CRSG: A congestion control routing algorithm for security defense based on social psychology and game theory in DTN

Cheng-jun Wang , Zheng-hu Gong , Yong Tao , Zi-wen Zhang , Bao-kang Zhao

Journal of Central South University ›› 2013, Vol. 20 ›› Issue (2) : 440 -450.

PDF
Journal of Central South University ›› 2013, Vol. 20 ›› Issue (2) : 440 -450. DOI: 10.1007/s11771-013-1505-z
Article

CRSG: A congestion control routing algorithm for security defense based on social psychology and game theory in DTN

Author information +
History +
PDF

Abstract

The inherent selfishness of each node for the enhancement of message successful delivery ratio and the network overall performance improvement are reflected in the contradiction relationship of competition and cooperation in delay/disruption tolerant networks (DTN). In particular, the existence of malicious node aggravates this contradiction. To resolve this contradiction, social relationship theory and group theory of social psychology were adopted to do an in-depth analysis. The concrete balancing approach which leveraged Nash equilibrium theory of game theory was proposed to resolve this contradiction in reality. Thus, a new congestion control routing algorithm for security defense based on social psychology and game theory (CRSG) was put forward. Through the experiment, this algorithm proves that it can enhance the message successful delivery ratio by more than 15% and reduce the congestion ratio over 15% as well. This algorithm balances the contradiction relationship between the two key performance targets and made all nodes exhibit strong cooperation relationship in DTN.

Keywords

delay/disruption tolerant networks / social psychology / game theory / congestion control / routing

Cite this article

Download citation ▾
Cheng-jun Wang, Zheng-hu Gong, Yong Tao, Zi-wen Zhang, Bao-kang Zhao. CRSG: A congestion control routing algorithm for security defense based on social psychology and game theory in DTN. Journal of Central South University, 2013, 20(2): 440-450 DOI:10.1007/s11771-013-1505-z

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

DTNRG: Delay-tolerant networking research group [EB/OL] 2012-07-01. http://www.dtnrg.org.

[2]

PentlandA. S., FletcherR., HassonA.. Dak Net: Rethinking connectivity in developing nations [J]. Computer, 2004, 37(1): 78-83

[3]

BURGESS J, GALLAGHER B, JENSEN D, LEVINE B N. Maxprop: Routing for vehicle-based disruption-tolerant networks [C]// Proceedings of INFOCOM, Barcelona, 2006: 1–11.

[4]

BurleighS., HookeA., TorgersonL., FallK., CerfV., DurstB., ScottK.. Delay-tolerant networking: An approach to interplanetary internet [J]. IEEE Communications Magazine, 2003, 41(6): 128-136

[5]

ScottK., BurleighS.Bundle protocol specification [R] Mclean, 2007VirginiaInternet RFC 5050

[6]

FallK., HongW., MaddenS.Custody transfer for reliable delivery in delay tolerant networks [R], 2003BerkeleyIntel Research, IRB-TR-03-030

[7]

VahdatA., BeckerD.Epidemic routing for partially connected ad hoc networks [R], 2000DurhamDuke University, CS-2000-06

[8]

LindgrenA., DoriaA., SchelénO.. Probabilistic routing in intermittently connected networks [J]. SIGMOBILE Mobile Computing Communications Review, 2003, 7(3): 19-20

[9]

JAIN R, RAMAKRISHNAN K K. Congestion avoidance in computer networks with a connectionless network layer: Concepts, goals, and methodology[C]// IEEE Comp Networking Symp, Washington DC, 1988, 134–143.

[10]

SeligmanM., FallK., MundurP.. Storage routing for DTN congestion control [J]. Wireless Communications and Mobile Computing, 2007, 7(10): 1183-1196

[11]

HOLLOT C V, MISRA V, TOWSLEY D, GONG W B. A control theoretic analysis of RED [C]// IEEE INFOCOM, Anchorage, 2001: 1510–1519.

[12]

FENG L, JIE W, AVINASH S. Thwarting black hole attacks in disruption-tolerant networks using encounter tickets [C]// IEEE INFOCOM, Rio de Janeiro, 2009: 2428–2436.

[13]

VivekN., YiY., SencunZ.. Resource-Misuse attack detection in delay-tolerant networks [C]. Performance Computing and Communications Conference (IPCCC), 2011University ParkIEEE1-8

[14]

TaylorS. E., PeplauL. A., SearsD. O.Social psychology 10th Edition [M], 1993New YorkPearson Education Press

[15]

OsborneM. J.An Introduction to game theory [M], 2004OxfordUniversity Press

[16]

SPYROPOULOS T, PSOUNIS K, RAGHAVENDRA C S. Spray and wait: An efficient routing scheme for intermittently connected mobile networks [C]// Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerant Networking(WDTN’ 05), 2005, New York, NY, USA: ACM, 252–259.

[17]

SpyropoulosT., PsounisK., RaghavendraC. S.. Efficient routing in intermittently connected mobile networks: the multiple-copy case [J]. IEEE/ACM Transactions on Networking, 2008, 16(1): 77-90

[18]

ZHAO W, AMMAR M, ZEGURA E. A message ferrying approach for data delivery in sparse mobile ad hoc networks [C]// Proc of the ACM Mobihoc, Roppongi, 2004, 187–198.

[19]

CostaP., MascoloC., MusolesiM., PiccoG. P.. Socially-Aware routing for publish-subscribe in delay-tolerant mobile ad hoc networks [J]. IEEE Journal of Selected Areas in Communication, 2008, 26(5): 748-760

[20]

FloydS., JacobsonV.. Random early detection gateways for congestion avoidance [J]. IEEE/ACM Transactions on Networking, 1993, 1(4): 397-413

[21]

SELIGMAN M, FALL K, MUNDUR P. Alternative custodians for congestion control in delay tolerant networks [C]//. SIGCOMM Workshops, Pisa, Italy. 2006: 229–236.

[22]

TaoY., GongZ.-h., LinY.-p., ZhouS.-wang.. Congestion aware routing algorithm for delay-disruption tolerance networks [J]. Journal of Central South University of Technology, 2011, 18(1): 133-139

[23]

NishiyamaH., AnsariN., KatoN.. Wireless loss-tolerant congestion control protocol based on dynamic aimed theory [J]. IEEE Wireless Communications, 2010, 17(2): 7-14

[24]

ChiuD. M., JainR.. Analysis of the increase and decrease algorithms for congestion avoidance in computer networks [J]. Computer Networks ISDN Sys, 1989, 17: 1-14

[25]

GODFREY P B, SCHAPIRA M, ZOHAR A, SHENKER S. Incentive compatibility and dynamics of congestion control [C]// SIGMETRICS, New York, USA, 2010: 95–106.

[26]

FIROIU V, BORDEN M. A Study of active queue management for congestion control [C]// IEEE INFOCOM, Tel Aviv, 2000: 1435–1444.

[27]

PaganiniF., WangZ. K., DoyleJ. C., LowS. H.. Congestion control for high performance, stability, and fairness in general networks [J]. IEEE/ACM Transactions on Networking, 2005, 13(1): 43-56

[28]

DeutschM.. An Experimental study of the effects of cooperation and competition upon group process [J]. Human Relations, 1949, 2(3): 197-292

[29]

CotaA. A., EvansR. C., DionL. K., KilikL., LongmanS. R.. The structure of group cohesion [J]. Personality and Social Psychology Bulletin, 1995, 21(6): 527-580

[30]

GowenC. R.. Managing work group performance by individual goals and group goals for an interdependent group task [J]. Journal of Organizational Behavior, 1986, 7(3): 5-27

[31]

BraikerB. H., KelleyH. H.BurgessR. L., HustonT. L.. Conflict in the development of close relationships. Social exchange in developing relationships [M], 1979New YorkAcademic Press256-280

[32]

BrewerB. M., KramerM. R.. Choice behavior in social dilemmas: Effects of social identity, group size, and decision framing [J]. Journal of Personality and Social Psychology, 1986, 50(3): 543-549

[33]

LuceD. R., RaiffaH.Games and Decisions [M], 1957New YorkWiley Press87-126

[34]

DeutschM., KraussR. M.. The effect of the threat on interpersonal bargaining [J]. Journal of Abnormal and Social Psychology, 1960, 61(1): 181-189

[35]

OrbellM. J., van de KragtC. A. J., DawesM. R.. Explaining discussion induced cooperation [J]. Journal of Personality and Social Psychology, 1988, 54(5): 811-819

[36]

GlanceS. N., HubermanA. B.. The dynamics of social dilemmas [J]. Scientific American, 1994, 270(3): 76-81

[37]

CialnidiR. B., TrostM. R.GilbertD. T., FiskeS. T., LindzeyG.. Social influence: Social norms, conformity, and compliance. Handbook of social psychology [M], 1998Boston: MAMcGraw-Hill Press151-192

[38]

TylerR. T., DegoeyP.. Collective restraint in social dilemmas: Procedural justice and social identification effects on support for authorities [J]. Journal of Personality and Social Psychology, 1995, 69(3): 482-497

[39]

ClarkS. M., MillsJ.. Interpersonal attraction in exchange and communal relationships [J]. Journal of Personality and Social Psychology, 1979, 37(1): 12-24

[40]

DeutschM.Distributive justice: A social psychological perspective [M], 1985New Haven, CTYale University Press122-155

[41]

HustonL. T., KelleyH. H.Close relationships [M], 1983New YorkW. H. Freeman Press169-219

[42]

WillardW., ReubenH.The family: A dynamic interpretation [M], 1951Ft Worth, TX, USDryden Press437-482

[43]

Brown JohnP.. Toward an economic theory of liability [J]. Journal of Legal Studies, 1973, 2(2): 323-349

[44]

BussH. A., PerryM.. The aggression questionnaire [J]. Journal of Personality and Social Psychology, 1992, 63(3): 452-459

[45]

AndersonA. C., MorrowM.. Competitive aggression without interaction: Effects of competitive versus cooperative instructions on aggressive behavior in video games [J]. Personality and Social Psychology Bulletin, 1995, 21(10): 1020-1030

[46]

SchachterS.The psychology of affiliation [M], 1959Stanford: CAStanford University Press21-35

[47]

SchachterS.BerkowitzL.. The interaction of cognitive and physiological determinants of emotional state. Advances in experimental social psychology [M], 1964New YorkAcademic Press49-80

[48]

LataneB.. The psychology of social impact [J]. American Psychologist, 1981, 36(4): 343-356

AI Summary AI Mindmap
PDF

116

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/