Article ID Journal Published Year Pages File Type
448290 Computer Communications 2010 9 Pages PDF
Abstract

Delay-tolerant networks (DTNs) are characterized by low connectivity and/or unreliable links. Messages are delivered by intermediaries who donate their resources to the system. If these resources are not managed they can be abused by resource hogs, i.e., individuals whose message generation rate is much higher than the average.In this paper we first show through simulation that uncontrolled resource hogs can substantially reduce the proportion of successfully delivered non-hog messages. To combat this problem we employ a basic technique based on coarse-grained priority classes. User or node authentication can be one basis for constructing such classes: for example, messages from certain verifiable senders are assigned to a higher priority class.The basic technique effectively deals with strangers who act as resource hogs but cannot counter verifiable senders who exhibit resource hog behavior. We extend the basic technique into three fine-grained solutions for dealing with such “insider” hogs and show the effectiveness of each in restoring message delivery ratio to the scenario where no resource hogs are present.

Related Topics
Physical Sciences and Engineering Computer Science Computer Networks and Communications
Authors
, , , , ,