Skip to main content
Top
Published in: The Journal of Supercomputing 9/2021

01-03-2021

cRedit-based and reputation retrieval system

Authors: Yung-Ting Chuang, Jia-Jun Tsai

Published in: The Journal of Supercomputing | Issue 9/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The challenge of a mobile ad-hoc network (MANET) or hybrid wireless network (HWN) is that every node must rely on others to forward its messages, but selfish nodes might refuse to forward those messages or move to other subnetworks at any time, thus degrading network speed and retrieval efficiency. This paper presents a system called “cRedit-based and Reputation Retrieval system” that employs a distributed message transmission protocol to avoid censorship problems, forwarding and reliable routing algorithms to ensure reliable message routing, reputation and credit algorithms to encourage greater cooperation incentives, location and refresh algorithms to deal with nodes’ limited view even in high-churn network, and a protection algorithm to address the problem of selfish nodes. A series of experiments confirmed the system’s effectiveness in achieving superior network scalability, high retrieval rates, low transmission costs, and mobility resilience in hybrid wireless networks.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Akbani R, Korkmaz T, Raju GV (2012) Emltrust: an enhanced machine learning based reputation system for manets. Ad Hoc Netw 10(3):435–457CrossRef Akbani R, Korkmaz T, Raju GV (2012) Emltrust: an enhanced machine learning based reputation system for manets. Ad Hoc Netw 10(3):435–457CrossRef
2.
go back to reference Anderegg L, Eidenbenz S (2003) Ad hoc-vcg: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. In Proceedings of the 9th Annual International Conference on Mobile Computing and Networking, pp 245–259. ACM Anderegg L, Eidenbenz S (2003) Ad hoc-vcg: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. In Proceedings of the 9th Annual International Conference on Mobile Computing and Networking, pp 245–259. ACM
3.
go back to reference Balakrishnan K, Deng J, Varshney VK (2005) Twoack: preventing selfishness in mobile ad hoc networks. In IEEE Wireless Communications and Networking Conference, 2005, volume 4, pp 2137–2142. IEEE Balakrishnan K, Deng J, Varshney VK (2005) Twoack: preventing selfishness in mobile ad hoc networks. In IEEE Wireless Communications and Networking Conference, 2005, volume 4, pp 2137–2142. IEEE
4.
go back to reference Bansal S, Baker M (2003) Observation-based cooperation enforcement in ad hoc networks. arXiv preprint cs/0307012 Bansal S, Baker M (2003) Observation-based cooperation enforcement in ad hoc networks. arXiv preprint cs/0307012
6.
go back to reference Brownlee KA, Brownlee KA (1965) Statistical theory and methodology in science and engineering, vol 150. Wiley, New YorkMATH Brownlee KA, Brownlee KA (1965) Statistical theory and methodology in science and engineering, vol 150. Wiley, New YorkMATH
7.
go back to reference Buchegger S, Boudec JL (2003) The effect of rumor spreading in reputation systems for mobile ad-hoc networks. In WiOpt’03: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, p 10 Buchegger S, Boudec JL (2003) The effect of rumor spreading in reputation systems for mobile ad-hoc networks. In WiOpt’03: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, p 10
8.
go back to reference Buchegger S, Boudec J-YL (2002) Performance analysis of the confidant protocol. In Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing, pp 226–236 Buchegger S, Boudec J-YL (2002) Performance analysis of the confidant protocol. In Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing, pp 226–236
9.
go back to reference Buchegger S, Boudec J-YL (2003) A robust reputation system for mobile ad-hoc networks. Technical report Buchegger S, Boudec J-YL (2003) A robust reputation system for mobile ad-hoc networks. Technical report
10.
go back to reference Buttyán L, Hubaux J-P (2000) Enforcing service availability in mobile ad-hoc wans. In Proceedings of the 1st ACM International Symposium on Mobile Ad Hoc Networking & Computing, pp 87–96. IEEE Press Buttyán L, Hubaux J-P (2000) Enforcing service availability in mobile ad-hoc wans. In Proceedings of the 1st ACM International Symposium on Mobile Ad Hoc Networking & Computing, pp 87–96. IEEE Press
11.
go back to reference Buttyán L, Hubaux J-P (2003) Stimulating cooperation in self-organizing mobile ad hoc networks. Mob Netw App 8(5):579–592CrossRef Buttyán L, Hubaux J-P (2003) Stimulating cooperation in self-organizing mobile ad hoc networks. Mob Netw App 8(5):579–592CrossRef
12.
go back to reference Chelani PL, Bagde ST (2016) Detecting collaborative attacks by malicious nodes in manet: an improved bait detection scheme. In 2016 International Conference on Communication and Electronics Systems (ICCES), pp 1–6. IEEE Chelani PL, Bagde ST (2016) Detecting collaborative attacks by malicious nodes in manet: an improved bait detection scheme. In 2016 International Conference on Communication and Electronics Systems (ICCES), pp 1–6. IEEE
13.
go back to reference Chen L, Libman L, Leneutre J (2010) Conflicts and incentives in wireless cooperative relaying: a distributed market pricing framework. IEEE Trans Parallel Distrib Syst 22(5):758–772CrossRef Chen L, Libman L, Leneutre J (2010) Conflicts and incentives in wireless cooperative relaying: a distributed market pricing framework. IEEE Trans Parallel Distrib Syst 22(5):758–772CrossRef
14.
go back to reference Chen T, Bansal A, Zhong S (2011) A reputation system for wireless mesh networks using network coding. J Netw Computer Appl 34(2):535–541CrossRef Chen T, Bansal A, Zhong S (2011) A reputation system for wireless mesh networks using network coding. J Netw Computer Appl 34(2):535–541CrossRef
15.
go back to reference Chen T, Wu F, Zhong S (2011) Fits: a finite-time reputation system for cooperation in wireless ad hoc networks. IEEE Trans Computers 60(7):1045–1056MathSciNetCrossRef Chen T, Wu F, Zhong S (2011) Fits: a finite-time reputation system for cooperation in wireless ad hoc networks. IEEE Trans Computers 60(7):1045–1056MathSciNetCrossRef
16.
go back to reference Cho J, Haas ZJ (2004) On the throughput enhancement of the downstream channel in cellular radio networks through multihop relaying. IEEE J Sel Areas Commun 22(7):1206–1219CrossRef Cho J, Haas ZJ (2004) On the throughput enhancement of the downstream channel in cellular radio networks through multihop relaying. IEEE J Sel Areas Commun 22(7):1206–1219CrossRef
17.
go back to reference Cho SW (2015) P2p-based mobile social networks. In 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), pp 141–145. IEEE Cho SW (2015) P2p-based mobile social networks. In 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), pp 141–145. IEEE
18.
go back to reference Chomhaill TN, McKelvey N, Curran K, Subaginy N (2015) Internet censorship in China. In: Khosrow-Pour Mehdi (ed) Encyclopedia of information science and technology, 3rd edn. Hershey, PA Chomhaill TN, McKelvey N, Curran K, Subaginy N (2015) Internet censorship in China. In: Khosrow-Pour Mehdi (ed) Encyclopedia of information science and technology, 3rd edn. Hershey, PA
19.
go back to reference Clarke I, Sandberg O, Wiley B, Hong T (2001) Freenet: A distributed anonymous information storage and retrieval system. In Proceedings of the Workshop on Design Issues in Anonymity and Unobservability, pp 46–66, Berkeley, CA, July 2001 Clarke I, Sandberg O, Wiley B, Hong T (2001) Freenet: A distributed anonymous information storage and retrieval system. In Proceedings of the Workshop on Design Issues in Anonymity and Unobservability, pp 46–66, Berkeley, CA, July 2001
20.
go back to reference Crowcroft J, Gibbens R, Kelly F, Östring S (2004) Modelling incentives for collaboration in mobile ad hoc networks. Perform Eval 57(4):427–439CrossRef Crowcroft J, Gibbens R, Kelly F, Östring S (2004) Modelling incentives for collaboration in mobile ad hoc networks. Perform Eval 57(4):427–439CrossRef
21.
go back to reference Dewan P, Dasgupta P, Bhattacharya A (2004) On using reputations in ad hoc networks to counter malicious nodes. In Parallel and Distributed Systems, 2004. ICPADS 2004. Proceedings. Tenth International Conference on, pp 665–672. IEEE Dewan P, Dasgupta P, Bhattacharya A (2004) On using reputations in ad hoc networks to counter malicious nodes. In Parallel and Distributed Systems, 2004. ICPADS 2004. Proceedings. Tenth International Conference on, pp 665–672. IEEE
22.
go back to reference Feller W (1968) An introduction to probability theory and its applications. John Wiley, New JerseyMATH Feller W (1968) An introduction to probability theory and its applications. John Wiley, New JerseyMATH
23.
go back to reference Ferreira RA, Ramanathan MK, Awan A, Grama A, Jagannathan S (2005) Search with probabilistic guarantees in unstructured peer-to-peer networks. In Proceedings of 5th IEEE International Conference on Peer-to-Peer Computing, pp 165–172, Konstanz, Germany, August Ferreira RA, Ramanathan MK, Awan A, Grama A, Jagannathan S (2005) Search with probabilistic guarantees in unstructured peer-to-peer networks. In Proceedings of 5th IEEE International Conference on Peer-to-Peer Computing, pp 165–172, Konstanz, Germany, August
25.
go back to reference Gupta A, Malhotra D, Awasthi LK (2008) Neighbortrust: A trust-based scheme for countering distributed denial-of-service attacks in p2p networks. In 2008 16th IEEE International Conference on Networks, pp 1–6. IEEE Gupta A, Malhotra D, Awasthi LK (2008) Neighbortrust: A trust-based scheme for countering distributed denial-of-service attacks in p2p networks. In 2008 16th IEEE International Conference on Networks, pp 1–6. IEEE
26.
go back to reference He Q, Wu D, Khosla P (2004) Sori: a secure and objective reputation-based incentive scheme for ad-hoc networks. In Wireless Communications and Networking Conference, 2004. WCNC. 2004 IEEE, volume 2, pp 825–830. IEEE He Q, Wu D, Khosla P (2004) Sori: a secure and objective reputation-based incentive scheme for ad-hoc networks. In Wireless Communications and Networking Conference, 2004. WCNC. 2004 IEEE, volume 2, pp 825–830. IEEE
27.
go back to reference Hsieh H-Y, Sivakumar R (2002) A hybrid network model for cellular wireless packet data networks. In Global Telecommunications Conference, 2002. GLOBECOM’02. IEEE, volume 1, pp 961–966. IEEE Hsieh H-Y, Sivakumar R (2002) A hybrid network model for cellular wireless packet data networks. In Global Telecommunications Conference, 2002. GLOBECOM’02. IEEE, volume 1, pp 961–966. IEEE
28.
go back to reference Hsu Y-C, Lin Y-D (2002) Multihop cellular: a novel architecture for wireless data communications. J Commun Netw 4(1):30–39CrossRef Hsu Y-C, Lin Y-D (2002) Multihop cellular: a novel architecture for wireless data communications. J Commun Netw 4(1):30–39CrossRef
30.
go back to reference Isdal T, Piatek M, Krishnamurthy A, Anderson T (2010) Privacy preserving P2P data sharing with OneSwarm. In Proceedings of the ACM SIGCOMM Conference, pp 111–122, New Delhi, India, September Isdal T, Piatek M, Krishnamurthy A, Anderson T (2010) Privacy preserving P2P data sharing with OneSwarm. In Proceedings of the ACM SIGCOMM Conference, pp 111–122, New Delhi, India, September
31.
go back to reference Jakobsson M, Hubaux J-P, Buttyán L (2003) A micro-payment scheme encouraging collaboration in multi-hop cellular networks. In International Conference on Financial Cryptography, pp 15–33. Springer Jakobsson M, Hubaux J-P, Buttyán L (2003) A micro-payment scheme encouraging collaboration in multi-hop cellular networks. In International Conference on Financial Cryptography, pp 15–33. Springer
32.
go back to reference Janzadeh H, Fayazbakhsh K, Dehghan M, Fallah MS (2009) A secure credit-based cooperation stimulating mechanism for manets using hash chains. Future Gener Computer Syst 25(8):926–934CrossRef Janzadeh H, Fayazbakhsh K, Dehghan M, Fallah MS (2009) A secure credit-based cooperation stimulating mechanism for manets using hash chains. Future Gener Computer Syst 25(8):926–934CrossRef
33.
go back to reference Karp B, Kung H-T (2000) Gpsr: Greedy perimeter stateless routing for wireless networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp 243–254 Karp B, Kung H-T (2000) Gpsr: Greedy perimeter stateless routing for wireless networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp 243–254
34.
go back to reference Kelényi I, Nurminen JK (2008) Optimizing energy consumption of mobile nodes in heterogeneous kademlia-based distributed hash tables. In 2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies, pp 70–75. IEEE Kelényi I, Nurminen JK (2008) Optimizing energy consumption of mobile nodes in heterogeneous kademlia-based distributed hash tables. In 2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies, pp 70–75. IEEE
35.
go back to reference Lacey TH, Mills RF, Mullins BE, Raines RA, Oxley ME, Rogers SK (2012) Ripsec-using reputation-based multilayer security to protect manets. Computers Secur 31(1):122–136CrossRef Lacey TH, Mills RF, Mullins BE, Raines RA, Oxley ME, Rogers SK (2012) Ripsec-using reputation-based multilayer security to protect manets. Computers Secur 31(1):122–136CrossRef
36.
go back to reference Le L, Hossain E (2007) Multihop cellular networks: potential gains, research challenges, and a resource allocation framework. IEEE Commun Mag 45(9):66–73CrossRef Le L, Hossain E (2007) Multihop cellular networks: potential gains, research challenges, and a resource allocation framework. IEEE Commun Mag 45(9):66–73CrossRef
37.
go back to reference Leskovec J, Rajaraman A, Ullman JD (2014) Mining of massive datasets. Cambridge University Press, CambridgeCrossRef Leskovec J, Rajaraman A, Ullman JD (2014) Mining of massive datasets. Cambridge University Press, CambridgeCrossRef
38.
go back to reference Li J, Jannotti J, De Couto DSJ, Karger DR, Morris R (2000) A scalable location service for geographic ad hoc routing. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp 120–130. ACM Li J, Jannotti J, De Couto DSJ, Karger DR, Morris R (2000) A scalable location service for geographic ad hoc routing. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp 120–130. ACM
39.
go back to reference Li P, Fang Y (2009) Impacts of topology and traffic pattern on capacity of hybrid wireless networks. IEEE Trans Mobile Computing 8(12):1585–1595CrossRef Li P, Fang Y (2009) Impacts of topology and traffic pattern on capacity of hybrid wireless networks. IEEE Trans Mobile Computing 8(12):1585–1595CrossRef
40.
go back to reference Li P, Huang X, Fang Y (2011) Capacity scaling of multihop cellular networks. In INFOCOM, 2011 Proceedings IEEE, pages 2831–2839. IEEE Li P, Huang X, Fang Y (2011) Capacity scaling of multihop cellular networks. In INFOCOM, 2011 Proceedings IEEE, pages 2831–2839. IEEE
41.
go back to reference Li P, Zhang C, Fang Y (2009) Capacity and delay of hybrid wireless broadband access networks. IEEE J Sel Areas Commun 27(2):117–125CrossRef Li P, Zhang C, Fang Y (2009) Capacity and delay of hybrid wireless broadband access networks. IEEE J Sel Areas Commun 27(2):117–125CrossRef
42.
go back to reference Li Y, Ephremides A (2007) A joint scheduling, power control, and routing algorithm for ad hoc wireless networks. Ad Hoc Netw 5(7):959–973CrossRef Li Y, Ephremides A (2007) A joint scheduling, power control, and routing algorithm for ad hoc wireless networks. Ad Hoc Netw 5(7):959–973CrossRef
43.
go back to reference Liu K, Deng J, Varshney PK, Balakrishnan K (2007) An acknowledgment-based approach for the detection of routing misbehavior in manets. IEEE Trans Mobile Computing 6(5):536–550CrossRef Liu K, Deng J, Varshney PK, Balakrishnan K (2007) An acknowledgment-based approach for the detection of routing misbehavior in manets. IEEE Trans Mobile Computing 6(5):536–550CrossRef
44.
go back to reference Lorenzo B, Glisic S (2013) Context-aware nanoscale modeling of multicast multihop cellular networks. IEEE/ACM Trans Netw (TON) 21(2):359–372CrossRef Lorenzo B, Glisic S (2013) Context-aware nanoscale modeling of multicast multihop cellular networks. IEEE/ACM Trans Netw (TON) 21(2):359–372CrossRef
45.
go back to reference Manikandan E, Muthukumarasamy S, Thanigaivelu K (2016) Stratified report assisted reputation administration (sra) system for manets. In 2016 International Conference on Information Communication and Embedded Systems (ICICES), pp 1–5. IEEE Manikandan E, Muthukumarasamy S, Thanigaivelu K (2016) Stratified report assisted reputation administration (sra) system for manets. In 2016 International Conference on Information Communication and Embedded Systems (ICICES), pp 1–5. IEEE
46.
go back to reference Marbach P, Qiu Y (2005) Cooperation in wireless ad hoc networks: a market-based approach. IEEE/ACM Trans Netw 13(6):1325–1338CrossRef Marbach P, Qiu Y (2005) Cooperation in wireless ad hoc networks: a market-based approach. IEEE/ACM Trans Netw 13(6):1325–1338CrossRef
47.
go back to reference Marti S, Giuli TJ, Lai K, Baker M (2000) Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp 255–265. ACM Marti S, Giuli TJ, Lai K, Baker M (2000) Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp 255–265. ACM
48.
go back to reference Maymounkov P, Mazieres D (2002) Kademlia: A peer-to-peer information system based on the xor metric. In International Workshop on Peer-to-Peer Systems, pp 53–65. Springer Maymounkov P, Mazieres D (2002) Kademlia: A peer-to-peer information system based on the xor metric. In International Workshop on Peer-to-Peer Systems, pp 53–65. Springer
49.
go back to reference Michiardi P, Molva R (2002) Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Advanced communications and multimedia security, pages 107–121. Springer Michiardi P, Molva R (2002) Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Advanced communications and multimedia security, pages 107–121. Springer
50.
go back to reference Mischke J, Stiller B (2004) A methodology for the design of distributed search in P2P middleware. IEEE Netw 18(1):30–37CrossRef Mischke J, Stiller B (2004) A methodology for the design of distributed search in P2P middleware. IEEE Netw 18(1):30–37CrossRef
51.
go back to reference Moser LE, Melliar-Smith PM (2013) Probabilistic analysis of message forwarding. In Proceedings of the IEEE International Conference on Computer Communications and Networks, Nassau, Bahamas, July Moser LE, Melliar-Smith PM (2013) Probabilistic analysis of message forwarding. In Proceedings of the IEEE International Conference on Computer Communications and Networks, Nassau, Bahamas, July
52.
go back to reference Niculescu D, Nath B (2003) Ad hoc positioning system (aps) using aoa. In INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, volume 3, pp 1734–1743. Ieee Niculescu D, Nath B (2003) Ad hoc positioning system (aps) using aoa. In INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, volume 3, pp 1734–1743. Ieee
53.
go back to reference Perkins CE, Royer EM (1999) Ad-hoc on-demand distance vector routing. In Proceedings WMCSA’99. Second IEEE Workshop on Mobile Computing Systems and Applications, pp 90–100. IEEE Perkins CE, Royer EM (1999) Ad-hoc on-demand distance vector routing. In Proceedings WMCSA’99. Second IEEE Workshop on Mobile Computing Systems and Applications, pp 90–100. IEEE
54.
go back to reference Perloff JM (2016) Microeconomics: theory and applications with calculus. Pearson, London Perloff JM (2016) Microeconomics: theory and applications with calculus. Pearson, London
55.
go back to reference Poovila G, Kavitha NS, Philip JM (2016) Improving throughput in hybrid wireless networks using p2p based market guided distributed routing mechanism. In 2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS), vol 1, pp 1–6. IEEE Poovila G, Kavitha NS, Philip JM (2016) Improving throughput in hybrid wireless networks using p2p based market guided distributed routing mechanism. In 2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS), vol 1, pp 1–6. IEEE
56.
go back to reference Press WH, Teukolsky SA, Vetterling WT, Flannery BP (2007) Numerical recipes in Fortran: the art of scientific computing. Cambridge University Press, Cambridge, United KingdomMATH Press WH, Teukolsky SA, Vetterling WT, Flannery BP (2007) Numerical recipes in Fortran: the art of scientific computing. Cambridge University Press, Cambridge, United KingdomMATH
57.
go back to reference Pushpa AM (2009) Trust based secure routing in aodv routing protocol. In 2009 IEEE International Conference on Internet Multimedia Services Architecture and Applications (IMSAA), pp 1–6. IEEE Pushpa AM (2009) Trust based secure routing in aodv routing protocol. In 2009 IEEE International Conference on Internet Multimedia Services Architecture and Applications (IMSAA), pp 1–6. IEEE
58.
go back to reference Ratnasamy S, Karp B, Shenker S, Estrin D, Govindan R, Yin L, Yu F (2003) Data-centric storage in sensornets with ght, a geographic hash table. Mobile Netw Appl 8(4):427–442CrossRef Ratnasamy S, Karp B, Shenker S, Estrin D, Govindan R, Yin L, Yu F (2003) Data-centric storage in sensornets with ght, a geographic hash table. Mobile Netw Appl 8(4):427–442CrossRef
59.
go back to reference Refaei MT, DaSilva LA, Eltoweissy M, Nadeem T (2010) Adaptation of reputation management systems to dynamic network conditions in ad hoc networks. IEEE Trans Computers 59(5):707–719MathSciNetCrossRef Refaei MT, DaSilva LA, Eltoweissy M, Nadeem T (2010) Adaptation of reputation management systems to dynamic network conditions in ad hoc networks. IEEE Trans Computers 59(5):707–719MathSciNetCrossRef
60.
go back to reference Ripeanu M (2001) Peer-to-peer architecture case study: Gnutella network. In Proceedings First International Conference on Peer-to-Peer Computing, pp 99–100. IEEE Ripeanu M (2001) Peer-to-peer architecture case study: Gnutella network. In Proceedings First International Conference on Peer-to-Peer Computing, pp 99–100. IEEE
61.
go back to reference Risson J, Moors T (2006) Survey of research towards robust peer-to-peer networks: search methods. Computer Netw: Int J Computer Telecommun Netw 50(17):3485–3521CrossRef Risson J, Moors T (2006) Survey of research towards robust peer-to-peer networks: search methods. Computer Netw: Int J Computer Telecommun Netw 50(17):3485–3521CrossRef
62.
go back to reference Schollmeier R (2001) A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications. In Proceedings First International Conference on Peer-to-Peer Computing, pp 101–102. IEEE Schollmeier R (2001) A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications. In Proceedings First International Conference on Peer-to-Peer Computing, pp 101–102. IEEE
63.
go back to reference Shah N, Qian D (2011) An efficient unstructured p2p overlay over manet using underlying proactive routing. In Mobile Ad-hoc and Sensor Networks (MSN), 2011 Seventh International Conference on, pp 248–255. IEEE Shah N, Qian D (2011) An efficient unstructured p2p overlay over manet using underlying proactive routing. In Mobile Ad-hoc and Sensor Networks (MSN), 2011 Seventh International Conference on, pp 248–255. IEEE
64.
go back to reference Sharma P, Souza D, Fiore E, Gottschalk J, Marquis D (2012) A case for manet-aware content centric networking of smartphones. In World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2012 IEEE International Symposium on a, pp 1–6. IEEE Sharma P, Souza D, Fiore E, Gottschalk J, Marquis D (2012) A case for manet-aware content centric networking of smartphones. In World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2012 IEEE International Symposium on a, pp 1–6. IEEE
65.
go back to reference Shen H, Li Z (2008) Arm: An account-based hierarchical reputation management system for wireless ad hoc networks. In 2008 The 28th International Conference on Distributed Computing Systems Workshops, pp 370–375. IEEE Shen H, Li Z (2008) Arm: An account-based hierarchical reputation management system for wireless ad hoc networks. In 2008 The 28th International Conference on Distributed Computing Systems Workshops, pp 370–375. IEEE
66.
go back to reference Shen H, Li Z, Yu L (2014) A p2p-based market-guided distributed routing mechanism for high-throughput hybrid wireless networks. IEEE Trans Mob Computing 14(2):245–260CrossRef Shen H, Li Z, Yu L (2014) A p2p-based market-guided distributed routing mechanism for high-throughput hybrid wireless networks. IEEE Trans Mob Computing 14(2):245–260CrossRef
67.
go back to reference Shin W-Y, Jeon S-W, Devroye N, Vu MH, Chung S-Y, Lee YH, Tarokh V (2011) Improved capacity scaling in wireless networks with infrastructure. IEEE Trans Inf Theory 57(8):5088–5102MathSciNetCrossRef Shin W-Y, Jeon S-W, Devroye N, Vu MH, Chung S-Y, Lee YH, Tarokh V (2011) Improved capacity scaling in wireless networks with infrastructure. IEEE Trans Inf Theory 57(8):5088–5102MathSciNetCrossRef
68.
go back to reference Stoica I, Morris R, Karger D, Kaashoek MF, Balakrishnan H (2001) Chord: A scalable peer-to-peer lookup service for Internet applications. In Proceedings of the ACM SIGCOMM Conference on Applications, Technologies, Architectures and Protocols for Computer Communications, pp 149–160, San Diego, CA, August Stoica I, Morris R, Karger D, Kaashoek MF, Balakrishnan H (2001) Chord: A scalable peer-to-peer lookup service for Internet applications. In Proceedings of the ACM SIGCOMM Conference on Applications, Technologies, Architectures and Protocols for Computer Communications, pp 149–160, San Diego, CA, August
69.
go back to reference Thakur UK, Dethe CG (2017) Routing protocol in hybrid wireless network which increases quality of service. In 2017 International Conference on Information, Communication, Instrumentation and Control (ICICIC), pp 1–4. IEEE Thakur UK, Dethe CG (2017) Routing protocol in hybrid wireless network which increases quality of service. In 2017 International Conference on Information, Communication, Instrumentation and Control (ICICIC), pp 1–4. IEEE
70.
go back to reference Thakurta PKG, Sett S (2015) An approach towards identification of malicious nodes in mobile ad hoc networks. In 2015 2nd International Conference on Signal Processing and Integrated Networks (SPIN), pp 1016–1019. IEEE Thakurta PKG, Sett S (2015) An approach towards identification of malicious nodes in mobile ad hoc networks. In 2015 2nd International Conference on Signal Processing and Integrated Networks (SPIN), pp 1016–1019. IEEE
71.
go back to reference Tsoumakos D, Roussopoulos N (2003) A comparison of peer-to-peer search methods. In Proceedings of the Sixth International Workshop on the Web and Databases, pp 61–66, San Diego, CA, June Tsoumakos D, Roussopoulos N (2003) A comparison of peer-to-peer search methods. In Proceedings of the Sixth International Workshop on the Web and Databases, pp 61–66, San Diego, CA, June
72.
go back to reference Varshney T, Sharma T, Sharma P (2014) Implementation of watchdog protocol with aodv in mobile ad hoc network. In 2014 Fourth International Conference on Communication Systems and Network Technologies, pp 217–221. IEEE Varshney T, Sharma T, Sharma P (2014) Implementation of watchdog protocol with aodv in mobile ad hoc network. In 2014 Fourth International Conference on Communication Systems and Network Technologies, pp 217–221. IEEE
73.
go back to reference Wang C, Jiang C, Li X-Y, Liu Y (2011) On multicast throughput scaling of hybrid wireless networks with general node density. Computer Netw 55(15):3548–3561CrossRef Wang C, Jiang C, Li X-Y, Liu Y (2011) On multicast throughput scaling of hybrid wireless networks with general node density. Computer Netw 55(15):3548–3561CrossRef
74.
go back to reference Wei H-y, Gitlin RD (2004) Two-hop-relay architecture for next-generation wwan/wlan integration. IEEE Wirel Commun Mag 11(2):24–30CrossRef Wei H-y, Gitlin RD (2004) Two-hop-relay architecture for next-generation wwan/wlan integration. IEEE Wirel Commun Mag 11(2):24–30CrossRef
75.
go back to reference Wong B, Guha S (2008) Quasar: A probabilistic publish-subscribe system for social networks. In Proceedings of the 7th International Workshop on Peer-to-Peer Systems, Tampa Bay, FL, February Wong B, Guha S (2008) Quasar: A probabilistic publish-subscribe system for social networks. In Proceedings of the 7th International Workshop on Peer-to-Peer Systems, Tampa Bay, FL, February
76.
go back to reference Wu S-H, Sheu J-P, King C-T (2012) Unilateral wakeup for mobile ad hoc networks with group mobility. IEEE Trans Mob Computing 12(12):2507–2517CrossRef Wu S-H, Sheu J-P, King C-T (2012) Unilateral wakeup for mobile ad hoc networks with group mobility. IEEE Trans Mob Computing 12(12):2507–2517CrossRef
77.
go back to reference Wu Y, Min G, Yang LT (2013) Performance analysis of hybrid wireless networks under bursty and correlated traffic. IEEE Trans Veh Technol 62(1):449–454CrossRef Wu Y, Min G, Yang LT (2013) Performance analysis of hybrid wireless networks under bursty and correlated traffic. IEEE Trans Veh Technol 62(1):449–454CrossRef
78.
go back to reference Yang BB, Garcia-Molina H (2003) Designing a super-peer network. In Proceedings 19th International Conference on Data Engineering (Cat. No. 03CH37405), pp 49–60. IEEE Yang BB, Garcia-Molina H (2003) Designing a super-peer network. In Proceedings 19th International Conference on Data Engineering (Cat. No. 03CH37405), pp 49–60. IEEE
79.
go back to reference Yang G, Weber S (2011) Uisce: Characteristic-based routing in mobile ad hoc networks. In 2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop, pp 119–122. IEEE Yang G, Weber S (2011) Uisce: Characteristic-based routing in mobile ad hoc networks. In 2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop, pp 119–122. IEEE
80.
go back to reference Zhang G, Xu Y, Wang X, Guizani M (2010) Capacity of hybrid wireless networks with directional antenna and delay constraint. IEEE Trans Commun 58(7):2097–2106CrossRef Zhang G, Xu Y, Wang X, Guizani M (2010) Capacity of hybrid wireless networks with directional antenna and delay constraint. IEEE Trans Commun 58(7):2097–2106CrossRef
81.
go back to reference Zhong S, Chen J, Yang YR (2003) Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. In INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, vol 3, pp 1987–1997. IEEE Zhong S, Chen J, Yang YR (2003) Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. In INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, vol 3, pp 1987–1997. IEEE
82.
go back to reference Zöls S, Schollmeier R, Kellerer W, Tarlano A (2005) The hybrid chord protocol: A peer-to-peer lookup service for context-aware mobile applications. In International Conference on Networking, pp 781–792. Springer Zöls S, Schollmeier R, Kellerer W, Tarlano A (2005) The hybrid chord protocol: A peer-to-peer lookup service for context-aware mobile applications. In International Conference on Networking, pp 781–792. Springer
83.
go back to reference Zong B, Xu F, Jiao J, Lv J (2009) A broker-assisting trust and reputation system based on artificial neural network. In Systems, Man and Cybernetics, 2009. SMC 2009. IEEE International Conference on, pp 4710–4715. IEEE Zong B, Xu F, Jiao J, Lv J (2009) A broker-assisting trust and reputation system based on artificial neural network. In Systems, Man and Cybernetics, 2009. SMC 2009. IEEE International Conference on, pp 4710–4715. IEEE
Metadata
Title
cRedit-based and reputation retrieval system
Authors
Yung-Ting Chuang
Jia-Jun Tsai
Publication date
01-03-2021
Publisher
Springer US
Published in
The Journal of Supercomputing / Issue 9/2021
Print ISSN: 0920-8542
Electronic ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-021-03675-x

Other articles of this Issue 9/2021

The Journal of Supercomputing 9/2021 Go to the issue

Premium Partner