Skip to main content

Transmission Failure Tolerance and Node Punishment Mechanism in Opportunistic Network Based on Repeated-Game

  • Conference paper
  • First Online:
Theoretical Computer Science (NCTCS 2017)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 768))

Included in the following conference series:

  • 1027 Accesses

Abstract

During the data forwarding in opportunistic network, the selfishness of rational nodes leads to a serious decline in network performance. To solve this problem, this paper proposes a mechanism referred as TFT-NP (transmission failure tolerance and node punishment). TFT-NP takes transmission failure into account, and judges whether the node is selfish or not. It introduces repeated-game theory and sets the penalty cycle of selfish node reasonably. It forces rational nodes to cooperate for a greater profit. Experimental results show that, in opportunistic network with selfish nodes, TFT-NP can improve message delivery rate and reduce message delay significantly.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Soelistijanto, B., Howarth, M.P.: Transfer reliability and congestion control strategies in opportunistic networks: a survey. IEEE Commun. Surv. Tutorials 16(1), 538–555 (2014)

    Article  Google Scholar 

  2. Liu, Q.L., Liu, M.S., Li, Y.: Novel game-based incentive strategy for opportunistic networks. Appl. Res. Comput. 25(7), 65–71 (2015)

    Google Scholar 

  3. Pan, D.R., Zhang, H., Chen, W.J., et al.: Transmission of multimedia contents in opportunistic networks with social selfish nodes. Multimedia Syst. 21(3), 277–288 (2015)

    Article  Google Scholar 

  4. Wu, J., Chen, Z.G.: Sensor communication area and node extend routing algorithm in opportunistic networks. Peer-to-Peer Network. Appl. 1–12 (2016). https://doi.org/10.1007/s12083-016-0526-4

  5. Kumar, M., Mishra, R.: An overview of MANET: history, challenges and applications. Indian J. Comput. Sci. Eng. 3(1), 121–125 (2012)

    Google Scholar 

  6. Placzek, B.: Selective data collection in vehicular networks for traffic control applications. Transport. Res. Part C Emerg. Technol. 23(7), 14–28 (2011)

    Google Scholar 

  7. Wang, D., Chen, Z.G., Wu, J.: Forwarding mechanism in opportunistic networks based on social relations. Appl. Res. Comput. 32(5), 1461–1463 (2015)

    Google Scholar 

  8. Li, H., Chen, Z.G., Wu, J.: Opportunistic network routing algorithm based on community and sociality. Comput. Eng. 41(12), 64–68+74 (2015)

    Google Scholar 

  9. Chen, Z.G., Wu, J.: Applying a sensor energy supply communication scheme to big data opportunistic networks. KSII Trans. Internet Inf. Syst. 10(5), 2029–2046 (2016)

    Google Scholar 

  10. Pereira, P.R., Casaca, A., Rodrigues, J.J.P.C., et al.: From delay-tolerant networks to vehicular delay-tolerant networks. IEEE Commun. Surv. Tutorials 14(4), 1166–1182 (2012)

    Article  Google Scholar 

  11. Pelusi, L., Passarella, A., Conti, M.: Opportunistic networking: data forwarding in disconnected mobile ad hoc networks. IEEE Commun. Mag. 44(11), 134–141 (2006)

    Article  Google Scholar 

  12. Zhao, G.S., Chen, M.: Research of incentive-aware data dissemination in selfish opportunistic networks. J. Commun. 34(2), 73–84 (2013)

    Google Scholar 

  13. Lu, Y., Shi, J., Xie, L.: Repeated-Game modeling of cooperation enforcement in wireless ad hoc network. J. Softw. 19(3), 755–768 (2008)

    Article  Google Scholar 

  14. Marti, S., Giuli, T., Lai, K.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the ACM MobiCom, vol. 6(11), pp. 255–265. ACM Press (2000)

    Google Scholar 

  15. Buttyan, L., Hubaux, J.P.: Stimulating cooperation in self-organizing mobile ad hoc networks. Mobile Netw. Appl. 8(5), 579–592 (2003)

    Article  Google Scholar 

  16. Srinivasan, V., Nuggehalli, P., Chiasserini, C.F., et al.: Cooperation in wireless ad hoc networks. Proc. IEEE INFOCOM 2(7), 808–817 (2003)

    Google Scholar 

  17. Zhang, C., Liu, H.J., Chen, Z.Y., et al.: Credit-based repeated game model applied in transfer decision of opportunistic network. J. PLA Univ. Sci. Technol. 13(2), 152–158 (2012)

    Google Scholar 

  18. Ye, H., Chen, Z.G., Zhao, M.: ON-CRP: cache replacement policy for opportunistic networks. J. Commun. 31(5), 98–107 (2010)

    Google Scholar 

  19. Fudenberg, D., Maskin, E.: The folk theorem in repeated games with discounting or with incomplete information. Econometrica 54(3), 533–554 (2015)

    Article  MathSciNet  MATH  Google Scholar 

  20. Wang, Z., Wang, X.H., Sui, J.Q.: Extending research for ONE simulator of opportunistic network. Appl. Res. Comput. 29(1), 272–277 (2012)

    Google Scholar 

Download references

Acknowledgements

This work is supported by Major Program of National Natural Science Foundation of China (71633006); The National Natural Science Foundation of China (61672540, 61379057); China Postdoctoral Science Foundation funded project (2017M612586); The Postdoctoral Science Foundation of Central South University (185684).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhigang Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Yin, Ba., Chen, Z., Wu, J. (2017). Transmission Failure Tolerance and Node Punishment Mechanism in Opportunistic Network Based on Repeated-Game. In: Du, D., Li, L., Zhu, E., He, K. (eds) Theoretical Computer Science. NCTCS 2017. Communications in Computer and Information Science, vol 768. Springer, Singapore. https://doi.org/10.1007/978-981-10-6893-5_8

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6893-5_8

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6892-8

  • Online ISBN: 978-981-10-6893-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics