Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1454630.1454651acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
research-article

Dynamic reputation-based incentive mechanism considering heterogeneous networks

Published: 31 October 2008 Publication History

Abstract

Selfish behavior by users significantly affects the overall performance and degrades the overall connectivity in heterogeneous networks such as Personal Networks (PNs). Incentives are considered one of the best solutions for this situation. This paper proposes a dynamic reputation-based incentive mechanism for cooperative relay in PNs. Based on reputation calculations for individual contributions of intermediate relay nodes in a cooperative relay service, the proposed scheme dynamically assigns incentives in terms of additional throughput for those cooperative relay nodes. Experimental results of two simulation scenarios show that dynamic incentives are appropriate and sustainable for motivating user participation in PNs, particularly for applications characterized by wide coverage and high data rates.

References

[1]
I.G. Niemegeers and S.M. Heemstra de Groot, "From personal area networks to personal networks: A user-oriented approach," Wireless Personal Communications, 2002, vol. 22, no. 2, pp. 175--186
[2]
M. Jacobsson, J. Hoebeke, S. Heemstra de Groot, A. Lo, I. Moerman, I. Niemegeers, L. Munoz, M. Alution, W. Louati, and D. Zeghlache, "A network layer architecture for personal networks," in Proceedings of the 14th IST Mobile and Wireless Communication Summit, Dresden, Germany, 19--23 June 2005
[3]
F.T.H. den Hartog and M. Peeters, "A concrete example of a personal network architecture," in Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, Las Vegas, NV, USA, 8-10 January 2006, vol. 1, pp. 514--518
[4]
A. Lo, W. Lu, M. Jacobsson, V. Prasad, and I. Niemegeers, "Personal networks - an architecture for 4G mobile communications networks," Telenor Telektronikk, January 2007, pp. 45--58
[5]
Y. Liu, "Wireless personal area networks - the PACWOMAN vision," Telenor Telektronikk, January 2007, pp. 4--11
[6]
M. Alutoin, S. Lehtonen, J. Hoebeke, G. Holderbeke, I. Moerman, L. Sanchez, J. Lanza, W. Louati, and D. Zeghlache, "Towards self-organising personal networks," in Proceedings of the 1st ACM Workshop on Dynamic Interconnection of Networks, Cologne, Germany, 2 September 2005, pp. 12--16
[7]
R. Prasad and K. Skouby, "Personal network (PN) applications," Wireless Personal Communications, June 2005, vol. 33, no. 3-4, pp. 227--242
[8]
M. Alutoin, S. Lehtonen, K. Ahola, and J. Paananen, "Personal network directory service," Telenor Telektronikk, January 2007, pp. 85--92
[9]
L. Sanchez, J. Lanza, and L. Munoz, "Extending private personal area networks to personal network federations in heterogeneous ad hoc scenarios," Telenor Telektronikk, January 2007, pp. 34--44
[10]
M.D. Sanctis, J. Gerrits, and J.P. Vila, "Coexistence concept for the implementation of LDR-HDR WPAN multimode devices," Telenor Telektronikk, January 2007, pp. 101--112
[11]
E. Kovacs, M. Bauer, U. Javaid, and D.E. Meddour, "Context-aware personal networks in beyond 3G systems," in Proceedings of the 15th IST Mobile and Wireless Communications Summit, Workshop on Capturing Context and Context Aware Systems and Platforms, Mykonos, Greece, 4-8 June 2006
[12]
H. Olesen, N. Schultz, K. E. Skouby, L. Sorensen, S. Bessler, D. M. Kyriazanos, and C. Z. Patrikakis, "Scenario construction and personalization of PN services based on user profiles and context information," in Proceedings of the 15th IST Mobile and Wireless Communications Summit, Mykonos, Greece, 4-8 June 2006
[13]
M. A. Ingram, R. Prasad, and K. Skaue, "The unpredictable future - personalized services and applications architecture," Telenor Telektronikk, January 2007, pp. 113--122
[14]
R.L. Olsen, "Challenges and solutions in achieving personalisation through context adaptation," Telenor Telektronikk, January 2007, pp. 70--84
[15]
W. Louati and D. Zeghlache, "Wide-area publish-subscribe service discovery - application to personal networks," Telenor Telektronikk, January 2007, pp. 59--69
[16]
M.R. Jeong, K. Kaneko, Y. Kochi, N. Imai, G. Kunito, H. Morikawa, and T. Aoyama, "Bringing flexibility into ubiquitous personal networks," in Proceedings of the Institute of Electronics, Information and Communication Engineers General Conference, Tokyo, Japan, 2002, pp. 13--14
[17]
J. Suomalainen, "Multi-model security associations in personal networks," The White Paper, Helsinki University of Technology, October 2006
[18]
M. Jacobsson and I. Niemegeers, "Privacy and anonymity in personal networks," in Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications, Kauai Island, HI, USA, 8-12 March 2005, pp. 130--135
[19]
S.-E. Tan and R. Roswall, "PN business models and strategies - the operator's perspective," Telenor Telektronikk, January 2007, pp. 17--25
[20]
S. Kyriazakos and N. Prasad, "Risk analysis in an 'insecure wireless world'," Telenor Telektronikk, January 2007, pp. 93--100
[21]
K.E. Skouby and K. Vandrup, "Personal networks as business strategy for the wireless communication future," Telenor Telektronikk, January 2007, pp. 12--16
[22]
R.R. Prasad and V.S. Keldanis, "Interconnection and billing policies for personal networks," Telenor Telektronikk, January 2007, pp. 26--33
[23]
I.G. Niemegeers and S.M. Heemstra de Groot, "Research issues in ad-hoc distributed personal networking," Wireless Personal Communications, 2003, vol. 26, no. 2-3, pp. 149--167
[24]
L. Buttyan and J.-P. Hubaux, "Enforcing service availability in mobile ad-hoc WANs," in Proceedings of the 1st IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing, Boston, MA, USA, 11 August 2000, pp. 87--96
[25]
L. Buttyan and J.-P. Hubaux, "Nuglets: A virtual currency to stimulate cooperation in self-organized mobile ad hoc networks," Technical Report No. DSC/2001/001, 2001
[26]
L. Buttyan and J.-P. Hubaux, "Stimulating cooperation in self-organizing mobile ad hoc networks," Mobile Networks and Applications, October 2003, vol. 8, no. 5, pp. 579--592
[27]
A. Weyland, T. Staub, and T. Braun, "Comparison of incentive-based cooperation strategies for hybrid networks," in Proceedings of the 3rd International Conference on Wired/Wireless Internet Communications, Xanthi, Greece, 11-13 May 2005, pp. 169--180
[28]
S. Zhong, J. Chen, and Y.R. Yang, "Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks," in Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Francisco, CA, USA, 30 March - 3 April 2003, pp. 1987--1997
[29]
S. Buchegger and J.-Y. Le Boudec, "Performance analysis of CONFIDANT protocol (Cooperation of nodes: Fairness in dynamic ad-hoc networks)," in Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing, Lausanne, Switzerland, 9-11 June 2002, pp. 226--236
[30]
S. Buchegger and J.-Y. Le Boudec, "Coping with false accusations in misbehavior reputation systems for mobile ad hoc networks," EPFL Technical Report No. IC/2003/31, 2003
[31]
S. Buchegger and J.-Y. Le Boudec, "A robust reputation system for P2P and mobile ad-hoc networks," in Proceedings of the 2nd Workshop on the Economics of Peer-to-Peer Systems, Harvard University, 4-5 June 2004
[32]
P. Michiardi and R. Molva, "CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks," in Proceedings of the 6th IFIP Communications and Multimedia Security Conference, Portoroz, Slovenia, 26-27 September 2002
[33]
P.-W. Yau, and C.J. Mitchell, "Reputation methods for routing security for mobile ad hoc networks," in Proceedings of the Joint First Workshop on Mobile Future and Symposium on Trends in Communications, Bratislava, Slovakia, 26-28 October 2003, pp. 130--137
[34]
S. Bansal and M. Baker, "Observation-based cooperation enforcement in ad hoc networks," Stanford University Technical Report, 2003
[35]
Q. He, D. Wu, and P. Khosla, "A secure incentive architecture for ad-hoc networks," Wireless Communications and Mobile Computing, May 2006, vol. 6, no. 3, pp. 333--346
[36]
H.-Y. Wei and R.D. Gitlin, "Incentive mechanism design for selfish hybrid wireless relay networks," Mobile Networks and Applications, December 2005, vol. 10, no. 6, pp. 929--937
[37]
N. Gilbert and R.D. Terna, "How to build and use agent-based models in social science," Mind & Society, March 2000, vol. 1, no. 1, pp. 57--72
[38]
Communication & Network Laboratory, Samsung Advanced Institute of Technology, "Cognitive radio scenarios," 2007
[39]
P. Bender, P. Black, M. Grob, R. Padovani, N. Sindhushyana, and S. Viterbi, "CDMA/HDR: a bandwidth efficient high speed wireless data service for nomadic users," IEEE Communications Magazine, July 2000, vol. 38, no. 7, pp. 70--77
[40]
Repast Agent Simulation Toolkit. Available: http://repast.sourceforge.net/

Cited By

View all
  • (2022)Game Theory for Cooperation in Multi-Access Edge ComputingResearch Anthology on Edge Computing Protocols, Applications, and Integration10.4018/978-1-6684-5700-9.ch012(229-279)Online publication date: 1-Apr-2022
  • (2019)Game Theory for Cooperation in Multi-Access Edge ComputingPaving the Way for 5G Through the Convergence of Wireless Systems10.4018/978-1-5225-7570-2.ch005(100-149)Online publication date: 2019
  • (2018)The research of reputation incentive mechanism of P2P network file sharing systemInternational Journal of Information and Computer Security10.5555/3270804.327080710:2-3(149-169)Online publication date: 17-Dec-2018
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
PM2HW2N '08: Proceedings of the 3nd ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks
October 2008
198 pages
ISBN:9781605582399
DOI:10.1145/1454630
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 31 October 2008

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. agent-based modeling
  2. cooperative relay
  3. incentive mechanism
  4. personal networks
  5. reputation

Qualifiers

  • Research-article

Conference

MSWiM '08
Sponsor:

Acceptance Rates

Overall Acceptance Rate 74 of 226 submissions, 33%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)1
Reflects downloads up to 14 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Game Theory for Cooperation in Multi-Access Edge ComputingResearch Anthology on Edge Computing Protocols, Applications, and Integration10.4018/978-1-6684-5700-9.ch012(229-279)Online publication date: 1-Apr-2022
  • (2019)Game Theory for Cooperation in Multi-Access Edge ComputingPaving the Way for 5G Through the Convergence of Wireless Systems10.4018/978-1-5225-7570-2.ch005(100-149)Online publication date: 2019
  • (2018)The research of reputation incentive mechanism of P2P network file sharing systemInternational Journal of Information and Computer Security10.5555/3270804.327080710:2-3(149-169)Online publication date: 17-Dec-2018
  • (2016)Game Theory for Collaboration in Future NetworksMobile Computing and Wireless Networks10.4018/978-1-4666-8751-6.ch090(2061-2091)Online publication date: 2016
  • (2014)Self Organizing Communities: Enhancing Cooperation through CompetitionInternational Journal of Communications, Network and System Sciences10.4236/ijcns.2014.7803307:08(303-315)Online publication date: 2014
  • (2014)Game Theory for Collaboration in Future NetworksConvergence of Broadband, Broadcast, and Cellular Network Technologies10.4018/978-1-4666-5978-0.ch005(94-123)Online publication date: 2014
  • (2011)Cooperation Incentives in 4G NetworksGame Theory for Wireless Communications and Networking10.1201/b10975-17(295-314)Online publication date: 28-Jun-2011
  • (2010)Reputation-Based Systems within Computer NetworksProceedings of the 2010 Fifth International Conference on Internet and Web Applications and Services10.1109/ICIW.2010.22(96-101)Online publication date: 9-May-2010

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media