Scheduled System Maintenance:
On April 27th, single article purchases and IEEE account management will be unavailable from 2:00 PM - 4:00 PM ET (18:00 - 20:00 UTC).
We apologize for the inconvenience.
By Topic

Assessing the vulnerability of DTN data relaying schemes to node selfishness

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Karaliopoulos, M. ; Dept. of Elec. Eng. & Inf. Tech., Swiss Fed. Inst. of Technol., Zurich, Switzerland

Delay tolerant networks rely on the mobility of their nodes and sequences of their contacts to transfer data. Proposed data forwarding mechanisms represent different trade offs between data transfer speed and network resource consumption, most of them assuming perfect cooperation among network nodes. Nevertheless, nodes may exhibit selfish behavior, in particular when they are constrained with respect to energy, computational power, and/or storage space. In this paper, we analytically assess the performance of two popular data relaying alternatives, the unrestricted and two-hop relay schemes, when nodes behave selfishly while forwarding data. Our results suggest that the performance advantage of unrestricted relaying over two-hop relaying decreases both with the number of selfish nodes and the intensity of their selfishness, irrespective of whether nodes defer from relaying deterministically or probabilistically. We use our model to quantify the vulnerability of the two relaying schemes to node selfishness but also drive remediation actions against it.

Published in:

Communications Letters, IEEE  (Volume:13 ,  Issue: 12 )