want a good networking experience. In this chapter, we propose a method for detecting and punishing selfish nodes in opportunistic networks dissemination, using gossiping mechanisms over the dynamic social network. Nodes learn about the behavior of other nodes and, when a contact occurs, share this information with an encountered device. We apply this method to an existing social and interest-based dissemination algorithm (ONSIDE) and show that it correctly detects and punishes selfish nodes, thus increasing the network’s behavior in terms of message delivery and congestion.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bigwood, G., Henderson, T.: IRONMAN: using social networks to add incentives and reputation to opportunistic networks. In: SocialCom/PASSAT, pp. 65–72. IEEE (2011)
Ciobanu, R.I., Dobre, C.: Predicting encounters in opportunistic networks. In: Proceedings of the 1st ACM Workshop on High Performance Mobile Opportunistic Systems, HP-MOSys’12, pp. 9–14. ACM, New York, NY, USA (2012). doi:10.1145/2386980.2386983, http://doi.acm.org/10.1145/2386980.2386983
Ciobanu, R.I., Dobre, C., Cristea, V.: Social aspects to support opportunistic networks in an academic environment. In: Proceedings of the 11th International Conference on Ad-hoc, Mobile, and Wireless Networks, ADHOC-NOW’12, pp. 69–82. Springer, Berlin (2012). doi:10.1007/978-3-642-31638-8_6
Ciobanu, R.I., Dobre, C., Dascalu, M., Trausan-Matu, S., Cristea, V.: SENSE: A collaborative selfish node detection and incentive mechanism for opportunistic networks. J. Netw. Comput. Appl. 41(0), 240–249 (2014). doi:10.1016/j.jnca.2014.01.009
Ciobanu, R.I., Marin, R.C., Dobre, C., Cristea, V.: Interest-awareness in data dissemination for opportunistic networks. Ad Hoc Netw. (2014). doi:10.1016/j.adhoc.2014.07.004
Costa, P., Mascolo, C., Musolesi, M., Picco, G.P.: Socially-aware routing for publish-subscribe in delay-tolerant mobile ad hoc networks. IEEE J. Sel. Areas Commun. 26(5), 748–760 (2008). doi:10.1109/JSAC.2008.080602
Goncalves, M.R.P., dos Santos Moreira, E., Martimiano, L.A.F.: Trust management in opportunistic networks. In: 2010 Ninth International Conference on Networks (ICN), pp. 209–214 (2010). doi:10.1109/ICN.2010.41
Hernández-Orallo, E., Serrat Olmos, M.D., Cano, J.C., Calafate, C.T., Manzoni, P.: Evaluation of collaborative selfish node detection in MANETs and DTNs. In: Proceedings of the 15th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, MSWiM’12, pp. 159–166. ACM, New York, NY, USA (2012). doi:10.1145/2387238.2387266
Hui, P., Crowcroft, J.: Bubble Rap: forwarding in small world DTNs in ever decreasing circles. Technical Report UCAM-CL-TR-684, University of Cambridge Computer Laboratory (2007)
Lavinia, A., Dobre, C., Pop, F., Cristea, V.: A failure detection system for large scale distributed systems. In: 2010 International Conference on Complex, Intelligent and Software Intensive Systems (CISIS), pp. 482–489 (2010). doi:10.1109/CISIS.2010.29
Li, N., Das, S.K.: RADON: Reputation-assisted data forwarding in opportunistic networks. In: Proceedings of the Second International Workshop on Mobile Opportunistic Networking, MobiOpp’10, pp. 8–14. ACM, New York, NY, USA (2010). doi:10.1145/1755743.1755746, http://doi.acm.org/10.1145/1755743.1755746
Li, N., Das, S.K.: A trust-based framework for data forwarding in opportunistic networks. Ad Hoc Netw. 11(4), 1497–1509 (2013). doi:10.1016/j.adhoc.2011.01.018, http://dx.doi.org/10.1016/j.adhoc.2011.01.018
Marin, R.C., Dobre, C., Xhafa, F.: Exploring predictability in mobile interaction. In: 2012 Third International Conference on Emerging Intelligent Data and Web Technologies (EIDWT), pp. 133–139. IEEE (2012). doi:10.1109/EIDWT.2012.29
Mei, A., Morabito, G., Santi, P., Stefa, J.: Social-aware stateless forwarding in pocket switched networks. In: 2011 Proceedings IEEE INFOCOM, pp. 251–255 (2011). doi:10.1109/INFCOM.2011.5935076
Moghadam, A., Schulzrinne, H.: Interest-aware content distribution protocol for mobile disruption-tolerant networks. In: 2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks Workshops, WoWMoM 2009, pp. 1–7 (2009). doi:10.1109/WOWMOM.2009.5282479
Mtibaa, A., Harras, K.A.: Social-based trust in mobile opportunistic networks. In: 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN), pp. 1–6 (2011). doi:10.1109/ICCCN.2011.6006047
Pietiläinen, A.K., Oliver, E., LeBrun, J., Varghese, G., Diot, C.: MobiClique: middleware for mobile social networking. In: Proceedings of the 2nd ACM Workshop on Online Social Networks, WOSN’09, pp. 49–54. ACM, New York, NY, USA (2009). doi:10.1145/1592665.1592678
Socievole, A., Yoneki, E., De Rango, F., Crowcroft, J.: Opportunistic message routing using multi-layer social networks. In: Proceedings of the 2nd ACM Workshop on High Performance Mobile Opportunistic Systems, HP-MOSys’13, pp. 39–46. ACM, New York, NY, USA (2013). doi:10.1145/2507908.2507923
Trifunovic, S., Legendre, F.: Trust in opportunistic networks (2009)
Trifunovic, S., Legendre, F., Anastasiades, C.: Social trust in opportunistic networks. In: 2010 INFOCOM IEEE Conference on Computer Communications Workshops, pp. 1–6 (2010). doi:10.1109/INFCOMW.2010.5466696
Vahdat, A., Becker, D.: Epidemic routing for partially connected ad hoc networks (2000)
Wu, Y., Zhao, Y., Riguidel, M., Wang, G., Yi, P.: Security and trust management in opportunistic networks: a survey. Secur. Commun. Netw. 8(9), 1812–1827 (2015). doi:10.1002/sec.1116, http://dx.doi.org/10.1002/sec.1116
Xu, K., Hui, P., Li, V.O., Crowcroft, J., Latora, V., Lio, P.: Impact of altruism on opportunistic communications. In: Proceedings of the First International Conference on Ubiquitous and Future Networks, ICUFN’09, pp. 153–158. IEEE Press, Piscataway, NJ, USA (2009)
Zhou, H., Wu, J., Zhao, H., Tang, S., Chen, C., Chen, J.: Incentive-driven and freshness-aware content dissemination in selfish opportunistic mobile networks. In: 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS), pp. 333–341 (2013). doi:10.1109/MASS.2013.54
Acknowledgments
The presented work is co-funded by project MobiWay, PN-II-PT-PCCA-2013-4-0321.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Ciobanu, RI., Marin, RC., Dobre, C., Cristea, V. (2016). ONSIDE-SELF: A Selfish Node Detection and Incentive Mechanism for Opportunistic Dissemination. In: Mavromoustakis, C., Mastorakis, G., Batalla, J. (eds) Internet of Things (IoT) in 5G Mobile Technologies. Modeling and Optimization in Science and Technologies, vol 8. Springer, Cham. https://doi.org/10.1007/978-3-319-30913-2_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-30913-2_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-30911-8
Online ISBN: 978-3-319-30913-2
eBook Packages: EngineeringEngineering (R0)