Effect of User Mobility upon Trust Building among Autonomous Content Routers in an Information-Centric Network - Publikacja - MOST Wiedzy

Wyszukiwarka

Effect of User Mobility upon Trust Building among Autonomous Content Routers in an Information-Centric Network

Abstrakt

The capability of proactive in-network caching and sharing of content is one of the most important features of an informationcentric network (ICN). We describe an ICN model featuring autonomous agents controlling the content routers. Such agents are unlikely to share cached content with other agents without an incentive to do so. To stimulate cooperation between agents, we adopt a reputation and trust building scheme that is able to explicitly account for both objective current content availability and subjective willingness to cooperate.Thescheme is further complementedwith a so-called one-time goodwill mechanismintroduced to avoid penalizing agents failures to provide temporarily unavailable content. In a simulated ICN environment under a modified Random Waypoint user mobility model, we investigate the resiliency of the reputation and trust building scheme to subversion, that is, strategic (selfish or malicious) agents acquiring higher trust values than honest ones, for varying user mobility scenarios. The scheme proves resilient in low-mobility scenarios, while increased user mobility is shown to have a negative effect.The onetime goodwill mechanismpartly remedies this for high-mobility scenarios.We validate the results by comparison with an existing reputation and trust building scheme and with an alternative user mobility model.

Cytowania

  • 1

    CrossRef

  • 0

    Web of Science

  • 1

    Scopus

Informacje szczegółowe

Kategoria:
Publikacja w czasopiśmie
Typ:
artykuł w czasopiśmie wyróżnionym w JCR
Opublikowano w:
WIRELESS COMMUNICATIONS & MOBILE COMPUTING nr 2018, strony 1 - 16,
ISSN: 1530-8669
Język:
angielski
Rok wydania:
2018
Opis bibliograficzny:
Konorski J., Grochowski J.: Effect of User Mobility upon Trust Building among Autonomous Content Routers in an Information-Centric Network// WIRELESS COMMUNICATIONS & MOBILE COMPUTING. -Vol. 2018, nr. ID 8612817 (2018), s.1-16
DOI:
Cyfrowy identyfikator dokumentu elektronicznego (otwiera się w nowej karcie) 10.1155/2018/8612817
Bibliografia: test
  1. H. Ohtsuki and Y. Iwasa, "How should we define goodness?- reputation dynamics in indirect reciprocity, " Journal of Theoret- ical Biology, vol. 231, no. 1, pp. 107-120, 2004. otwiera się w nowej karcie
  2. I. Pinyol and J. Sabater-Mir, "Computational trust and reputa- tion models for open multi-agent systems: A review, " Artificial Intelligence Review, vol. 40, no. 1, pp. 1-25, 2013. otwiera się w nowej karcie
  3. F. Hendrikx, K. Bubendorfer, and R. Chard, "Reputation sys- tems: a survey and taxonomy, " Journal of Parallel & Distributed Computing, vol. 75, pp. 184-197, 2015. otwiera się w nowej karcie
  4. M. A. Nowak and K. Sigmund, "Evolution of indirect reci- procity, " Nature, vol. 437, no. 7063, pp. 1291-1298, 2005. otwiera się w nowej karcie
  5. R. L. Trivers, "The evolution of reciprocal altruism, " The Quarterly Review of Biology, vol. 46, no. 1, pp. 35-57, 1971. otwiera się w nowej karcie
  6. Z. Wang, L. Wang, Z. Yin, C. Xia, and A. Sánchez, "Inferring Reputation Promotes the Evolution of Cooperation in Spatial Social Dilemma Games, " PLoS ONE, vol. 7, no. 7, p. e40218, 2012. otwiera się w nowej karcie
  7. J. Konorski, "Trust dynamics analysis of CTR scheme sub- version under virtual anonymity and trust-unaware partner selection, " in Proceedings of the 18th International Workshop on Trust in Agent Societies, TRUST 2016, pp. 43-53, Singapore.
  8. T. Koponen, M. Chawla, B.-G. Chun et al., "A data-oriented (and beyond) network architecture, " Computer Communication Review, vol. 37, no. 4, pp. 181-192, 2007. otwiera się w nowej karcie
  9. F. Oehlmann, "Content-Centric Networking, " in Proceedings of the FI and IITM Seminars, pp. 43-49, 2013.
  10. L. Zhang, A. Afanasyev, and J. Burke, "Named data networking, " Computer Communication Review, vol. 44, no. 3, pp. 66-73, 2014. otwiera się w nowej karcie
  11. N. Fotiou, P. Nikander, D. Trossen, and G. C. Polyzos, "Develop- ing information networking further: From PSIRP to PURSUIT, " in Proceedings of the International Conference on Broadband Communications, Networks and Systems, pp. 1-13, Springer, Berlin, Germany, 2010. otwiera się w nowej karcie
  12. X. Jiang, J. Bi, and Y. Wang, "What benefits does NDN have in supporting mobility, " in Proceedings of the 2014 IEEE Symposium on Computers and Communication (ISCC), pp. 1-6, 2014.
  13. Z. Yan, S. Zeadally, S. Zhang, R. Guo, and Y.-J. Park, "Distributed mobility management in named data networking, " Wireless Communications and Mobile Computing, vol. 16, no. 13, pp. 1773-1783, 2016. otwiera się w nowej karcie
  14. C. Anastasiades and T. Braun, Information-centric communica- tion in mobile and wireless networks [Ph.D thesis], Universitaet Bern, 2016. otwiera się w nowej karcie
  15. C. Anastasiades, T. Braun, and V. A. Siris, "Information-Centric Networking in Mobile and Opportunistic Networks, " in Wireless Networking for Moving Objects, vol. 8611 of Lecture Notes in Computer Science, pp. 14-30, Springer International Publishing, 2014. otwiera się w nowej karcie
  16. X. Hu, C. Papadopoulos, J. Gong, and D. Massey, "Not so coop- erative caching in named data networking, " in Proceedings of the 2013 IEEE Global Communications Conference, GLOBECOM 2013, pp. 2263-2268, USA, December 2013.
  17. Y. Xu, Y. Li, S. Ci, T. Lin, and F. Chen, "Distributed Caching via Rewarding: An Incentive Caching Model for ICN, " in Proceedings of the 2017 IEEE Global Communications Conference (GLOBECOM 2017), pp. 1-6, Singapore, December 2017. otwiera się w nowej karcie
  18. F. Kocak, G. Kesidis, T.-M. Pham, and S. Fdida, "The effect of caching on a model of content and access provider revenues in information-centric networks, " in Proceedings of the Interne- tional Conference on Social Computing (SocialCom '13), pp. 45- 50, 2013. otwiera się w nowej karcie
  19. X. Wei, M. Chen, C. Tang, H. Bai, G. Zhang, and Z. Wang, "IRep: Indirect reciprocity reputation based efficient content delivery in BT-like systems, " Telecommunication Systems, vol. 54, no. 1, pp. 47-60, 2013. otwiera się w nowej karcie
  20. M. Nitti, R. Girau, and L. Atzori, "Trustworthiness management in the social internet of things, " IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 5, pp. 1253-1266, 2014. otwiera się w nowej karcie
  21. G. Xylomenos, C. N. Ververidis, V. A. Siris et al., "A survey of information-centric networking research, " IEEE Communica- tions Surveys & Tutorials, vol. 16, no. 2, pp. 1024-1049, 2014. otwiera się w nowej karcie
  22. G. Zhang, Y. Li, and T. Lin, "Caching in information centric networking: a survey, " Computer Networks, vol. 57, no. 16, pp. 3128-3141, 2013. otwiera się w nowej karcie
  23. D. Saxena, V. Raychoudhury, N. Suri, C. Becker, and J. Cao, "Named data networking: a survey, " Computer Science Review, vol. 19, pp. 15-55, 2016. otwiera się w nowej karcie
  24. A. K. Shukla, "Mobility models in wireless Ad-hoc network: a simulative study, " International Journal of Modern Trends in Engineering and Research, vol. 4, no. 7, pp. 244-250, 2017. otwiera się w nowej karcie
  25. X. Lin, R. K. Ganti, P. J. Fleming, and J. G. Andrews, "Towards understanding the fundamentals of mobility in cellular net- works, " IEEE Transactions on Wireless Communications, vol. 12, no. 4, pp. 1686-1698, 2013. otwiera się w nowej karcie
  26. W.-J. Hsu, T. Spyropoulos, K. Psounis, and A. Helmy, "Modeling spatial and temporal dependencies of user mobility in wireless mobile networks, " IEEE/ACM Transactions on Networking, vol. 17, no. 5, pp. 1564-1577, 2009.
  27. S. Signorello, S. Marchal, J. Francois, O. Festor, and R. State, "Advanced interest flooding attacks in named-data networking, " in Proceedings of the 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA), pp. 1-10, Cambridge, MA, October 2017. otwiera się w nowej karcie
  28. Z. Zhang, Y. Yu, A. Afanasyev, J. Burke, and L. Zhang, "NAC: Name-based access control in named data networking, " in Proceedings of the 4th ACM Conference on Information-Centric Networking, ICN 2017, pp. 186-187, Germany, September 2017. otwiera się w nowej karcie
  29. I. Drago, M. Mellia, M. M. Munafò, A. Sperotto, R. Sadre, and A. Pras, "Inside dropbox: understanding personal cloud storage services, " in Proceedings of the ACM Internet Measurement Conference (IMC '12), pp. 481-494, November 2012. otwiera się w nowej karcie
  30. A. K. Jain, M. N. Murty, and P. J. Flynn, "Data clustering: a review, " ACM Computing Surveys, vol. 31, no. 3, pp. 264-323, 1999. otwiera się w nowej karcie
  31. J. A. Hartigan and M. A. Wong, "Algorithm AS 136: a k-means clustering algorithm, " Journal of Applied Statistics, vol. 28, no. 1, pp. 100-108, 1979. otwiera się w nowej karcie
  32. M. S. Hossain and M. Atiquzzaman, "Stochastic Properties and Application of City Section Mobility Model, " in Proceedings of the GLOBECOM 2009 -2009 IEEE Global Telecommunications Conference, pp. 1-6, Honolulu, Hawaii, November 2009. otwiera się w nowej karcie
Weryfikacja:
Politechnika Gdańska

wyświetlono 18 razy

Publikacje, które mogą cię zainteresować

Meta Tagi