Give2Get: Forwarding in Social Mobile Wireless Networks of Selfish Individuals
- 3 April 2012
- journal article
- research article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Dependable and Secure Computing
- Vol. 9 (4), 569-582
- https://doi.org/10.1109/tdsc.2012.37
Abstract
In this paper, we present two forwarding protocols for mobile wireless networks of selfish individuals. We assume that all the nodes are selfish and show formally that both protocols are strategy proof, that is, no individual has an interest to deviate. Extensive simulations with real traces show that our protocols introduce an extremely small overhead in terms of delay, while the techniques we introduce to force faithful behavior have the positive and quite surprising side effect to improve performance by reducing the number of replicas and the storage requirements. We test our protocols also in the presence of a natural variation of the notion of selfishness-nodes that are selfish with outsiders and faithful with people from the same community. Even in this case, our protocols are shown to be very efficient in detecting possible misbehavior.Keywords
This publication has 29 references indexed in Scilit:
- TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor NetworksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Opportunistic content distribution in an urban settingPublished by Association for Computing Machinery (ACM) ,2006
- BAR fault tolerance for cooperative servicesPublished by Association for Computing Machinery (ACM) ,2005
- Uncovering the overlapping community structure of complex networks in nature and societyNature, 2005
- Enforcing service availability in mobile ad-hoc WANsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Performance analysis of the CONFIDANT protocolPublished by Association for Computing Machinery (ACM) ,2002
- Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc NetworksPublished by Springer Science and Business Media LLC ,2002
- Mitigating routing misbehavior in mobile ad hoc networksPublished by Association for Computing Machinery (ACM) ,2000
- Authentication in distributed systemsACM Transactions on Computer Systems, 1992
- Internet time synchronization: the network time protocolIEEE Transactions on Communications, 1991