Social Norm Incentives for Network Coding in Manets
The performance of mobile ad hoc network transmissions subject to disruption, loss, interference, and jamming can be significantly improved with the use of network coding (NC). However, NC requires extra work for forwarders, including additional bandwidth consumption due to transmitting overheads fo...
Saved in:
Published in | IEEE/ACM transactions on networking Vol. 25; no. 3; pp. 1761 - 1774 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.06.2017
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
ISSN | 1063-6692 1558-2566 |
DOI | 10.1109/TNET.2017.2656059 |
Cover
Abstract | The performance of mobile ad hoc network transmissions subject to disruption, loss, interference, and jamming can be significantly improved with the use of network coding (NC). However, NC requires extra work for forwarders, including additional bandwidth consumption due to transmitting overheads for redundant NC packets and additional processing due to generating the NC packets. Selfish forwarders may prefer to simply forward packets without coding them to avoid such overhead. This is especially true when network coding must be protected from pollution attacks, which involves additional, often processor intensive, pollution detection procedures. To drive selfish nodes to cooperate and encode the packets, this paper introduces social norm-based incentives. The social norm consists of a social strategy and a reputation system with reward and punishment connected with node behavior. Packet coding and forwarding are modeled and formalized as a repeated NC forwarding game. The conditions for the sustainability (or compliance) of the social norm are identified, and a sustainable social norm that maximizes the social utility is designed via selecting the optimal design parameters, including the social strategy, reputation threshold, reputation update frequency, and the generation size of network coding. For this game, the impacts of packet loss rate and transmission patterns on performance are evaluated, and their impacts on the decision of selecting the optimal social norm are discussed. Finally, practical issues, including distributed reputation dissemination and the existence of altruistic and malicious users, are discussed. |
---|---|
AbstractList | The performance of mobile ad hoc network transmissions subject to disruption, loss, interference, and jamming can be significantly improved with the use of network coding (NC). However, NC requires extra work for forwarders, including additional bandwidth consumption due to transmitting overheads for redundant NC packets and additional processing due to generating the NC packets. Selfish forwarders may prefer to simply forward packets without coding them to avoid such overhead. This is especially true when network coding must be protected from pollution attacks, which involves additional, often processor intensive, pollution detection procedures. To drive selfish nodes to cooperate and encode the packets, this paper introduces social norm-based incentives. The social norm consists of a social strategy and a reputation system with reward and punishment connected with node behavior. Packet coding and forwarding are modeled and formalized as a repeated NC forwarding game. The conditions for the sustainability (or compliance) of the social norm are identified, and a sustainable social norm that maximizes the social utility is designed via selecting the optimal design parameters, including the social strategy, reputation threshold, reputation update frequency, and the generation size of network coding. For this game, the impacts of packet loss rate and transmission patterns on performance are evaluated, and their impacts on the decision of selecting the optimal social norm are discussed. Finally, practical issues, including distributed reputation dissemination and the existence of altruistic and malicious users, are discussed. |
Author | Chuchu Wu Gerla, Mario van der Schaar, Mihaela |
Author_xml | – sequence: 1 surname: Chuchu Wu fullname: Chuchu Wu email: wuchuchu@cs.ucla.edu organization: Teradata Corp., El Segundo, CA, USA – sequence: 2 givenname: Mario surname: Gerla fullname: Gerla, Mario email: gerla@cs.ucla.edu organization: Dept. of Comput. Sci., Univ. of California at Los Angeles, Los Angeles, CA, USA – sequence: 3 givenname: Mihaela surname: van der Schaar fullname: van der Schaar, Mihaela email: mihaela@ee.ucla.edu organization: Dept. of Electr. Eng., Univ. of California at Los Angeles, Los Angeles, CA, USA |
BookMark | eNp9kE1PAjEURRujiYD-AONmEteD_WDa6dIQVBLEhbhuOu0bU4QW26Lx3zsTiAsXrt5b3HNvcobo1AcPCF0RPCYEy9vVcrYaU0zEmPKK40qeoAGpqrqkFeen3Y85KzmX9BwNU1pjTBimfIDYSzBOb4pliNti7g347D4hFW2IxRLyV4jvxTRY598K54sn7SGnC3TW6k2Cy-Mdodf72Wr6WC6eH-bTu0VpqGS5ZI0GwnQrtSBtY2vLmQRuNW8qIvWEM2spGA3GYGZabNmkMaaRVpi6aXQt2AjdHHp3MXzsIWW1Dvvou0lFiZhMBJek7lLkkDIxpBShVbvotjp-K4JV70b1blTvRh3ddIz4wxiXdXbB56jd5l_y-kA6APhdEnXVC2Y_KSdz0g |
CODEN | IEANEP |
CitedBy_id | crossref_primary_10_1109_ACCESS_2021_3051976 crossref_primary_10_1109_TCSS_2020_2964284 crossref_primary_10_52846_ami_v48i1_1414 crossref_primary_10_1109_TCOMM_2021_3049123 crossref_primary_10_1109_TNET_2020_3018448 crossref_primary_10_3390_s21030716 |
Cites_doi | 10.1109/ICCNC.2014.6785326 10.1145/501158.501193 10.1109/INFOCOM.2008.199 10.1109/JSAC.2008.080927 10.1109/TNET.2003.818197 10.1109/TIT.2006.883636 10.1109/TIT.2002.807285 10.1109/SECON.2012.6275815 10.1145/1529282.1529575 10.1109/ICDCS.2004.1281619 10.1016/j.image.2012.02.003 10.1145/1952982.1952989 10.1007/978-3-540-89894-8_34 10.1109/INFCOM.2003.1209220 10.1145/1374618.1374658 10.1109/INFCOM.2010.5461952 10.1145/1287853.1287865 10.1145/345910.345955 10.1007/978-3-540-45126-6_2 10.1109/INFCOM.2009.5062036 10.1109/INFCOM.2011.5935317 10.1145/2184751.2184815 10.2307/2297925 10.1109/18.850663 10.1145/775240.775242 10.1016/j.comnet.2015.03.010 10.1109/MCOM.2005.1470831 10.1145/1190195.1190197 10.1145/988772.988788 10.1109/NETCOD.2009.5191388 10.1016/j.adhoc.2009.02.005 10.1287/isre.1060.0092 10.1016/j.jnca.2010.12.016 10.1109/INFCOM.2010.5462003 10.1109/ITWNIT.2009.5158560 10.1145/1060745.1060808 10.1109/TC.2010.162 10.1109/NETCOD.2012.6261905 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2017 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2017 |
DBID | 97E RIA RIE AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
DOI | 10.1109/TNET.2017.2656059 |
DatabaseName | IEEE Xplore (IEEE) IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Technology Research Database |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1558-2566 |
EndPage | 1774 |
ExternalDocumentID | 10_1109_TNET_2017_2656059 7851063 |
Genre | orig-research |
GroupedDBID | -DZ -~X .DC 0R~ 29I 4.4 5GY 5VS 6IK 85S 8US 97E 9M8 AAJGR AAKMM AALFJ AARMG AASAJ AAWTH AAWTV ABAZT ABPPZ ABQJQ ABVLG ACGFS ACGOD ACIWK ACM ADBCU ADL AEBYY AEFXT AEJOY AENSD AETEA AETIX AFWIH AFWXC AGQYO AGSQL AHBIQ AI. AIBXA AIKLT AKJIK AKQYR AKRVB ALLEH ALMA_UNASSIGNED_HOLDINGS ATWAV BDXCO BEFXN BFFAM BGNUA BKEBE BPEOZ CCLIF CS3 D0L EBS EJD FEDTE GUFHI HF~ HGAVV HZ~ H~9 I07 ICLAB IEDLZ IES IFIPE IFJZH IPLJI JAVBF LAI LHSKQ M43 MVM O9- OCL P1C P2P PQQKQ RIA RIE RNS ROL TN5 UPT UQL VH1 XOL YR2 ZCA AAYOK AAYXX CITATION RIG 7SC 7SP 8FD JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c293t-3bae13af9a71fbd8d639e6da6b519a463dd2ecaecc03cf0d34bccb9d7c8bba873 |
IEDL.DBID | RIE |
ISSN | 1063-6692 |
IngestDate | Mon Jun 30 03:08:35 EDT 2025 Tue Jul 01 01:49:21 EDT 2025 Thu Apr 24 23:04:07 EDT 2025 Tue Aug 26 17:05:17 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 3 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c293t-3bae13af9a71fbd8d639e6da6b519a463dd2ecaecc03cf0d34bccb9d7c8bba873 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0003-3145-231X |
PQID | 2174476918 |
PQPubID | 32020 |
PageCount | 14 |
ParticipantIDs | crossref_primary_10_1109_TNET_2017_2656059 crossref_citationtrail_10_1109_TNET_2017_2656059 ieee_primary_7851063 proquest_journals_2174476918 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2017-June 2017-6-00 20170601 |
PublicationDateYYYYMMDD | 2017-06-01 |
PublicationDate_xml | – month: 06 year: 2017 text: 2017-June |
PublicationDecade | 2010 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | IEEE/ACM transactions on networking |
PublicationTitleAbbrev | TNET |
PublicationYear | 2017 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | adams (ref35) 2005 ref13 ref34 ref12 ref37 ref15 ref14 buchegger (ref18) 2004 ref31 buchegger (ref36) 2003 ref30 ref33 ref11 ref32 ref10 ref2 ref1 ref39 ref17 ref38 ref16 ref19 jakobsson (ref28) 2003 ben salem (ref27) 2003 ref24 ref45 ref23 shevade (ref25) 2008 xu (ref26) 2012 ref20 ref42 ref41 ref22 ref44 ref21 ref43 ref29 ref8 ref7 ref9 ref3 ref6 ref5 ref40 lee (ref4) 2011 |
References_xml | – year: 2003 ident: ref36 article-title: A robust reputation system for mobile ad-hoc networks – ident: ref6 doi: 10.1109/ICCNC.2014.6785326 – ident: ref22 doi: 10.1145/501158.501193 – start-page: 13 year: 2003 ident: ref27 article-title: A charging and rewarding scheme for packet forwarding in multi-hop cellular networks publication-title: Proc ACM MobiCom – ident: ref5 doi: 10.1109/INFOCOM.2008.199 – ident: ref8 doi: 10.1109/JSAC.2008.080927 – ident: ref2 doi: 10.1109/TNET.2003.818197 – ident: ref7 doi: 10.1109/TIT.2006.883636 – ident: ref3 doi: 10.1109/TIT.2002.807285 – ident: ref42 doi: 10.1109/SECON.2012.6275815 – ident: ref45 doi: 10.1145/1529282.1529575 – ident: ref23 doi: 10.1109/ICDCS.2004.1281619 – ident: ref17 doi: 10.1016/j.image.2012.02.003 – start-page: 169 year: 2012 ident: ref26 article-title: Designing incentives for wireless relay networks using tokens publication-title: Proc Int Symp Model Optim Mobile Ad-Hoc Wireless Netw (WiOpt) – ident: ref40 doi: 10.1145/1952982.1952989 – ident: ref21 doi: 10.1007/978-3-540-89894-8_34 – ident: ref29 doi: 10.1109/INFCOM.2003.1209220 – ident: ref9 doi: 10.1145/1374618.1374658 – ident: ref24 doi: 10.1109/INFCOM.2010.5461952 – ident: ref33 doi: 10.1145/1287853.1287865 – ident: ref13 doi: 10.1145/345910.345955 – start-page: 15 year: 2003 ident: ref28 article-title: A micro-payment scheme encouraging collaboration in multi-hop cellular networks publication-title: Proc Financial Crypto doi: 10.1007/978-3-540-45126-6_2 – ident: ref41 doi: 10.1109/INFCOM.2009.5062036 – ident: ref31 doi: 10.1109/INFCOM.2011.5935317 – ident: ref30 doi: 10.1145/2184751.2184815 – ident: ref12 doi: 10.2307/2297925 – ident: ref1 doi: 10.1109/18.850663 – ident: ref20 doi: 10.1145/775240.775242 – ident: ref43 doi: 10.1016/j.comnet.2015.03.010 – ident: ref14 doi: 10.1109/MCOM.2005.1470831 – ident: ref32 doi: 10.1145/1190195.1190197 – ident: ref19 doi: 10.1145/988772.988788 – start-page: 1 year: 2011 ident: ref4 article-title: Quantitative evaluation of secure network coding using homomorphic signature/hashing publication-title: Proc NetCod – ident: ref11 doi: 10.1109/NETCOD.2009.5191388 – ident: ref15 doi: 10.1016/j.adhoc.2009.02.005 – ident: ref16 doi: 10.1287/isre.1060.0092 – start-page: 1 year: 2004 ident: ref18 article-title: A robust reputation system for P2P and mobile ad-hoc networks publication-title: Proc P2PEcon – ident: ref38 doi: 10.1016/j.jnca.2010.12.016 – ident: ref37 doi: 10.1109/INFCOM.2010.5462003 – start-page: 303 year: 2005 ident: ref35 article-title: Calculating a node's reputation in a mobile ad hoc network publication-title: Proc 24th IEEE Int Perform Comput Commun Conf (IPCCC) – ident: ref10 doi: 10.1109/ITWNIT.2009.5158560 – start-page: 238 year: 2008 ident: ref25 article-title: Incentive-aware routing in DTNs publication-title: Proc IEEE ICNP – ident: ref44 doi: 10.1145/1060745.1060808 – ident: ref34 doi: 10.1109/TC.2010.162 – ident: ref39 doi: 10.1109/NETCOD.2012.6261905 |
SSID | ssj0013026 |
Score | 2.280731 |
Snippet | The performance of mobile ad hoc network transmissions subject to disruption, loss, interference, and jamming can be significantly improved with the use of... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 1761 |
SubjectTerms | Ad hoc networks Bandwidths Coding Design parameters Disruption Encoding Game theory Games incentive design Incentives Jamming Microprocessors Mobile ad hoc networks Mobile communication systems Network coding Packet transmission Peer-to-peer computing Pollution Pollution detection reputation scheme Reputations Social norms Streaming media Sustainability Wireless networks |
Title | Social Norm Incentives for Network Coding in Manets |
URI | https://ieeexplore.ieee.org/document/7851063 https://www.proquest.com/docview/2174476918 |
Volume | 25 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NS8MwFH9sO-nBrylOp-TgSWzXNlmaHGU4hrCeNtit5BNE6cR1HvzrTdpuDhXxVmgSQt7re7_0vfd7ADc0NrFlkjvrR3FAmGCBSGIcUKscWuAxsRVZ9TSjkzl5XAwXLbjb1sIYY6rkMxP6xyqWr5dq7X-VDXwjebdkG9pOzepara-IQVS1VvPvA0p50kQw44gPZtnDzCdxpWHiqWY8LemOD6qaqvywxJV7GR_CdLOxOqvkOVyXMlQf3zgb_7vzIzhocCa6rxXjGFqmOIH9HfbBLuC6NBdlDrYiZyd83tC7WSEHY1FWZ4ej0dL7NvRUoKkoTLk6hfn4YTaaBE0PhUA5R14GWAoTY2G5SGMrNdMOkRiqBZUOuglCsdaJUcIJMsLKRhoTqZTkOlVMSsFSfAadYlmYc0DSKpJaQSJmh8RElmOqudFcOakSxZIeRJtTzVVDMO77XLzk1UUj4rkXRO4FkTeC6MHtdsprza7x1-CuP9jtwOZMe9DfiC5vvr9V7i9aJKU8Zhe_z7qEPb92nfTVh075tjZXDl6U8rrSq09dL8tb |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwED2VMgAD34hCAQ9MiJQkdh17RBVVgTZTkdgif0oIlCKaMvDrsZO0VIAQWwbbse45vnfx-R3AOY1MZJnkbvejOCBMsEDEEQ6oVY4t8IjYUqx6lNLBA7l77D424HJxF8YYUyafmY5_LM_y9UTN_K-yK19I3g25AqtdF1Uk1W2trzODsCyu5lsElPK4PsOMQn41Tm_GPo0r6cRebMYLky55obKsyo-9uHQw_S0YzadW5ZU8d2aF7KiPb6qN_537NmzWTBNdV0tjBxom34WNJf3BPcDV5VyUOuKK3E7hM4fezRQ5IovSKj8c9Sbeu6GnHI1EborpPjz0b8a9QVBXUQiUc-VFgKUwERaWiySyUjPtOImhWlDpyJsgFGsdGyUclCFWNtSYSKUk14liUgqW4ANo5pPcHAKSVpHEChIy2yUmtBxTzY3myuFKFItbEM6tmqlaYtxXunjJylAj5JkHIvNAZDUQLbhYdHmt9DX-arznDbtoWNu0Be05dFn9BU4zH2qRhPKIHf3e6wzWBuPRMBvepvfHsO7fU6WAtaFZvM3MiSMbhTwt19gnOlLOrQ |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Social+Norm+Incentives+for+Network+Coding+in+Manets&rft.jtitle=IEEE%2FACM+transactions+on+networking&rft.au=Wu%2C+Chuchu&rft.au=Gerla%2C+Mario&rft.au=van+der+Schaar%2C+Mihaela&rft.date=2017-06-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=1063-6692&rft.eissn=1558-2566&rft.volume=25&rft.issue=3&rft.spage=1761&rft_id=info:doi/10.1109%2FTNET.2017.2656059&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1063-6692&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1063-6692&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1063-6692&client=summon |