Incentive Based Approach to Find Selfish Nodes in Mobile P2P Networks

被引:0
|
作者
Meka, Hemanth [1 ]
Madria, Sanjay K. [1 ]
Linderman, Mark [2 ]
机构
[1] Missouri Univ Sci & Technol, Dept Comp Sci, Rolla, MO 65409 USA
[2] Air Force Res Lab, Rome, Italy
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In a Mobile P2P (M-P2P) network, selfish nodes can drop packets to affect the efficiency of the whole network. Therefore, we propose a simple and efficient mechanism using virtual currency to identify selfish nodes in the network. Each node issues a receipt to its broker to prove that it has provided a forwarding service. Based on receipts received each broker provides well-behaved nodes some virtual currency whereas selfish nodes are punished on dropping packets to make the network more efficient. When compared to other known approaches, our scheme provides real-time detection of selfish nodes and does not require/assume the presence of any tamper proof hardware at each node and can work with any routing algorithm. Simulation results show that our scheme is efficient in terms of (i) time to detect selfish nodes, (ii) the number of false positives and (iii) the number of packets exchanged when compared with others.
引用
收藏
页码:352 / 359
页数:8
相关论文
共 50 条
  • [21] An incentive model for voting based on information-hiding in P2P networks
    Yang, Bo-wei
    Song, Guang-hua
    Zheng, Yao
    JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2010, 11 (12): : 967 - 975
  • [22] An incentive model for voting based on information-hiding in P2P networks
    Bo-wei Yang
    Guang-hua Song
    Yao Zheng
    Journal of Zhejiang University SCIENCE C, 2010, 11 : 967 - 975
  • [24] Incentive mechanism for P2P networks based on feature weighting and game theory
    Du M.
    Du D.
    Du, Min (duminemail@huse.edu.cn), 1600, International Information and Engineering Technology Association (25): : 93 - 100
  • [25] An incentive model for voting based on information-hiding in P2P networks
    Bowei YANG Guanghua SONG Yao ZHENG Center for Engineering and Scientific Computation Zhejiang University Hangzhou China School of Computer Science and Technology Zhejiang University Hangzhou China School of Aeronautics and Astronautics Zhejiang University Hangzhou China
    JournalofZhejiangUniversity-ScienceC(Computers&Electronics), 2010, 11 (12) : 967 - 975
  • [26] Performance analysis of P2P networks with malicious nodes
    Zhanyou Ma
    Qiannan Si
    Yilin Liu
    Shunzhi Wang
    Cluster Computing, 2022, 25 : 4325 - 4337
  • [27] Performance analysis of P2P networks with malicious nodes
    Ma, Zhanyou
    Si, Qiannan
    Liu, Yilin
    Wang, Shunzhi
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (06): : 4325 - 4337
  • [28] A distributed incentive compatible pricing mechanism for P2P networks
    Zhang, Jie
    Zhao, Zheng
    Xiong, Xiao
    Shi, Qingwei
    NEXT-GENERATION COMMUNICATION AND SENSOR NETWORKS 2007, 2007, 6773
  • [29] An Incentive Mechanism Using Game Theory for P2P Networks
    Ouyang Jing-cheng
    Wang Yue-bin
    Hu Xu-huai
    Lin Ya-ping
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 715 - +
  • [30] Competition Analysis of Adaptive Incentive Protocols for P2P Networks
    Wang, Zheng
    Tseng, Shian-Shyong
    Wang, Xin
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,