Controlling resource hogs in mobile delay-tolerant networks

  • Authors:
  • John Solis;N. Asokan;Kari Kostiainen;Philip Ginzboorg;Jörg Ott

  • Affiliations:
  • University of California, Irvine Donald Bren School of Information and Computer Science Irvine, CA 92697, USA;Nokia Research Center, P.O. Box 407, FI-00045 NOKIA GROUP, Finland;Nokia Research Center, P.O. Box 407, FI-00045 NOKIA GROUP, Finland;Nokia Research Center, P.O. Box 407, FI-00045 NOKIA GROUP, Finland;Helsinki University of Technology, Networking Laboratory, P.O. Box 1000, FI-02015 TKK, Finland

  • Venue:
  • Computer Communications
  • Year:
  • 2010

Quantified Score

Hi-index 0.24

Visualization

Abstract

Delay-tolerant networks (DTNs) are characterized by low connectivity and/or unreliable links. Messages are delivered by intermediaries who donate their resources to the system. If these resources are not managed they can be abused by resource hogs, i.e., individuals whose message generation rate is much higher than the average. In this paper we first show through simulation that uncontrolled resource hogs can substantially reduce the proportion of successfully delivered non-hog messages. To combat this problem we employ a basic technique based on coarse-grained priority classes. User or node authentication can be one basis for constructing such classes: for example, messages from certain verifiable senders are assigned to a higher priority class. The basic technique effectively deals with strangers who act as resource hogs but cannot counter verifiable senders who exhibit resource hog behavior. We extend the basic technique into three fine-grained solutions for dealing with such ''insider'' hogs and show the effectiveness of each in restoring message delivery ratio to the scenario where no resource hogs are present.