2020
DOI: 10.1002/dac.4377
|View full text |Cite
|
Sign up to set email alerts
|

An evolutionary bargaining‐based approach for incentivized cooperation in opportunistic networks

Abstract: Opportunistic networking enables users to communicate in an environment where connectivity is intermittent or unstable. However, such networking scheme assumes that mobile nodes voluntary cooperate, which cannot be guaranteed. Some nodes can simply exhibit selfish behavior and thus diminish the effectiveness of the approach. In this paper, a game scenario is formulated in which the nodes try to convince each other to participate in packets forwarding. Each node is considered as a player in this game. When a no… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 39 publications
0
2
0
Order By: Relevance
“…Furthermore, authors in [125] have considered three types of attacks, namely Sybil attacks, tampering message attacks, and packet loss profits attacks [126], [127], and three aspects of privacy, namely data, social at-tributes, and transaction privacy. Indeed, the authors presented an incentive-based data forwarding technique to increase message transmission efficiency in IoV while protecting vehicle users' private information.…”
Section: A Game Theoretic-based Approaches For Security and Privacy I...mentioning
confidence: 99%
“…Furthermore, authors in [125] have considered three types of attacks, namely Sybil attacks, tampering message attacks, and packet loss profits attacks [126], [127], and three aspects of privacy, namely data, social at-tributes, and transaction privacy. Indeed, the authors presented an incentive-based data forwarding technique to increase message transmission efficiency in IoV while protecting vehicle users' private information.…”
Section: A Game Theoretic-based Approaches For Security and Privacy I...mentioning
confidence: 99%
“…In such a case, nodes are compensated for their contribution in offering services to other nodes. However, having said that, the node in which requests the help of other nodes in forwarding packets, will utilize the same payment method in order to pay for these services (Nazih, Benamar, & Younis, 2020;Ojha, Jackowski, Snášel, & Abraham, 2014).…”
Section: Credit-based Schemesmentioning
confidence: 99%