Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon free Towards an incentive-compatible, reputation-based framework for stimulating cooperation in opportunistic networks: a survey

In opportunistic networks (OppNets), routing and data forwarding among mobile devices are facilitated by relays or next-hop forwarders. To guarantee end-to-end data delivery it is important to provide participation. However, in sparsely connected OppNets, it is extremely challenging to monitor the behaviour of the relays and identify selfish/malicious relays cooperating with each other in order to forge routing information or drop useful data. Cooperation enforcement schemes are seen as a lightweight alternative to conventional secure forwarding techniques that involve cryptographically signed certificate exchanges, providing a ‘softer’ security layer to protect basic networking operations. In general, cooperation enforcement schemes fall into two broad categories: trust establishment via a reputation system and pricing or credit-based schemes. This study offers a comprehensive survey of representative cooperation enforcement schemes that exploit a reputation system. The authors analyse their distinct features, identify and discuss critical challenges that should be efficiently addressed when designing such mechanisms, indicating at the same time potential solutions and provide an informative table to display the authors’ findings. From this analysis, they examine issues and concerns surrounding the field of cooperation enforcement in OppNets, and provide guidelines and directions for future researchers.

References

    1. 1)
      • 42. Zhou, H., Chen, J., Fan, J., et al: ‘Consub: incentive-based content subscribing in selfish opportunistic mobile networks’, IEEE J. Sel. Areas Commun., 2013, 31, (9), pp. 669679.
    2. 2)
      • 45. Li, N., Das, S.K.: ‘Radon: reputation-assisted data forwarding in opportunistic networks’. Proc. of the Second Int. Workshop on Mobile Opportunistic Networking, 2010, pp. 814.
    3. 3)
      • 12. Kraounakis, S., Demetropoulos, I.N., Michalas, A., et al: ‘A robust reputation-based computational model for trust establishment in pervasive systems’, IEEE Syst. J., 2015, 9, (3), pp. 878891.
    4. 4)
      • 56. Ciobanu, R.-I., Marin, R.-C., Dobre, C., et al: ‘Trust and reputation management for opportunistic dissemination’, Pervasive Mob. Comput., 2016, 36, pp. 4456.
    5. 5)
      • 11. Alajeely, M., Doss, R., Ahmad, A.: ‘Security and trust in opportunistic networks – a survey’, IETE Tech. Rev., 2016, 33, (3), pp. 256268.
    6. 6)
      • 26. Moreira, W., Mendes, P.: ‘Social-aware opportunistic routing: the new trend’, in Woungang, I., Dhurandher, S.K., Anpalagan, A., Vasilakos, A.V. (Eds): ‘Routing in Opportunistic Networks’ (Springer, 2013), pp. 2768.
    7. 7)
      • 2. Conti, M., Giordano, S.: ‘Mobile ad hoc networking: milestones, challenges, and new research directions’, IEEE Commun. Mag., 2014, 52, (1), pp. 8596.
    8. 8)
      • 10. Wu, Y., Zhao, Y., Riguidel, M., et al: ‘Security and trust management in opportunistic networks: a survey’, Secur. Commun. Netw., 2015, 8, (9), pp. 18121827.
    9. 9)
      • 48. Shikfa, A., Önen, M., Molva, R.: ‘Privacy and confidentiality in context-based and epidemic forwarding’, Comput. Commun., 2010, 33, (13), pp. 14931504.
    10. 10)
      • 17. Bera, S., Misra, S., Roy, S.K., et al: ‘Softwsn: software-defined wsn management system for iot applications’, IEEE Syst. J., 2016, PP, (99), pp. 18.
    11. 11)
      • 33. Chen, R., Bao, F., Chang, M., et al: ‘Dynamic trust management for delay tolerant networks and its application to secure routing’, IEEE Trans. Parallel Distrib. Syst., 2014, 25, (5), pp. 12001210.
    12. 12)
      • 23. Marias, G.F., Georgiadis, P., Flitzanis, D., et al: ‘Cooperation enforcement schemes for manets: a survey’, Wirel. Commun. Mob. Comput., 2006, 6, (3), pp. 319332.
    13. 13)
      • 32. Dini, G., Duca, A.L.: ‘Towards a reputation-based routing protocol to contrast blackholes in a delay tolerant network’, Ad Hoc Netw., 2012, 10, (7), pp. 11671178.
    14. 14)
      • 3. Liu, T., Sadler, C.M., Zhang, P., et al: ‘Implementing software on resource-constrained mobile sensors: experiences with impala and zebranet’. Proc. of the 2nd Int. Conf. Mobile Systems, Applications, and Services, 2004, pp. 256269.
    15. 15)
      • 40. Liu, L., Yang, Q., Kong, X., et al: ‘Com-bis: a community-based barter incentive scheme in socially aware networking’, Int. J. Distrib. Sens. Netw., 2015, 11, (8), p. 671012.
    16. 16)
      • 24. Louta, M., Kraounakis, S., Michalas, A.: ‘A survey on reputation-based cooperation enforcement schemes in wireless ad hoc networks’. Proc. of the 2010 Int. Conf. Wireless Information Networks and Systems (WINSYS), 2010, pp. 14.
    17. 17)
      • 58. Zhu, H., Du, S., Gao, Z., et al: ‘A probabilistic misbehavior detection scheme toward efficient trust establishment in delay-tolerant networks’, IEEE Trans. Parallel Distrib. Syst., 2014, 25, (1), pp. 2232.
    18. 18)
      • 44. Yao, L., Man, Y., Huang, Z., et al: ‘Secure routing based on social similarity in opportunistic networks’, IEEE Trans. Wirel. Commun., 2016, 15, (1), pp. 594605.
    19. 19)
      • 31. Gambetta, D., Ed.: ‘Trust: making and breaking cooperative relations’ (Basil Blackwell, New York, NY [UAS], 1988).
    20. 20)
      • 49. Premalatha, S., Rajam, V.M.A.: ‘Reputation management for data forwarding in opportunistic networks’. 2014 Int. Conf. IEEE Computer Communication and Informatics (ICCCI), 2014, pp. 17.
    21. 21)
      • 29. Kerr, R., Cohen, R.: ‘Smart cheaters do prosper: defeating trust and reputation systems’. Proc. of the 8th Int. Conf. Autonomous Agents and Multiagent Systems-Volume 2. Int. Foundation for Autonomous Agents and Multiagent Systems, 2009, pp. 9931000.
    22. 22)
      • 14. Eirinaki, M., Louta, M.D., Varlamis, I.: ‘A trust-aware system for personalized user recommendations in social networks’, IEEE Trans. Syst. Man Cybern., Syst., 2014, 44, (4), pp. 409421.
    23. 23)
      • 41. Gong, H., Yu, L., Zhang, X.: ‘Social contribution-based routing protocol for vehicular network with selfish nodes’, Int. J. Distrib. Sens. Netw., 2014, 10, (4), p. 753024.
    24. 24)
      • 22. Yu, H., Shen, Z., Miao, C., et al: ‘A survey of trust and reputation management systems in wireless communications’, Proc. IEEE, 2010, 98, (10), pp. 17551772.
    25. 25)
      • 21. Azer, M., El-Kassas, S., Hassan, A., et al: ‘A survey on trust and reputation schemes in ad hoc networks’. Third Int. Conf. Availability, Reliability and Security, 2008, ARES 08, March 2008, pp. 881886.
    26. 26)
      • 30. Jøsang, A., Golbeck, J.: ‘Challenges for robust trust and reputation systems’. Proc. of the 5th Int. Workshop on Security and Trust Management (SMT 2009), Saint Malo, France, 2009, p. 52.
    27. 27)
      • 7. Chakchouk, N.: ‘A survey on opportunistic routing in wireless communication networks’, IEEE Commun. Surv. Tutor., 2015, 17, (4), pp. 22142241.
    28. 28)
      • 36. Sharma, A.: ‘A credit based routing mechanism to contrast selfish nodes in delay tolerant networks’. 2014 Int. Conf. Parallel, Distributed and Grid Computing (PDGC), 2014, pp. 295300.
    29. 29)
      • 52. Zhang, Y., Song, L., Jiang, C., et al: ‘A social-aware framework for efficient information dissemination in wireless ad hoc networks’, IEEE Commun. Mag., 2017, 55, (1), pp. 174179.
    30. 30)
      • 55. Wei, L., Zhu, H., Cao, Z., et al: ‘Mobiid: a user-centric and social-aware reputation based incentive scheme for delay/disruption tolerant networks’. Int. Conf. Ad-Hoc Networks and Wireless, 2011, pp. 177190.
    31. 31)
      • 6. Khabbaz, M.J., Assi, C.M., Fawaz, W.F.: ‘Disruption-tolerant networking: a comprehensive survey on recent developments and persisting challenges’, IEEE Commun. Surv. Tutor., 2012, 14, (2), pp. 607640.
    32. 32)
      • 57. Sadiq, U., Kumar, M., Wright, M.: ‘Crisp: collusion-resistant incentive-compatible routing and forwarding in opportunistic networks’. Proc. of the 15th ACM Int. Conf. Modeling, Analysis and Simulation of Wireless and Mobile Systems, 2012, pp. 6978.
    33. 33)
      • 13. Li, X., Zhou, F., Yang, X.: ‘Scalable feedback aggregating (sfa) overlay for large-scale p2p trust management’, IEEE Trans. Parallel Distrib. Syst., 2012, 23, (10), pp. 19441957.
    34. 34)
      • 9. Zhu, Y., Xu, B., Shi, X., et al: ‘A survey of social-based routing in delay tolerant networks: positive and negative social effects’, IEEE Commun. Surv. Tutor., 2013, 15, (1), pp. 387401.
    35. 35)
      • 35. Jiang, Q., Men, C., Yu, H., et al: ‘A secure credit-based incentive scheme for opportunistic networks’. 2015 7th Int. Conf. Intelligent Human-Machine Systems and Cybernetics (IHMSC), 2015, vol. 1, pp. 8791.
    36. 36)
      • 38. Huang, J., Hu, Q., Bi, J., et al: ‘Stackelberg game based incentive mechanism for data transmission in mobile opportunistic networks’. Int. Conf. on Wireless Algorithms, Systems, and Applications, Springer, 2016, pp. 377388.
    37. 37)
      • 20. Mejia, M., Peña, N., Muñoz, J.L., et al: ‘A review of trust modeling in ad hoc networks’, Internet Res., 2009, 19, (01), pp. 88104.
    38. 38)
      • 43. Buchegger, S., Le Boudee, J.-Y.: ‘Self-policing mobile ad hoc networks by reputation systems’, IEEE Commun. Mag., 2005, 43, (7), pp. 101107.
    39. 39)
      • 47. Bigwood, G., Henderson, T.: ‘Ironman: using social networks to add incentives and reputation to opportunistic networks’. 2011 IEEE Third Int. Conf. Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third Int. Conf. Social Computing (SocialCom), 2011, pp. 6572.
    40. 40)
      • 28. Hoffman, K., Zage, D., Nita-Rotaru, C.: ‘A survey of attack and defense techniques for reputation systems’, ACM Comput. Surv. (CSUR), 2009, 42, (1), p. 1.
    41. 41)
      • 8. Wei, K., Liang, X., Xu, K.: ‘A survey of social-aware routing protocols in delay tolerant networks: applications, taxonomy and design-related issues’, IEEE Commun. Surv. Tutor., 2014, 16, (1), pp. 556578.
    42. 42)
      • 54. Wei, L., Zhu, H., Cao, Z., et al: ‘Success: a secure user-centric and social-aware reputation based incentive scheme for dtns’, Ad Hoc Sens. Wirel. Netw., 2013, 19, (1-2), pp. 95118.
    43. 43)
      • 46. Li, N., Das, S.K.: ‘A trust-based framework for data forwarding in opportunistic networks’, Ad Hoc Netw., 2013, 11, (4), pp. 14971509.
    44. 44)
      • 25. Benamar, N., Singh, K.D., Benamar, M., et al: ‘Routing protocols in vehicular delay tolerant networks: a comprehensive survey’, Comput. Commun., 2014, 48, pp. 141158.
    45. 45)
      • 27. Trifunovic, S., Legendre, F.: ‘Trust in opportunistic networks’, Comput. Eng. Netw. Lab., 2009, pp. 112.
    46. 46)
      • 18. Sicari, S., Rizzardi, A., Grieco, L.A., et al: ‘Security, privacy and trust in internet of things: the road ahead’, Comput. Netw., 2015, 76, pp. 146164.
    47. 47)
      • 53. Guo, B., Yu, Z., Zhang, D., et al: ‘Crosscommunity sensing and mining’, IEEE Commun. Mag., 2014, 52, (8), pp. 144152.
    48. 48)
      • 4. Karaliopoulos, M., Telelis, O., Koutsopoulos, I.: ‘User recruitment for mobile crowdsensing over opportunistic networks’. 2015 IEEE Conf. Computer Communications (INFOCOM), 2015, pp. 22542262.
    49. 49)
      • 34. Resnick, P., Kuwabara, K., Zeckhauser, R., et al: ‘Reputation systems’, Commun. ACM, 2000, 43, (12), pp. 4548.
    50. 50)
      • 1. Louta, M., Bellavista, P.: ‘Bringing always best connectivity vision a step closer: challenges and perspectives’, IEEE Commun. Mag., 2013, 51, (2), pp. 158166.
    51. 51)
      • 50. Sabater, J., Sierra, C.: ‘Reputation and social network analysis in multi-agent systems’. Proc. of the First Int. Joint Conf. Autonomous Agents and Multiagent Systems: Part 1, 2002, pp. 475482.
    52. 52)
      • 51. Pujol, J.M., Sangüesa, R., Delgado, J.: ‘Extracting reputation in multi agent systems by means of social network topology’. Proc. of the First Int. Joint Conf. Autonomous Agents and Multiagent Systems: part 1, 2002, pp. 467474.
    53. 53)
      • 39. Liu, Q., Liu, M., Li, Y., et al: ‘A novel game based incentive strategy for opportunistic networks’. 2015 IEEE Global Communications Conf. (GLOBECOM), 2015, pp. 16.
    54. 54)
      • 5. Louta, M., Mpanti, K., Karetsos, G., et al: ‘Mobile crowd sensing architectural frameworks: a comprehensive survey’. 2016 7th Int. Conf. Information, Intelligence, Systems & Applications (IISA), 2016, pp. 17.
    55. 55)
      • 15. Varlamis, I., Eirinaki, M., Louta, M.: ‘Application of social network metrics to a trust-aware collaborative model for generating personalized user recommendations’,  Influence Technol. Social Netw. Anal. Mining, 2013, 6, pp. 4974.
    56. 56)
      • 37. Wei, L., Cao, Z., Zhu, H.: ‘Mobigame: a user-centric reputation based incentive protocol for delay/disruption tolerant networks’. 2011 IEEE Global Telecommunications Conf. (GLOBECOM 2011), 2011, pp. 15.
    57. 57)
      • 19. Ruohomaa, S., Kutvonen, L.: ‘Trust management survey’, in Herrmann, P., Issarny, V., Shiu, S. (Eds): ‘ITrust’ (Springer, 2005), vol. 3477, pp. 7792.
    58. 58)
      • 59. Evans, D.: ‘The internet of things: how the next evolution of the internet is changing everything’, CISCO White Paper, 2011, 1, (2011), pp. 111.
    59. 59)
      • 16. Zhan, G., Shi, W., Deng, J.: ‘Design and implementation of tarf: a trust-aware routing framework for wsns’, IEEE Trans. Dependable Secur. Comput., 2012, 9, (2), pp. 184197.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-net.2017.0079
Loading

Related content

content/journals/10.1049/iet-net.2017.0079
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address