Next Article in Journal
Spatial Evolution of Skewness and Kurtosis of Unidirectional Extreme Waves Propagating over a Sloping Beach
Next Article in Special Issue
A Vulnerability Centric System of Systems Analysis on the Maritime Transportation Sector Most Valuable Assets: Recommendations for Port Facilities and Ships
Previous Article in Journal
Dynamic Changes in Port Logistics Caused by the COVID-19 Pandemic
Previous Article in Special Issue
Absorptive Turbulent Seawater and Parameter Optimization of Perfect Optical Vortex for Optical Communication
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Capacity Analysis of Incentive Schemes in Opportunistic Networks

College of Information Engineering, Shanghai Maritime University, Shanghai 201306, China
*
Author to whom correspondence should be addressed.
J. Mar. Sci. Eng. 2022, 10(10), 1474; https://doi.org/10.3390/jmse10101474
Submission received: 21 August 2022 / Revised: 25 September 2022 / Accepted: 2 October 2022 / Published: 11 October 2022
(This article belongs to the Special Issue Advanced Research in Shipping Informatics and Communications)

Abstract

:
Many incentive schemes address the selfishness issue in opportunistic networks and show performance improvement by simulations. However, the insights of incentive schemes that affect network performance are not clear. Network capacity analysis can reveal how factors affect performance, which is a guideline for new designs. To analyze incentive schemes, a well-defined mathematical model is necessary, which cannot be achieved by existing analytical models based on empirical formulas or types of incentive schemes. First, this paper proposes such a model to show the incentive degree with the incentive scheme, cooperation degree, energy usage, buffer usage, and security based on a quantum game model. Verification compares the model with delivery ratios that show impacts on selfish nodes in simulations under two typical incentive schemes. Then, network capacity is analyzed with this model and a sparse clustering regime that has similar mobility to opportunistic networks in order to show factors for future designs.

1. Introduction

Mobility affects network capacity, which refers to the maximum achievable throughput due to the dynamic cooperation of nodes. Mobile models are discussed often [1]. For instance, sparse clustering regimes show that grouping nodes can increase the cooperation degree, and trading throughput for delay in clusters does not decrease network capacity as a whole [2]. While these studies usually assume nodes are rational, the cooperation degree may decrease due to selfish nodes, especially in opportunistic networks where end-to-end paths between sources and destinations change over time and are occasionally even disrupted [3]. Incentive schemes force nodes to forward messages in order to avoid long waits for the next opportunity, which increases co-operation as a way to prompt delivery ratios and decrease end-to-end contact times. To design more efficient incentive schemes, it is important to discuss factors affecting performance. This paper analyzes network capacity, with incentive schemes as the goal. In addition, our study can be applied to filter candidates for schemes that raise prediction-based, hybrid, or other networks with opportunistic networks such as opportunistic routing based on prediction [4].
To analyze network capacity, a mathematical model of incentive schemes is necessary for sufficient insight. Existing incentive schemes only show improvement by simulations, and existing analyatical models are not detailed enough. For example, a framework for multiple-criteria decision-making problem to rank protocol performance [5] lacks numerical formulas involving parameters. Game theory has been used to state nodes’ strategies to analyze network traffic in transmission control protocol (TCP) with selfish nodes and peer-to-peer (P2P) networks with free-riding problem [6,7], and several analytical models for different categories based on classical game theory have been proposed [8,9,10] which do not find common characters of incentive schemes. A generic model can be built with quantum game theory [11], as quantum game theory extends the strategy space to search for optimal strategies in a wider range and uses the concept of entanglement to depict the complex interaction among nodes accurately in the decision-making process. A model with these features can evaluate most incentive schemes and reveal their common character. However, the above model uses an empirical utility formula and focuses on numerical analysis, which simply places datasets into the model without other comparisons. In other words, the model does not have enough factors to work as a guideline to design new incentive schemes.
A well-defined formula should consider the characteristics of incentive schemes as well as other factors that affect cooperation. A node usually spends payoff, such as virtual money, reputation, exchanging messages, or something else, to stimulate others to forwarding, which can obtain the necessary currency. Cost and reward can represent an incentive scheme in a mathematical model with other properties of nodes. Several incentive schemes take energy usage and buffer usage into account. Therefore, this paper proposes an analytical model based on quantum game theory considering the energy usage and buffer usage, reward, cost, and cooperation degree, which shows the incentive degree and compares incentive degrees with the delivery ratio by simulations.
Network capacity analysis using the proposed model shows the impact of incentive schemes on network performance. During analysis, a mobile model in opportunistic networks is needed as well. The sparse clustering regime is similar to the mobility of opportunistic networks with nodes that work in groups with high cooperation possibility and clusters that move randomly where communications in groups are stable and movement is otherwise needed for opportunities. Furthermore, the scheduling policy is similar to the scenario in [4] for nautical wireless ad hoc networks. Therefore, the analytical model for incentive schemes is applied to a sparse clustering regime to analyze network capacity and discuss various factors.
As a summary, the contributions of this paper are as follows: (1) An analytical model based on quantum game theory considering the energy usage, buffer usage, reward, cost and cooperation degree is proposed. It is verified by a comparison between the incentive degree and delivery ratios according to simulations. (2) Network capacity is analyzed with the above model to show how incentive schemes affect network performance. The factors can be used as a guideline for designing efficient incentive schemes by considering these relations.
The rest of this paper is organized as follows. The mathematical model is detailed in Section 2. Verification with simulations is described in Section 3. Network capacity is analyzed with the model and sparse clustering regime in Section 4. The factors are discussed in Section 5. Finally, we conclude the paper in Section 6.

2. Mathematical Model for Incentive Schemes

2.1. Typical Incentive Schemes

Before detailing the mathematical model, we briefly touch on typical incentive schemes to see what can be taken into account. Most existing incentive schemes are reputation-based or credit-based [10]. They use currency-like metrics to reveal the participation degree for nodes forwarding messages [12].
In credit-based schemes, relay nodes can obtain credits by forwarding messages, then send their own messages with these additional credits. The better design and calculation of reward and price remains a challenge. Payoff according to the time-to-live of a message has been proposed in [12], which is direct to price difference. A Markov chain can be used to calculate price according to the society degree, selfish degree, and cooperation degree with buffer, energy, and interaction to stimulate nodes with high possibility [13]. The clearance credit center rewards relay nodes with extra credits to avoid nodes being unable to obtain enough credits to send messages due to selfish nodes who hold most credits and are not willing to forward messages. Therefore, attackers are not considered in our model or in other similar proposals, such as [8,10].
Other incentive schemes, such as reputation-based ones, usually replace credits with internal bounds for the same purpose. Punishment is used to restrain free-riding nodes in peer-to-peer (P2P) networks via game theory [7]. Grouping nodes by bilinear pairing and cooperation probability prediction has been proposed in [14]. Evolutionary game theory replaces the classical theory for more precise cooperation evaluation [15]. With the exception of node behaviour under different policies, these bounds, such as cooperation probability, are similar to credits both in usage and principle. Thanks to the extended strategy space in quantum game theory, it is possible to simply consider increasing bounds as rewards and decreasing bounds as costs.
An environment involving movement path, link quality, and others can affect communications as a main domain. However, these do not affect incentive schemes directly, which is shown simply by a scenario argument without detailed considerations in the following analysis.
To sum up, for an analytical model, the cost and reward function can represent an incentive scheme. Other parameters such as buffer and energy can be considered as a part of cost, as they may reduce the cooperation degree. A simple argument briefly summarizes the impact of the environment. Furthermore, interactions among nodes must be considered, which can be solved by a quantum game model and Nash equilibrium.

2.2. Quantum Game Model

The proposed model has two parts, as shown in Figure 1. The quantum game model depicts how an incentive scheme motivates cooperation, and the utility formula $ m describes how a node is served. The utility formula $ m , including the energy usage, buffer usage, and degree of security, accepts an incentive policy IP and entanglement λ as arguments. In both the quantum game model and the utility formula, λ communicates with a quantum game model to describe incentive processes. Therefore, the optimal value $ * is computed by the quantum game model with Nash equilibrium.
Quantum game theory is more suitable for analyzing incentive schemes because of the concept of entanglement and the extended strategy space, as discussed in Section 1. First, we briefly describe quantum game theory based on [11], shown in Figure 2. The actions of players in a quantum game ae based on a specific set of strategies. The state of node m is represented by | v a c m , a state vector in a Hilbert space. The whole system state is | H = | H 1 | H 2 | H n .
If players are dependent, entanglement must be used to express the system state in the above product. Entangling gate J ^ ( λ ) with operation parameter x m defines how to combine the strategies of each node. This expresses how players affect others, such as encounters due to moving paths and selfish policies, especially in opportunistic networks; in our study, entanglement is considered as the cooperation degree. The model includes the following three stages:
  • The initial quantum state of the system is ψ i n i t = J ^ ( λ ) | v a c , achieved by entangling all nodes togather.
  • Node m operates on its state using unitary operator D ^ m with the feature D ^ m D ^ m = 1 .
  • With disentangling gate J ^ ( λ ) on the system, the final state is | ψ f i n = | J ( λ ) ( D 1 ^ D 2 ^ D n ^ ) J ^ ( λ ) | v a c .
Each definition and proof are detailed in [11]. After forwarding | ψ f i n to measurement, node m can quantize the relayed data to others as follows:
q m = x m n e ( n 1 ) λ + ( n 1 ) e λ + j = 1 , j m n x j n e ( n 1 ) λ e λ .
The optimal value x m * can be computed by a utility formula with the Nash equilibrium for impacts on nodes. The Nash equilibrium is defined as follows:
$ 1 x 1 = $ 2 x 2 = = $ n x n = 0 2 $ m x m 2 < 0 , m { 1 , 2 , , n } .
Then, the optimal strategy q m * and optimal utility $ m * can be calculated with x m * according to (1) and (3). The calculation depends on the utility formula, with the input incentive scheme to be discussed later. Then, we obtain a mathematical equation between an incentive scheme and $ * , which can be used for evaluatation and reveal the insight if the utility formula depicts factors correctly. Moreover, $ * is called the incentive degree in this study.

2.3. Utility Formula

The utility formula describes the incentive degree of a node with entanglement λ m , reward function r ( q m ) , cost function c ( q m ) , and constant cost c , as follows:
$ m = λ m q m r ( q m ) c ( q m ) c ,
where r ( q m ) is represented as the incentive scheme. According to the introduction of incentive schemes in Section 2.1, an incentive scheme consists of a reward function R ( q m ) and a price function P ( q m ) . The incentive degree is more dependent on their relation than each individual calculation, and the calculation makes the incentive process more rational and balanced. Therefore, in the utility formula, only the relationship between R ( q m ) and P ( q m ) is considered, as follows:
r ( q m ) = q m R ( q m ) P ( q m ) .
We show the correction with simulations in Section 3. Entanglement λ m means the cooperation degree determined by the scenario, such as selfish degrees, social groups, movement paths, etc., which can be avoided by fixing the entanglement in the model during analyses.
The cost constant c is for each transmission, such as the fixed energy consumption [16]. The cost function c ( q m ) describes what relay nodes have to pay for when transmissions succeed, which is made up of an energy cost E ( q m ) , buffer cost B ( q m ) , and security cost S ( q m ) , as follows:
c ( q m ) = E ( q m ) + B ( q m ) + S ( q m ) .
The security cost is simple:
S ( q m ) = s q m 2 ,
where s is the willingness to forward messages, determined by reasons such as security. Unlike entanglement λ , s is a node’s own attribute and is not affected by other nodes.
The incentive degree does not continue to increase with larger buffer size and energy capacity, as it is limited by the cooperation between nodes. For instance, a node can only forward messages to parts of others, even if it has infinite buffer and energy. Therefore, they should have asymptotic values. Furthermore, the slope change for the buffer is slower than that for energy, as the energy capacity grants a node the basic ability to participate in forwarding, instead of enough resources, such as buffer and the cooperation degree. To sum up, they are defined as follows:
E ( q m ) = E c E s 5 r ( q m ) and B ( q m ) = B c B s 3 r ( q m ) ,
where E c is the energy cost per message, E s is the energy capacity, B c is the buffer cost per message, and B s is the buffer size.

2.4. Model with Incentive Scheme

To obtain a model for a special incentive scheme, P ( q m ) and R ( q m ) should be defined in the utility formula, and the Nash equilibrium then applied to the qunatum game model with the utility formula.
Most incentive schemes are made up of a price function Z and reward function R. The two functions are usually independent on q m and λ m , especially in credit-based schemes. In these cases, P ( q m ) and R ( q m ) are linear functions of q m , which can be defined as
P ( q m ) = Z q m and R ( q m ) = R q m .
Now, we can calculate the analytical model. According to (8), the utility formula is expanded as follows:
$ m = λ m q m R Z q m E s E s 5 R Z q m B c B s 3 R Z q m s q m 2 c .
Then, we apply (2) to obtain
$ m x m = $ 1 x 1 = $ 2 x 2 = = $ n x n = q m x m λ 2 s q m R Z E c E s 5 + B c B s 3 + 1 = 0 ,
where
q m x m = e ( n 1 ) λ + ( n 1 ) e λ n .
Because optimal strategies are the same under Nash equilibrium, represented as x 1 * = x 2 * = = x n * , we can obtaun x * with the above results as follows:
$ m x m = λ 2 s x * e ( n 1 ) λ E c E s 5 + B c B s 3 + 1 = 0
and
x * = λ E c E s 5 + B c B s 3 + 1 R Z 2 s e ( n 1 ) λ .
Substituting x * in q * yields
q * = x * e ( n 1 ) λ = λ R Z E c E s R Z B c B s R Z 2 s .
Then, $ * can be computed by (3), which shows the incentive degree’s relation with a special incentive scheme.

3. Verification of the Model with Simulations

The verification compares incentive degrees and delivery ratios with two typical incentive schemes, namely, the incentive and privacy-aware data dissemination scheme (IPAD) [12] and the probabilistic routing scheme based on game theory (PRGT) [13]. The two credit-based schemes use different calculation parameters. IPAD uses time-to-live for prices and degree of selfishness for rewards. PRGT evalutes social degrees and transmission history with a Markov chain to calculate prices and message importance for rewards. The following simulations are conducted by OMNet++ (https://omnetpp.org (accessed on 20 August 2022)) with the OPS framework (https://github.com/ComNets-Bremen/OPS (accessed on 20 August 2022)). The parameter setting is listed in Table 1 for maritime environments where communications are over long ranges, which is associated with sparse density of node points. Random movement is selected because it is the part of mobile model in the latter network capacity analysis used to show the average theoretically. Nodes’ selfish behavior is partly cooperative [17] in our simulations. Certain parameters, such as movement and the type of selfish behavior, are reflected by λ m indirectly.
Because successful transmissions in opportunistic networks are highly dependent on mobility and node forwarding, selfish nodes reduce delivery ratios [13] remarkably. Utility $ * represents the incentive degree, which can be reflected by delivery ratios in the network with selfish nodes. In comparison, the co-domain of $ * is rescaled with the same co-domain of delivery ratios due to the different scalars. The rescaled values are analyzed by mean square errors (MSE), as shown in Table 2 and Figure 3 and Figure 4. We analyze each of them in the following subsections. Another important metric for opportunistic networks is the contact time of the nodes. Because selfish nodes decrease contact times due to the lower forwarding rate and incentive schemes try to increase the rate shown by delivery ratios, it is implied in delivery ratios that there is a higher delivery ratio with a lower contact time if there are no extra factors, such as attackers.

3.1. Incentive Schemes

The message price per byte v in PRGT affects the message price and reward directly; thus, it is selected as an argument in this verification. For PRGT, $ * and delivery ratios from simulations are shown in Figure 3a.
In IPAD, the private selfish factor β is the parameter for analysis, and is used in the payoff function for incentive. With a larger β , a larger price is needed and nodes have to forward more messages to obtain credit for their own messages, as shown in Figure 4a. As a whole, the similar relations show the correctness and generality of r ( q m ) .
Furthermore, from $ * and delivery ratios, it can be found that the impact of parameters in incentive schemes is low. The main factor is the incentive strategy, represented by r ( q m ) . The $ * of PRGT is larger than that of IPAD, which means that the degree of incentive of PRGT is greater than that of IPAD in the same scenario.

3.2. Buffer Size

Similar to the previous verification, delivery ratios and $ * with buffer sizes are shown in Figure 3b and Figure 4b. The two similar relations suggest that buffer sizes can affect performance, and the proposed model reflects the realistic relationship with buffer size. Intuitively, message sizes have similar results as buffer sizes, because they are inversely proportional in the model and work together to store messages in simulations.
An increasing buffer size means that a node can forward more messages or a larger message at a time, however, the increase is slowed down because of the restriction of nodes’ movement paths. Therefore, too large a buffer size is useless for network performance unless used with a larger message size.

3.3. Energy Capacity

The selfish behavior caused by energy in simulations is that if the energy is lower than the safety value, forwarding is stopped unless nodes need credits. The energy capacity is set to simple values here instead of considering a real scenario for easier calculations and understanding. Delivery ratios and $ * with energy capacities are shown in Figure 3c and Figure 4c. These two similar relations suggest that this parameter can affect performance and the proposed model can reflect the realistic relationship.
Similar to messages size, the energy consumption per action has similar results to energy capacity, as they influence each other in the model and the simulations.

4. Capacity Analysis for Incentive Schemes

Network capacity can be analyzed with the proposed model by abstracting incentive schemes. For simplification, this analysis is based on an existing efficient mobile model of a sparse clustering regime [2], in which nodes’ behaviour resembles the opportunistic networks with social groups discussed in Section 1. The network model is introduced at first. then the capacity and factors are discussed.

4.1. Traffic Model

We assume all nodes communicate with others at the same rate λ .
Definition 1
(The throughput capacity of opportunistic networks). The throughput capacity λ is that nodes can sustain Θ ( f ( n ) ) bits per second if there are deterministic constants c > 0 and c < such that
lim n Pr [ λ ( n ) = c f ( n ) is feasible ] = 1 lim n Pr [ λ ( n ) = c f ( n ) is feasible ] < 1 .

4.2. Network Topolopy

The sparse clustering regime considers n nodes moving over a square with area n, and nodes are divided into m = Θ n v ( 0 v < 1 ) groups. Each group covers a disk with radius R = Θ n β . The average number of nodes per cluster is assumed as q = n / m = Θ n 1 v . When v + 2 β < 1 (i.e., m R 2 = o ( n ) ), the strong node cooperation in which communications are mainly dependent on mobility is considered as a sparse clustering regime.
The time is divided into slots. Cluster centers and nodes are independent and identically distributed (IID) and uniformly chosen among the whole network and their own cluster, respectively, at the beginning of each time slot. That is, each cluster center randomly selects a point in the network area as its new center and nodes randomly select positions in the contained cluster. Nodes transmit messages without movement.

4.3. Scheduling Policy

Nodes move in clusters and clusters move in the whole area such that different usage of high and low quality communications is exploited. The tradition models can be considered as all nodes under the same cluster with different node density. The scheduling policy defines how clusters work under the regime, which is shown in Figure 5.
  • A source creates relays R s in source cluster C s via multicast. The message is sent to a cluster C k ( k = 1 , , R c s ) by one-hop unicast when the cluster meet others.
  • Relays R k s are created in C k via broadcast. After clusters repeat these actions some number of times, the message reaches the destination cluster C d .
  • Relays R d s are created by broadcast in the destination cluster until the message is near to the destination node.
  • If the distance between the destination node and the current node is within a range l s , the message is transmitted via h s -hop unicast to reduce resource usage.

4.4. Transmission Protocol

If sources i and j want to send messages to destinations k and j, respectively, for an arbitrary other node k, the following equation should be satisfied [18]:
| X j X i | Δ 2 ( | X i X k | + | X j X l | ) ,
where X i is the position of i and | X i X j | is the distance between them. The basic inequation is often used in research directly, and is associated with incentive schemes similar to the physical model in [18].
To have transmissions, the incentive degree should have a lower bound, that is,
$ ( μ ) $ .
According to inequality properties, we have
$ k $ i + 1 $ $ + 1 .
If we assume successful transmission probabilities between nodes are the same, the closest node has the highest cooperation degree. Moreover, + 1 in the left formula has little impact on the inequation. Therefore, from the previous formula we can infer that
$ μ k | X k X j | α $ μ i | X i X j | α $ $ + 1 ,
where α is the distance decay and μ replaces entanglement λ in (3) to avoid conflicts with the throughput λ . After expanding $ ( μ ) , we have
| X i X j | α | X k X j | α μ k μ i $ $ + 1 .
In the worst situation, μ k μ i is equal to μ μ where μ is the maximum feasible entanglement in the scene and μ is the minimum feasible entanglement to lead to the emergence of communications in the scene which meets that μ > μ implies q * ( μ ) > 0 and $ * ( μ ) > 0 . Then, we have the inequation with the distance and incentive schemes:
| X k X j | μ μ $ + 1 $ 1 α | X i X j | = ( 1 + Δ ) | X i X j | ,
where Δ : = β P min P max 1 α 1 .

4.5. Upper Bound of Network Capacity

Different from the other studies, because Δ is deemed as a variable associated with incentive schemes by (21), it is not simplified during derivations. According to the interference restriction and the meeting probability among nodes and clusters, the amount of messages that can be transmitted in a time slot between clusters is O m R 2 Δ 2 if the transmission range is Θ R m n and the amount of messages in a cluster is the similar. Therefore, we can propose the following theorem:
Theorem 1
(Throughput capacity of incentive schemes). In a sparse clustering regime with incentive schemes, the throughput capacity can achieve Θ m R 2 Δ 2 and the upper bound can be reached if and only if the transmission range satisfies l i = Θ R m n , where i is a duplication in a cluster, and l i = Θ ( 1 ) , where i is a duplication between clusters. Each node can achieve Θ m R 2 n Δ 2 .
We dismiss the proof here for simplification, as it is similar to the proofs of Theorem 1 and Theorem 2 in [19].
The above conclusion does not consider the limited ratio resources that messages cannot be sent out due to congested channels when many nodes send messages simultaneously in the same area. If the channel capacity can transmit W bits per second during the whole network alive time T, each bit b at hth-hop satisfies
b = 1 λ n T h = 1 h ( b ) 1 W n T 2 W n T .
According to (16), there are no other nodes in the disk radius Δ 2 times transmission range. Each node consumes 1 n in area n averagely, thus, the summing area that source nodes consumes meets
b = 1 λ n T h = 1 h ( b ) S b W T ,
where S b is the area of bit b and h ( b ) is the hop of bit b. The following lemma can be achieved with the above idea:
Lemma 1
(Throughput inequation considering ratio resources). Considering ratio resources, the throughput of bit b under sparse cluster regime should meet the following inequation:
b = 1 λ s n T Δ 2 4 E [ R d b s ] 1 n + E b = 1 λ s n T h = 1 h b s + n R c b s m R 2 π Δ 2 4 l b h 2 m R 2 c 1 s W T log n ,
where c 1 s is a positive constant.
The proof is omitted for simplification as it is similar to Proposition 3 in [20] and Lemma 3.3 in [2]. With the above lemma and theorem, we can deduce the following theorem:
Theorem 2
(throughput capacity under sparse clustering regime with incentive schemes). In a sparse clustering regime, the throughput capacity with incentive schemes is
O min n log n m R 2 Δ 2 , m R 2 n Δ 2
and the upper bound can be achieved when
l = Θ R m n .
The proof is shown in Appendix A.

5. Factors Discussion

To design efficient incentive schemes with the formula, it is necessary to take a detailed discussion for each factor. The cooperation degree is introduced as an important factor for the incentive degree that provides a base of a network, as discussed in Section 2.1, so we discuss it first. Then, the mobility mode is analyzed because the capacity formula without incentive schemes should have the same result as the sparse clustering regime. Finally, each factor in utility $ * reveals impacts.

5.1. Cooperation Degree

As μ and μ in (21) are defined by the network environment, intuitively, Theorem 1 should meet lim Δ λ s = 0 and lim Δ 1 λ s = O m R 2 n . The first proposition is easily derived because lim μ $ = theoretically. When lim $ Δ = μ μ 1 α 1 = 1 , the second proposition is derived. It must be noted that μ has explicit upper and lower bounds in reality because nodes cannot communicate to others without restriction. Therefore, the real upper bound should consider the cooperation between nodes defined by network topology and mobility.

5.2. Mobility Mode

Without incentive schemes, m, R, and n, represented as mobility mode, are the main factors. The capacity defined in Theorem 2 is a minmum value from two formulas. To find the impactful range of each formula, the variation of network capacity versus the number of nodes is shown with results in Figure 6. With an increasing number of nodes, network capacity grows quickly at the beginning. It converges at last due to the limited ratio resources. The red vertical line is the break point represented as the ideal number of nodes in a special network. Here, m and R have corresponding results as above because they are inversely proportional to n.

5.3. Incentive Factors

In the following discussion under the two different formulas, the part from Theorem 1 in Theorem 2 is discarded for simplicity. The parameters used in analysis are listed in Table 3, and are selected according to simulations in Section 3 and cluster sparse regime [2].
How incentive schemes affect network capacity is shown in Figure 7. An incentive scheme usually tries its best to increase its incentive degree to reach a higher capacity. However, the decreasing rate of change suggests that throughput cannot increase infinitely. The limitation is restricted by the cooperation degree discussed in Section 5.1. Moreover, the incentive degree has its own extremum, as shown in Section 3. Therefore, thoughput can reach its limitation earlier.
The limitation can be observed obviously through the relation with buffer usage and energy usage. Similar to the analysis in Section 3, the message size and energy cost per message work with buffer size and energy capacity together. As such, only the latter are discussed here; the relations are shown in Figure 8 and Figure 9. The fact that they reach the limitation quickly suggests that both of them are the basic condition to ensure that nodes communicate. If a higher network capacity is needed, other factors should be adjusted to increase the achievable upper bound. According to this analysis, a suitable buffer and energy are more important; their value can be taken from our theorem.
The secure and incentive scheme can affect the achievable upper bound shown in Figure 10 and Figure 11. Both of them have negative effects on network capacity. However, we cannot reduce them discretionarily. A too low reward or a too high price may block communications between nodes due to insufficient credits. A too low security coefficient may bring attacks to nodes. With these conditions, the relations can help us to design incentive schemes to select rewards and evaluate the security coefficient for both a node and the network.

6. Conclusions

In this paper, we design a mathematical model based on a quantum game model involving node parameters and use this model with a sparse clustering regime to analyze network capacity with incentive schemes. The mathematical model reflects the incentive degree for an incentive scheme in opportunistic networks with selfish nodes, finding that the character of incentive schemes is mainly determined by the relationship between reward and cost. According to the capacity analysis, how the factors affects on capacity are aware. The formula can be a guideline for new efficient incentive schemes. However, only energy usage, buffer usage, and security are considered. Other parameters, such as messages alive time and how the environment affects entanglement, can be taken into account as well. The capacity analysis associates the transmission model with incentive schemes simply. In the future, a more powerful model should be raised to reveal more details. In addition to sparse clustering regimes, other mobility models can be analyzed with incentive schemes.

Author Contributions

Conceptualization, S.J. and R.F.; methodology, R.F.; software, R.F.; validation, R.F.; formal analysis, R.F.; investigation, R.F.; resources, R.F. and S.J.; data curation, R.F.; writing—original draft preparation, R.F.; writing—review and editing, S.J. and Z.Z.; visualization, R.F.; supervision, Shengming Jiang; project administration, S.J.; funding acquisition, S.J. All authors have read and agreed to the published version of the manuscript.

Funding

This research recevied was funded by The Innovation Program of Shanghai Municipal Education Commission of China, grant number 2021-01-07-00-10-E00121.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. Proof of Theorem 2

Applying Cauchy–Schwarz inequality to the second monomial in (24) obtains
b = 1 λ s n T h = 1 h b s + n R c b s m R 2 l b h 2 b = 1 λ s n T h = 1 h b s + n R c b s m R 2 1 b = 1 λ s n T h = 1 h b s + n R c b s m R 2 l b h W T n 2 b = 1 λ s n T h = 1 h b s + n R c b s m R 2 ( l b h ) 2 ,
where the last step is from (22). Then, we have
E b = 1 λ s n T h = 1 h b s + n R c b s m R 2 ( l b h ) 2 2 W T n E b = 1 λ s n T h = 1 h b s + n R c b s m R 2 ( l b h ) 2 .
Applying Jensen inequality to the above inequation obtains
2 W T n E b = 1 λ s n T h = 1 h b s + n R c b s m R 2 ( l b h ) 2 2 W T n E b = 1 λ s n T h = 1 h b s + n R c b s m R 2 ( l b h ) 2 ,
where l b s is the transimssion range of bit b from source s and r b s is the distance of each transmission between two nodes. For multi-hops, the following inequation is obvious:
h = 1 h b s l b h l b s .
Appling Jensen inequality yields
2 W T n E b = 1 λ s n T h = 1 h b s + n R c b s m R 2 ( l b h ) 2 2 W T n b = 1 λ s n T E [ l b s ] 2 E b = 1 λ s n T h = 1 h b s + n R c b s m R 2 ( l b h ) 2 2 W T n b = 1 λ s n T E [ l b s ] 2 .
Substituting the above formula into (24) yields
b = 1 λ s n T E [ R d b s ] 1 n + 2 π W T n m R 2 b = 1 λ s n T E [ l b s ] 2 4 c 1 s W T log n Δ 2 .
To continue the calculation, we should discuss R d b s . Let l b s ( t ) ^ be the minimum distance between the current cluster to C d in slot t. If the value is negative, there is an overlap between the current cluster and C d . For convenience, we define L b s ( t ) ^ = max ( 0 , l b s ( t ) ^ ) . For bit b, considering the network area and the transmission area of a cluster yields
E n [ R + L b s ( t ) ^ ] 2 = E n R 2 I L b s ( t ) 0 + E n [ R + l b s ( t ) ^ ] 2 I L b s ( t ) > 0 .
For the second monomial, we can obtain
E n [ R + l b s ( t ) ^ ] 2 I L b s ( t ) > 0 = 0 n n ( R + u ) 2 d Pr [ l b s ( t ) ^ u ] = 1 n R 2 Pr [ l b s ( t ) ^ 0 ] + 0 n 2 n ( R + u ) 3 Pr [ l b s ( t ) ^ u ] d u .
Therefore, the original inequation is
E n [ R + L b s ( t ) ^ ] 2 = 1 + R n 2 n u 3 Pr [ R + l b s ( t ) ^ u ] d u = 1 + R n 2 π R c b s ( t ) ( R + u ) 2 u 3 d u 1 + 6 π R c b s ( t ) R n 1 u d u = 1 + 6 π R c b s ( t ) log n R 1 + 6 π R c b s ( t ) log n 6 π R c b s ( t ) log n .
For a message under all slots, we have
E [ ( R + L b s ^ ) 2 ] ( R + l b s ) 2 E n [ R + L b s ^ ] 2 n ( R + l b s ) 2 n ( R + l b s ) 2 6 π R c b s log n R c b s n 6 π log n ( R + l b s ) 2 n 24 π log n R l b s .
Substituting the above inequation into (A1) yields
1 24 π log n R b = 1 λ s n T E [ l b s ] + 2 π W T n m R 2 b = 1 λ s n T E [ l b s ] 2 4 c 1 s W T log n Δ 2 .
If h b s < n R c b s m R 2 , the ratio resources consumption does not decrease with a decreasing number of hops due to the unchanging transmission range. In such a situation, we deem h b s = Θ ( n R c b s m R 2 ) , which is contained in the other situation and has the same result.
If h b s n R c b s m R 2 , we can calculate (A6) directly. If b = 1 λ s n T E [ l b s ] < λ s T m R 2 , the first monomial has little impact on the result in (A6), and it is duplication in clusters which is restricted by duplication in clusters according to Theorem 1. We ignore this term and obtain
2 π W T n m R 2 λ s T m R 2 2 4 c 1 s W T log n Δ 2 λ s 2 c 1 s n W 2 log n m R 2 Δ 2 λ s O n log n m R 2 Δ 2
If b = 1 λ s n T E [ l b s ] λ s T m R 2 , according to Theorem 1, the same upper bound can be achieved when l i = Θ R m n .

References

  1. Li, P. Capacity of wireless ad hoc networks. In Encyclopedia of Wireless Networks; Springer: Berlin/Heidelberg, Germany, 2020; pp. 160–164. [Google Scholar]
  2. Yao, S.; Wang, X.; Tian, X.; Zhang, Q. Delay-throughput tradeoff with correlated mobility of ad-hoc networks. In Proceedings of the IEEE Infocom 2014—IEEE Conference on Computer Communications, Toronto, ON, Canada, 27 April–2 May 2014; IEEE: Piscataway, NJ, USA, 2014; pp. 2589–2597. [Google Scholar]
  3. Yoo, Y.; Agrawal, D.P. Why does it pay to be selfish in a MANET? IEEE Wirel. Commun. 2006, 13, 87–97. [Google Scholar] [CrossRef]
  4. Ge, L.; Jiang, S. An Efficient Opportunistic Routing Based on Prediction for Nautical Wireless Ad Hoc Networks. J. Mar. Sci. Eng. 2022, 10, 789. [Google Scholar] [CrossRef]
  5. Akestoridis, D.G.; Papapetrou, E. A framework for the evaluation of routing protocols in opportunistic networks. Comput. Commun. 2019, 145, 14–28. [Google Scholar] [CrossRef]
  6. Aditya, A.; Srinivasan, S.; Richard, K.; Scott, S.; Christos, P. Selfish Behavior and Stability of the Internet: A Game-Theoretic Analysis of TCP. SIGCOMM Comput. Commun. Rev. 2002, 32, 117–130. [Google Scholar]
  7. Li, W.; Chen, J.; Zhou, B. Game Theory Analysis for Graded Punishment Mechanism Restraining Free-Riding in P2P Networks. In Proceedings of the 2011 International Symposium on Computer Science and Society, Kota Kinabalu, Malaysia, 16–17 July 2011; pp. 262–266. [Google Scholar]
  8. Park, J.; van der Schaar, M. A Game Theoretic Analysis of Incentives in Content Production and Sharing Over Peer-to-Peer Networks. IEEE J. Sel. Top. Signal Process. 2010, 4, 704–717. [Google Scholar] [CrossRef] [Green Version]
  9. Sun, W.; Wang, S. General Analysis of Incentive Mechanisms for Peer-to-Peer Transmissions: A Quantum Game Perspective. In Proceedings of the 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), Atlanta, GA, USA, 5–8 June 2017; pp. 517–526. [Google Scholar]
  10. Zhai, Y.; Bai, X.; Liu, Q. Incentive mechanisms in mobile delay tolerant network. In Proceedings of the 2017 IEEE 7th International Conference on Electronics Information and Emergency Communication (ICEIEC), Macau, China, 21–23 July 2017; pp. 184–188. [Google Scholar]
  11. Wang, S.; Sun, W.; Ma, L.; Lv, W.; Cheng, X. Quantum Game Analysis on Extrinsic Incentive Mechanisms for P2P Services. IEEE Trans. Parallel Distrib. Syst. 2020, 31, 159–170. [Google Scholar] [CrossRef]
  12. Lu, R.; Lin, X.; Shi, Z.; Cao, B.; Sherman Shen, X. IPAD: An incentive and privacy-aware data dissemination scheme in opportunistic networks. In Proceedings of the 2013 IEEE INFOCOM, Turin, Italy, 14–19 April 2013; pp. 445–449. [Google Scholar]
  13. Qin, X.; Wang, X.; Wang, L.; Lin, Y.; Wang, X. An efficient probabilistic routing scheme based on game theory in opportunistic networks. Comput. Netw. 2019, 149, 144–153. [Google Scholar] [CrossRef]
  14. Lu, R.; Lin, X.; Zhu, H.; Shen, X.; Preiss, B. Pi: A practical incentive protocol for delay tolerant networks. IEEE Trans. Wirel. Commun. 2010, 9, 1483–1493. [Google Scholar] [CrossRef] [Green Version]
  15. Mingchu, L.; Xing, J.; Cheng, G.; Jia, L.; Guanghai, C.; Tie, Q. RIMNet: Recommendation Incentive Mechanism based on evolutionary game dynamics in peer-to-peer service networks. Knowl.-Based Syst. 2019, 166, 156–169. [Google Scholar]
  16. Evjola, S. Energy consumption analysis of different routing protocols in a Delay Tolerant Network. J. Ambient. Intell. Humaniz. Comput. 2020, 11, 3833–3839. [Google Scholar]
  17. Ghani-Ur, R.; Anwar, G.; Shad, M.; Madhusudan, S.; Dhananjay, S. Selfishness in Vehicular Delay-Tolerant Networks: A Review. Sensors 2020, 20, 3000. [Google Scholar]
  18. Gupta, P.; Kumar, P. The capacity of wireless networks. IEEE Trans. Inf. Theory 2000, 46, 388–404. [Google Scholar] [CrossRef] [Green Version]
  19. Ciullo, D.; Martina, V.; Garetto, M.; Leonardi, E. Impact of correlated mobility on delay–throughput performance in mobile ad hoc networks. IEEE/ACM Trans. Netw. 2011, 19, 1745–1758. [Google Scholar] [CrossRef]
  20. Lin, X.; Shroff, N.B. The fundamental capacity-delay tradeoff in large mobile ad hoc networks. In Proceedings of the Third Annual Mediterranean Ad Hoc Networking Workshop, Bodrum, Turkey, 27–30 June 2004; Available online: https://citeseerx.ist.psu.edu/viewdoc/download;jsessionid=0F24A437D3E894EAA2445A8CF8D1AE33?doi=10.1.1.86.2431&rep=rep1&type=pdf (accessed on 20 August 2022).
Figure 1. Model construction.
Figure 1. Model construction.
Jmse 10 01474 g001
Figure 2. Quantum game model.
Figure 2. Quantum game model.
Jmse 10 01474 g002
Figure 3. Verification with PRGT.
Figure 3. Verification with PRGT.
Jmse 10 01474 g003
Figure 4. Verification with IPAD.
Figure 4. Verification with IPAD.
Jmse 10 01474 g004
Figure 5. Scheduling policy.
Figure 5. Scheduling policy.
Jmse 10 01474 g005
Figure 6. Number of nodes versus throughput.
Figure 6. Number of nodes versus throughput.
Jmse 10 01474 g006
Figure 7. Incentive schemes versus throughput.
Figure 7. Incentive schemes versus throughput.
Jmse 10 01474 g007
Figure 8. Buffer size schemes versus throughput.
Figure 8. Buffer size schemes versus throughput.
Jmse 10 01474 g008
Figure 9. Energy capacity versus throughput.
Figure 9. Energy capacity versus throughput.
Jmse 10 01474 g009
Figure 10. Reward versus throughput.
Figure 10. Reward versus throughput.
Jmse 10 01474 g010
Figure 11. Security versus throughput.
Figure 11. Security versus throughput.
Jmse 10 01474 g011
Table 1. Simulation parameters.
Table 1. Simulation parameters.
ParameterValue
Simulation time 8 h
Area size 5 × 5 km 2
Transmission range 300 m
Transmission speed 1 Mbps
Node count100
Message interval 15 s
Message size truncnormal ( 1.5 , 1 ) MiB
Buffer size 56 MiB
Node selfish bernoulli ( 0.7 )
Movement change interval truncnormal ( 30 , 15 ) min
Movement angle delta normal ( 0 , 30 )
Movement velocity normal ( 30 , 10 ) mps
Table 2. MSE between delivery ratios and $ * .
Table 2. MSE between delivery ratios and $ * .
ParameterIPADPRGT
scheme parameter 5.18 × 10 5 1.76 × 10 4
buffer size 5.00 × 10 4 7.04 × 10 4
energy capacity 2.48 × 10 5 4.14 × 10 5
Table 3. Value of parameters.
Table 3. Value of parameters.
Parameter DescriptionValue
nnumber of node100
vGrow exponent of m 4 / 9
β Growth exponent of R 1 / 3
μ Maximum achievable entanglement10
μ Minimum achievable entanglement5
α Decreasing coefficient of cooperation1
μ Entanglement6
cConstant cost0
sSafty coefficient2
E c Energy cost per message1
B c Buffer cost per message1
E s Energy capacity5
B s Message buffer5
ZMessage price100
RMessage reward30
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Feng, R.; Jiang, S.; Zheng, Z. Capacity Analysis of Incentive Schemes in Opportunistic Networks. J. Mar. Sci. Eng. 2022, 10, 1474. https://doi.org/10.3390/jmse10101474

AMA Style

Feng R, Jiang S, Zheng Z. Capacity Analysis of Incentive Schemes in Opportunistic Networks. Journal of Marine Science and Engineering. 2022; 10(10):1474. https://doi.org/10.3390/jmse10101474

Chicago/Turabian Style

Feng, Ruoyu, Shengming Jiang, and Zhichao Zheng. 2022. "Capacity Analysis of Incentive Schemes in Opportunistic Networks" Journal of Marine Science and Engineering 10, no. 10: 1474. https://doi.org/10.3390/jmse10101474

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop