Skip to content

Research at St Andrews

IRONMAN: Using social networks to add incentives and reputation to opportunistic networks

Research output: Contribution to conferencePaperpeer-review

Standard

IRONMAN: Using social networks to add incentives and reputation to opportunistic networks. / Bigwood, Gregory John; Henderson, Tristan.

2011. 65-72 Paper presented at The Third IEEE International Conference on Social Computing (SocialCom), Boston, United States.

Research output: Contribution to conferencePaperpeer-review

Harvard

Bigwood, GJ & Henderson, T 2011, 'IRONMAN: Using social networks to add incentives and reputation to opportunistic networks', Paper presented at The Third IEEE International Conference on Social Computing (SocialCom), Boston, United States, 9/10/11 - 11/10/11 pp. 65-72. https://doi.org/10.1109/PASSAT/SocialCom.2011.60

APA

Bigwood, G. J., & Henderson, T. (2011). IRONMAN: Using social networks to add incentives and reputation to opportunistic networks. 65-72. Paper presented at The Third IEEE International Conference on Social Computing (SocialCom), Boston, United States. https://doi.org/10.1109/PASSAT/SocialCom.2011.60

Vancouver

Bigwood GJ, Henderson T. IRONMAN: Using social networks to add incentives and reputation to opportunistic networks. 2011. Paper presented at The Third IEEE International Conference on Social Computing (SocialCom), Boston, United States. https://doi.org/10.1109/PASSAT/SocialCom.2011.60

Author

Bigwood, Gregory John ; Henderson, Tristan. / IRONMAN: Using social networks to add incentives and reputation to opportunistic networks. Paper presented at The Third IEEE International Conference on Social Computing (SocialCom), Boston, United States.8 p.

Bibtex - Download

@conference{cddff804bf6543eaad13498ba547571b,
title = "IRONMAN: Using social networks to add incentives and reputation to opportunistic networks",
abstract = "Opportunistic networks enable users to communicate in the absence of network infrastructure. But forwarding messages in such a network incurs costs for nodes in terms of energy and storage. This may lead to nodes being selfish and not forwarding messages for other nodes, resulting in degraded network performance. This paper presents a novel incentive mechanism for opportunistic networks that uses pre-existing social-network information to detect and punish selfish nodes,incentivising them to participate in the network. Trace-driven simulations demonstrate that our mechanism performs better than existing mechanisms, and that social-network information can also be used to improve existing incentive mechanisms.",
author = "Bigwood, {Gregory John} and Tristan Henderson",
note = "Paper published in IEEE Proceedings of SocialCom 2011.; The Third IEEE International Conference on Social Computing (SocialCom) ; Conference date: 09-10-2011 Through 11-10-2011",
year = "2011",
month = oct,
day = "9",
doi = "10.1109/PASSAT/SocialCom.2011.60",
language = "English",
pages = "65--72",

}

RIS (suitable for import to EndNote) - Download

TY - CONF

T1 - IRONMAN: Using social networks to add incentives and reputation to opportunistic networks

AU - Bigwood, Gregory John

AU - Henderson, Tristan

N1 - Paper published in IEEE Proceedings of SocialCom 2011.

PY - 2011/10/9

Y1 - 2011/10/9

N2 - Opportunistic networks enable users to communicate in the absence of network infrastructure. But forwarding messages in such a network incurs costs for nodes in terms of energy and storage. This may lead to nodes being selfish and not forwarding messages for other nodes, resulting in degraded network performance. This paper presents a novel incentive mechanism for opportunistic networks that uses pre-existing social-network information to detect and punish selfish nodes,incentivising them to participate in the network. Trace-driven simulations demonstrate that our mechanism performs better than existing mechanisms, and that social-network information can also be used to improve existing incentive mechanisms.

AB - Opportunistic networks enable users to communicate in the absence of network infrastructure. But forwarding messages in such a network incurs costs for nodes in terms of energy and storage. This may lead to nodes being selfish and not forwarding messages for other nodes, resulting in degraded network performance. This paper presents a novel incentive mechanism for opportunistic networks that uses pre-existing social-network information to detect and punish selfish nodes,incentivising them to participate in the network. Trace-driven simulations demonstrate that our mechanism performs better than existing mechanisms, and that social-network information can also be used to improve existing incentive mechanisms.

UR - http://www.iisocialcom.org/conference/socialcom2011/index.html

U2 - 10.1109/PASSAT/SocialCom.2011.60

DO - 10.1109/PASSAT/SocialCom.2011.60

M3 - Paper

SP - 65

EP - 72

T2 - The Third IEEE International Conference on Social Computing (SocialCom)

Y2 - 9 October 2011 through 11 October 2011

ER -

Related by author

  1. Data portability as a tool for audit

    Zwiebelmann, Z. & Henderson, T., 25 Sep 2021, Adjunct Proceedings of the Ubicomp Workshop on Reviewable and Auditable Pervasive Systems (WRAPS). ACM, 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. Data protection for the common good: developing a framework for a data protection-focused data commons

    Wong, J., Henderson, T. & Ball, K., 15 Sep 2020, Data for Policy Conference 2020. Data for Policy, 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Automating dynamic consent decisions for the processing of social media data in health research

    Norval, C. & Henderson, T., Jul 2020, In: Journal of Empirical Research on Human Research Ethics. 15, 3, p. 187-201

    Research output: Contribution to journalArticlepeer-review

  4. Short paper: Integrating the data protection impact assessment into the software development lifecycle

    Irvine, C., Balasubramaniam, D. & Henderson, T., 2020, Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2020 International Workshops, DPM 2020 and CBT 2020, Guildford, UK, September 17–18, 2020, Revised Selected Papers. Garcia-Alfaro, J., Navarro-Arribas, G. & Herrera-Joancomarti, J. (eds.). Cham: Springer, p. 219-228 (Lecture Notes in Computer Science (including subseries Security and Cryptology); vol. 12484 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

ID: 12386768

Top