메뉴 건너뛰기




Volumn 33, Issue 2, 2013, Pages 252-262

An investigation on the unwillingness of nodes to participate in mobile delay tolerant network routing

Author keywords

Delay tolerant; Ecash; Game theory; Mobile; Privacy; Reputation; Selfish

Indexed keywords

DATA PRIVACY; GAME THEORY; NETWORK ROUTING; ROUTING PROTOCOLS; WIRELESS NETWORKS;

EID: 84871434084     PISSN: 02684012     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ijinfomgt.2012.11.001     Document Type: Article
Times cited : (33)

References (64)
  • 1
    • 84993201983 scopus 로고    scopus 로고
    • Ironman: Using social networks to add incentives and reputation to opportunistic networks.
    • Bigwood, G., & Henderson, T. (2011). Ironman: Using social networks to add incentives and reputation to opportunistic networks.
    • (2011)
    • Bigwood, G.1    Henderson, T.2
  • 2
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • Bloom, B.H., Space/time trade-offs in hash coding with allowable errors. Communications of the ACM 13:July (7) (1970), 422–426.
    • (1970) Communications of the ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.H.1
  • 5
    • 69249223002 scopus 로고    scopus 로고
    • Barter trade improves message delivery in opportunistic networks
    • Buttyan, L., Dora, L., Felegyhazi, M., Vajda, I., Barter trade improves message delivery in opportunistic networks. Ad Hoc Networks 8:1 (2010), 1–14.
    • (2010) Ad Hoc Networks , vol.8 , Issue.1 , pp. 1-14
    • Buttyan, L.1    Dora, L.2    Felegyhazi, M.3    Vajda, I.4
  • 8
    • 77953298005 scopus 로고    scopus 로고
    • Mobicent: A credit-based incentive system for disruption tolerant network
    • Chen, B.B., Chan, M.C., Mobicent: A credit-based incentive system for disruption tolerant network. Proceedings IEEE INFOCOM, 2010, 2010, 1–9.
    • (2010) Proceedings IEEE INFOCOM, 2010 , pp. 1-9
    • Chen, B.B.1    Chan, M.C.2
  • 10
    • 77953278111 scopus 로고    scopus 로고
    • Clustering and cluster-based routing protocol for delay-tolerant mobile networks
    • Dang, H., Wu, H., Clustering and cluster-based routing protocol for delay-tolerant mobile networks. IEEE Transactions on Wireless Communications 9:6 (2010), 1874–1881.
    • (2010) IEEE Transactions on Wireless Communications , vol.9 , Issue.6 , pp. 1874-1881
    • Dang, H.1    Wu, H.2
  • 14
    • 84993236638 scopus 로고    scopus 로고
    • Ben Mokhtar, S., & Brunie, L., (2012). A privacy preserving prediction-based routing protocol for mobile delay tolerant networks. Tech. Rep. RR-LIRIS-2012-011, LIRIS UMR 5205 CNRS/INSA de Lyon/Universit Claude Bernard Lyon 1/Universit Lumire Lyon 2/cole Centrale de Lyon.
    • Hasan, O., Miao, J., Ben Mokhtar, S., & Brunie, L., (2012). A privacy preserving prediction-based routing protocol for mobile delay tolerant networks. Tech. Rep. RR-LIRIS-2012-011, LIRIS UMR 5205 CNRS/INSA de Lyon/Universit Claude Bernard Lyon 1/Universit Lumire Lyon 2/cole Centrale de Lyon.
    • Hasan, O.1    Miao, J.2
  • 17
    • 80052124479 scopus 로고    scopus 로고
    • Bubble rap: Social-based forwarding in delay-tolerant networks
    • Hui, P., Crowcroft, J., Yoneki, E., Bubble rap: Social-based forwarding in delay-tolerant networks. IEEE Transactions on Mobile Computing 10:11 (2011), 1576–1589.
    • (2011) IEEE Transactions on Mobile Computing , vol.10 , Issue.11 , pp. 1576-1589
    • Hui, P.1    Crowcroft, J.2    Yoneki, E.3
  • 19
    • 79951660476 scopus 로고    scopus 로고
    • Toward anonymity in DTNS: Threshold pivot scheme.
    • Jansen, R., Beverly, R., Toward anonymity in DTNS: Threshold pivot scheme. Proceedings of MILCOM, 2010, 587–592.
    • (2010) Proceedings of MILCOM , pp. 587-592
    • Jansen, R.1    Beverly, R.2
  • 21
    • 73449145700 scopus 로고    scopus 로고
    • Assessing the vulnerability of DTN data relaying schemes to node selfishness
    • Karaliopoulos, M., Assessing the vulnerability of DTN data relaying schemes to node selfishness. IEEE Communications Letters 13:12 (2009), 923–925.
    • (2009) IEEE Communications Letters , vol.13 , Issue.12 , pp. 923-925
    • Karaliopoulos, M.1
  • 25
    • 0034266911 scopus 로고    scopus 로고
    • Location-aided routing (LAR) in mobile ad hoc networks
    • Jul
    • Ko, Y.-B., Vaidya, N.H., Location-aided routing (LAR) in mobile ad hoc networks. Wireless Networks 6:4 (2000 Jul), 307–321.
    • (2000) Wireless Networks , vol.6 , Issue.4 , pp. 307-321
    • Ko, Y.-B.1    Vaidya, N.H.2
  • 29
    • 78449306437 scopus 로고    scopus 로고
    • Evaluating the impact of social selfishness on the epidemic routing in delay tolerant networks.
    • Li, Y., Hui, P., Jin, D., Su, L., Zeng, L., Evaluating the impact of social selfishness on the epidemic routing in delay tolerant networks. IEEE Communications Letters 14:11 (2010), 1026–1028.
    • (2010) IEEE Communications Letters , vol.14 , Issue.11 , pp. 1026-1028
    • Li, Y.1    Hui, P.2    Jin, D.3    Su, L.4    Zeng, L.5
  • 31
    • 79959276613 scopus 로고    scopus 로고
    • The impact of node selfishness on multicasting in delay tolerant networks
    • Li, Y., Su, G., Wu, D., Jin, D., Su, L., Zeng, L., The impact of node selfishness on multicasting in delay tolerant networks. IEEE Transactions on Vehicular Technology 60:5 (2011), 2224–2238.
    • (2011) IEEE Transactions on Vehicular Technology , vol.60 , Issue.5 , pp. 2224-2238
    • Li, Y.1    Su, G.2    Wu, D.3    Jin, D.4    Su, L.5    Zeng, L.6
  • 32
    • 84863369462 scopus 로고    scopus 로고
    • A routing protocol for socially selfish delay tolerant networks
    • Li, Q., Gao, W., Zhu, S., Cao, G., A routing protocol for socially selfish delay tolerant networks. Ad Hoc Networks 10:8 (2012), 1619–1632.
    • (2012) Ad Hoc Networks , vol.10 , Issue.8 , pp. 1619-1632
    • Li, Q.1    Gao, W.2    Zhu, S.3    Cao, G.4
  • 34
    • 20344383943 scopus 로고    scopus 로고
    • Probabilistic routing in intermittently connected networks. SIGMOBILE Mob
    • Lindgren, A., Doria, A., Schelén, O., Probabilistic routing in intermittently connected networks. SIGMOBILE Mob. Computer Communication Review 7 (2003), 19–20.
    • (2003) Computer Communication Review , vol.7 , pp. 19-20
    • Lindgren, A.1    Doria, A.2    Schelén, O.3
  • 35
    • 33847008265 scopus 로고    scopus 로고
    • Enhanced reputation mechanism for mobile ad hoc networks
    • C. Jensen S. Poslad T. Dimitrakos Springer Berlin/Heidelberg
    • Liu, J., Issarny, V., Enhanced reputation mechanism for mobile ad hoc networks. Jensen, C., Poslad, S., Dimitrakos, T., (eds.) Trust management. Vol. 2995 of lecture notes in computer science, 2004, Springer, Berlin/Heidelberg, 48–62.
    • (2004) Trust management. Vol. 2995 of lecture notes in computer science , pp. 48-62
    • Liu, J.1    Issarny, V.2
  • 36
    • 77953313061 scopus 로고    scopus 로고
    • Spring: A social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks
    • Lu, R., Lin, X., Shen, X., Spring: A social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks. Proceedings IEEE INFOCOM, 2010, 2010, 1–9.
    • (2010) Proceedings IEEE INFOCOM, 2010 , pp. 1-9
    • Lu, R.1    Lin, X.2    Shen, X.3
  • 38
    • 77955422013 scopus 로고    scopus 로고
    • Anti-localization anonymous routing for delay tolerant network
    • Lu, X., Hui, P., Towsley, D., Pu, J., Xiong, Z., Anti-localization anonymous routing for delay tolerant network. Computer Networks 54:11 (2010), 1899–1910.
    • (2010) Computer Networks , vol.54 , Issue.11 , pp. 1899-1910
    • Lu, X.1    Hui, P.2    Towsley, D.3    Pu, J.4    Xiong, Z.5
  • 40
    • 84993203074 scopus 로고    scopus 로고
    • Reputation-based enforcement schemes tailored to opportunistic networks design.
    • Modarresi, A., Woungang, I., Reyhani, L., & Razavi, H., (2011). Reputation-based enforcement schemes tailored to opportunistic networks design.
    • (2011)
    • Modarresi, A.1    Woungang, I.2    Reyhani, L.3    Razavi, H.4
  • 41
    • 0001058478 scopus 로고
    • Two-person cooperative games
    • Nash, J., Two-person cooperative games. Econometrica 21:1 (1953), 128–140.
    • (1953) Econometrica , vol.21 , Issue.1 , pp. 128-140
    • Nash, J.1
  • 42
    • 84857781918 scopus 로고    scopus 로고
    • DNA-like linguistic secret sharing for strategic information systems
    • Ogiela, M.R., Ogiela, U., DNA-like linguistic secret sharing for strategic information systems. International Journal of Information Management 32:2 (2012), 175–181.
    • (2012) International Journal of Information Management , vol.32 , Issue.2 , pp. 175-181
    • Ogiela, M.R.1    Ogiela, U.2
  • 45
    • 81255142215 scopus 로고    scopus 로고
    • Privacy-enhanced social-network routing
    • Parris, I., Henderson, T., Privacy-enhanced social-network routing. Computer Communications 35:1 (2012), 62–74.
    • (2012) Computer Communications , vol.35 , Issue.1 , pp. 62-74
    • Parris, I.1    Henderson, T.2
  • 48
    • 0032621035 scopus 로고    scopus 로고
    • A review of current routing protocols for ad hoc mobile wireless networks
    • Royer, E., Toh, C., A review of current routing protocols for ad hoc mobile wireless networks. IEEE Personal Communications 6:2 (1999), 46–55.
    • (1999) IEEE Personal Communications , vol.6 , Issue.2 , pp. 46-55
    • Royer, E.1    Toh, C.2
  • 49
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • G. Blakley D. Chaum Springer Berlin/Heidelberg
    • Shamir, A., Identity-based cryptosystems and signature schemes. Blakley, G., Chaum, D., (eds.) Advances in cryptology. Vol. 196 of lecture notes in computer science, 1985, Springer, Berlin/Heidelberg, 47–53.
    • (1985) Advances in cryptology. Vol. 196 of lecture notes in computer science , pp. 47-53
    • Shamir, A.1
  • 51
    • 84859744344 scopus 로고    scopus 로고
    • Arden: Anonymous networking in delay tolerant networks
    • Shi, C., Luo, X., Traynor, P., Ammar, M.H., Zegura, E.W., Arden: Anonymous networking in delay tolerant networks. Ad Hoc Networks 10:6 (2012), 918–930.
    • (2012) Ad Hoc Networks , vol.10 , Issue.6 , pp. 918-930
    • Shi, C.1    Luo, X.2    Traynor, P.3    Ammar, M.H.4    Zegura, E.W.5
  • 53
    • 40749113163 scopus 로고    scopus 로고
    • Efficient routing in intermittently connected mobile networks: The multiple-copy case
    • Spyropoulos, T., Psounis, K., Raghavendra, C.S., Efficient routing in intermittently connected mobile networks: The multiple-copy case. IEEE/ACM Transactions on Networking 16 (2008), 77–90.
    • (2008) IEEE/ACM Transactions on Networking , vol.16 , pp. 77-90
    • Spyropoulos, T.1    Psounis, K.2    Raghavendra, C.S.3
  • 54
    • 40749157530 scopus 로고    scopus 로고
    • Efficient routing in intermittently connected mobile networks: The single-copy case
    • Spyropoulos, T., Psounis, K., Raghavendra, C.S., Efficient routing in intermittently connected mobile networks: The single-copy case. IEEE/ACM Transactions on Networking 16:1 (2008), 63–76.
    • (2008) IEEE/ACM Transactions on Networking , vol.16 , Issue.1 , pp. 63-76
    • Spyropoulos, T.1    Psounis, K.2    Raghavendra, C.S.3
  • 55
    • 84993203027 scopus 로고    scopus 로고
    • Epidemic routing for partially connected ad hoc networks. Tech. rep., Citeseer.
    • Vahdat, A., & Becker, D. (2000). Epidemic routing for partially connected ad hoc networks. Tech. rep., Citeseer.
    • (2000)
    • Vahdat, A.1    Becker, D.2
  • 57
    • 79960370629 scopus 로고    scopus 로고
    • Mobiid: A user-centric and social-aware reputation based incentive scheme for delay/disruption tolerant networks
    • H. Frey X. Li S. Ruehrup Springer Berlin/Heidelberg
    • Wei, L., Zhu, H., Cao, Z., Shen, X., Mobiid: A user-centric and social-aware reputation based incentive scheme for delay/disruption tolerant networks. Frey, H., Li, X., Ruehrup, S., (eds.) Ad-hoc, mobile, and wireless networks. Vol. 6811 of lecture notes in computer science, 2011, Springer, Berlin/Heidelberg, 177–190.
    • (2011) Ad-hoc, mobile, and wireless networks. Vol. 6811 of lecture notes in computer science , pp. 177-190
    • Wei, L.1    Zhu, H.2    Cao, Z.3    Shen, X.4
  • 58
    • 84863149546 scopus 로고    scopus 로고
    • Credit-based cooperation enforcement schemes tailored to opportunistic networks
    • Woungang, I., Denko, M., Credit-based cooperation enforcement schemes tailored to opportunistic networks. Mobile Opportunistic Networks, 2011, 51.
    • (2011) Mobile Opportunistic Networks , pp. 51
    • Woungang, I.1    Denko, M.2
  • 60
    • 84872001538 scopus 로고    scopus 로고
    • Utilizing social links for location privacy in opportunistic delay-tolerant networks.
    • Zakhary, S., Radenkovic, M., Utilizing social links for location privacy in opportunistic delay-tolerant networks. the Proc IEEE ICC, 2012.
    • (2012) the Proc IEEE ICC
    • Zakhary, S.1    Radenkovic, M.2
  • 63
    • 70350238158 scopus 로고    scopus 로고
    • Smart: A secure multilayer credit-based incentive scheme for delay-tolerant networks.
    • Zhu, H., Lin, X., Lu, R., Fan, Y., Shen, X., Smart: A secure multilayer credit-based incentive scheme for delay-tolerant networks. IEEE Transactions on Vehicular Technology 58:8 (2009), 4628–4639.
    • (2009) IEEE Transactions on Vehicular Technology , vol.58 , Issue.8 , pp. 4628-4639
    • Zhu, H.1    Lin, X.2    Lu, R.3    Fan, Y.4    Shen, X.5
  • 64
    • 84866527311 scopus 로고    scopus 로고
    • A survey of social-based routing in delay tolerant networks: Positive and negative social effects
    • Zhu, Y., Xu, B., Shi, X., Wang, Y., A survey of social-based routing in delay tolerant networks: Positive and negative social effects. IEEE Communications Surveys & Tutorials PP:99 (2012), 1–15.
    • (2012) IEEE Communications Surveys & Tutorials , vol.PP , Issue.99 , pp. 1-15
    • Zhu, Y.1    Xu, B.2    Shi, X.3    Wang, Y.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.