Abstract:A variety of analytical models were established for the study of node selfish influence assessment in the opportunistic network in the past.However,how to apply these theoretical models was not considered.In this paper,we analyzed the impact of the evaluation model on the selfish nodes of the networks with or without TTL limitation,and proposed a self-private model based on message classification to evaluate the influence of selfish nodes on delay and message delivery rate.The analysis shows that the opportunistic network is affected not only by the number of selfish nodes,but by the speed of the nodes and the range of message transmission.Therefore,we can improve the performance of the network by adjusting these parameters and reduce the impact on selfish nodes.Firstly,we obtain the message transmission range of the number of cooperative nodes under the delay guarantee of 2-hop routing and epidemic routing and the TTL of the message of the epidemic routing guaranteed by the message delivery rate through the theoretical derivation.Subsequently,we proved that the theoretical value of the network performance under the influence of selfish behavior is similar to the experimental value and the parameter values obtained by theoretical analysis are also similar to the experimental values through the evaluation of the influence of the ONE simulation platform on the selfish nodes.
马学彬, 郑田玉, 李明珠. 机会网络中自私行为影响的分析与调节[J]. 电子学报, 2019, 47(4): 837-847.
MA Xue-bin, ZHENG Tian-yu, LI Ming-zhu. Analysis and Regulation of Effects of Selfishness on Opportunistic Network. Acta Electronica Sinica, 2019, 47(4): 837-847.
[1] Huang C M,Lan K C,Tsai C Z.A survey of opportunistic networks[A].International Conference on Advanced Information Networking and Applications[C].Japan:DBLP,2008.1672-1677.
[2] Yoon S K,Haas Z J,Kim J H.Tradeoff between energy consumption and lifetime in delay-tolerant mobile network[A].Military Communications Conference[C].Milcom:IEEE Xplore,2008.1-7.
[3] Leela-Amornsin L,Esaki H.Heuristic Congestion Control for Message Deletion in Delay Tolerant Network[M].Springer Berlin Heidelberg:Smart Spaces and Next Generation Wired/Wireless Networking,2010.287-298.
[4] Boldrini C,Conti M,Passarella A.The stability region of the delay in Pareto opportunistic networks[J].IEEE Transactions on Mobile Computing,2015,14(1):180-193.
[5] Boldrini C,Conti M,Passarella A.Less is more:long paths do not help the convergence of social-oblivious forwarding in opportunistic networks[A].ACM/sigmobile Mobiopp[C].Zurich:ACM,2012.13-20.
[6] Gao C,Zhang W,Tang J,et al.Relax,but do not sleep:A new perspective on green wireless networking[A].INFOCOM[C].Toronto:IEEE,2014.907-915.
[7] Hameed S,Wolf A,Zhu K,et al.Evaluation of human altruism using a DTN-based mobile social network application[A].GI-Jahrestagung[C].Bonn:INFORMATIK,2012.81-95.
[8] Chen L J,Chiou C L,Chen Y C.An evaluation of routing reliability in non-collaborative opportunistic networks[A].International Conference on Advanced Information Networking and Applications[C].Bradford:IEEE,2009.50-57.
[9] Karaliopoulos M,Rohner C.Trace-based performance analysis of opportunistic forwarding under imperfect node cooperation[A].INFOCOM[C].IEEE,2012.2651-2655.
[10] Sobin C C.Analyzing the impact of selfishness on probabilistic routing algorithms in delay tolerant networks[A].International Conference on Computing and Network Communications[C].IEEE,2015.186-190.
[11] Li Y,Su G,Wang Z.Evaluating the effects of node cooperation on dtn routing[J].AEU-International Journal of Electronics and Communications,2012,66(1):62-67.
[12] Li Y,Hui P,Jin D,et al.Evaluating the impact of social selfishness on the epidemic routing in delay tolerant networks[J].IEEE Communications Letters,2010,14(11):1026-1028.
[13] Liu J,Jiang X,Nishiyama H,et al.Performance modeling for relay cooperation in delay tolerant networks[J].Mobile Networks and Applications,2013,18(2):186-194.
[14] Li Y,Su G,Wu D O,et al.The impact of node selfishness on multicasting in delay tolerant networks[J].IEEE Transactions on Vehicular Technology,2011,60(5):2224-2238.
[15] Li Y,Su L,Jin D,et al.Performance evaluation of multicasting in energy-constrained DTN with selfish nodes[A].Global Telecommunications Conference[C].IEEE,2011.1-5.
[16] Wu Y,Deng S,Huang H,et al.Performance analysis of epidemic routing in delay tolerant networks with overlapping communities and selfish nodes[J].International Journal of Computers Communications & Control,2013,8(5):744-753.
[17] Manam V K C,Mahendran V,Murthy C S R.Performance modeling of DTN routing with heterogeneous and selfish nodes[J].Wireless Networks,2014,20(1):25-40.
[18] Wu Y,Deng S,Huang H.On modeling the impact of selfish behaviors on limited epidemic routing in delay tolerant networks[J].Wireless Personal Communications,2013,71(4):2759-2782.
[19] Sermpezis P,Spyropoulos T.Understanding the effects of social selfishness on the performance of heterogeneous opportunistic networks[J].Computer Communications,2014,48:71-83.
[20] Manam V K C,Mahendran V,Murthy C S R.Performance modeling of DTN routing with heterogeneous and selfish nodes[J].Wireless Networks,2014,20(1):25-40.
[21] Wu Y,Huang H,Deng S,et al.Performance of two-hop routing in delay tolerant networks with selfish nodes[A].Computers & Communication[C].IEEE Computer Society,2015.58-63.
[22] Robin Groenevelt,Philippe Nain,Ger Koole.The message delay in mobile ad hoc networks[J].Performance Evaluation,2005,62(1):210-228.
[23] Malekar U B,Hulke S P.Performance Evaluation of Basic Selfish Node Detection Strategy on Delay Tolerant Networking Routing Protocols[M].Information Systems Design and Intelligent Applications.Springer India,2016.357-363.
[24] Zhang X,Neglia G,Kurose J,et al.Performance modeling of epidemic routing[J].Lecture Notes in Computer Science,2006,51(10):827-839.
[25] Sermpezis Pavlos.Delay analysis of epidemic schemes in sparse and dense heterogeneous contact environments[J].Eurecom,2012,3868.193-221.
[26] Keranen A.Opportunistic network environment simulator[R].Special Assignment report,Helsinki University of Technology,Department of Communications and Networking,2008-12-15.