ChinaCom2008-Wireless Communications and Networking Symposium

Research Article

A Secure Incentive Scheme for Delay Tolerant Networks

  • @INPROCEEDINGS{10.1109/CHINACOM.2008.4684961,
        author={Haojin Zhu and Xiaodong Lin and Rongxing Lu and Xuemin Sherman) Shen},
        title={A Secure Incentive Scheme for Delay Tolerant Networks},
        proceedings={ChinaCom2008-Wireless Communications and Networking Symposium},
        publisher={IEEE},
        proceedings_a={CHINACOM2008-WCN},
        year={2008},
        month={11},
        keywords={},
        doi={10.1109/CHINACOM.2008.4684961}
    }
    
  • Haojin Zhu
    Xiaodong Lin
    Rongxing Lu
    Xuemin Sherman) Shen
    Year: 2008
    A Secure Incentive Scheme for Delay Tolerant Networks
    CHINACOM2008-WCN
    IEEE
    DOI: 10.1109/CHINACOM.2008.4684961
Haojin Zhu1,*, Xiaodong Lin1,*, Rongxing Lu1,*, Xuemin Sherman) Shen1,*
  • 1: Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario, Canada
*Contact email: h9zhu@bbcr.uwaterloo.ca, xdlin@bbcr.uwaterloo.ca, rxlu@bbcr.uwaterloo.ca, xshen@bbcr.uwaterloo.ca

Abstract

Delay tolerant networks (DTNs) provide a promising solution to support delay tolerant applications in areas where end-to-end network connectivity is not available. In DTNs, the intermediate nodes on a communication path are expected to store, carry and forward the in-transit messages (bundles) in an opportunistic way, which is also named as opportunistic data forwarding. Opportunistic data forwarding depends on the hypothesis that each individual node is ready to forward packets for others. This, however, might be easily violated due to the existence of selfish nodes or even malicious ones, who may be reluctant to serve as the bundle relays to save their precious wireless resources. To address this problem, we propose a secure credit based incentive scheme to stimulate bundle forwarding cooperation among DTNs nodes. The proposed scheme can be implemented in a fully distributed way to thwart various attacks without relying on any tamper-proof hardware. In addition, we introduce several efficiency optimization techniques to improve the overall efficiency by exploiting the unique characteristics of DTNs. Extensive simulations confirm the efficacy and efficiency of the proposed scheme.