[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Towards a novel trust-based opportunistic routing protocol for wireless networks

Published: 01 April 2016 Publication History

Abstract

Opportunistic routing is a promising research area in the context of wireless network communications. Security and trustworthy of routing in this field, however, needs to be considerably researched . In this paper, a novel trust establishment algorithm is proposed, designed, and implemented specifically for opportunistic routing protocols which benefits from direct interactions between wireless nodes. The proposed trust model benefits from a novel watchdog mechanism considering not only forwarding behaviour of nodes but also the quality of links between them. Furthermore, three different metrics for next hop selection is introduced enabling nodes to select their next hop forwarders more sophisticatedly using quality of links, geographical location of nodes, and their trust level. Extensive simulation results represent that proposed model can significantly improve the performance of network communications when malicious nodes try to collapse the system.

References

[1]
Attar, A., Tang, H., Vasilakos, A. V., Yu, F. R., & Leung, V. C. (2012). A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE, 100(12), 3172---3186.
[2]
Biswas, S., & Morris, R. (2004). Opportunistic routing in multi-hop wireless networks. ACM SIGCOMM Computer Communication Review, 34(1), 69---74.
[3]
Boukerch, A., Xu, L., & EL-Khatib, K. (2007). Trust-based security for wireless ad hoc and sensor networks. Computer Communications, 30(1112), 2413---2427. special issue on security on wireless ad hoc and sensor networks.
[4]
Boukerche, A., & Darehshoorzadeh, A. (2014). Opportunistic routing in wireless networks: Models, algorithms, and classifications. ACM Computing Surveys (CSUR), 47(2), 22.
[5]
Boukerche, A., & Ren, Y. (2008). A trust-based security system for ubiquitous and pervasive computing environments. Computer Communications, 31(18), 4343---4351.
[6]
Boukerche, A., Ren, Y., & Pazzi, R. W. N. (2009). An adaptive computational trust model for mobile ad hoc networks. In Proceedings of the 2009 international conference on wireless communications and mobile computing: Connecting the world wirelessly (pp. 191---195). ACM.
[7]
Boukerche, A., Turgut, B., Aydin, N., Ahmad, M. Z., Blni, L., & Turgut, D. (2011). Routing protocols in ad hoc networks: A survey. Computer Networks, 55(13), 3032---3080.
[8]
Buchegger, S., & Le Boudec, J. Y. (2002). Performance analysis of the confidant protocol. In Proceedings of the 3rd ACM international symposium on mobile ad hoc networking and computing (pp. 226---236). ACM.
[9]
Cho, J. H., Swami, A., & Chen, R. (2011). A survey on trust management for mobile ad hoc networks. Communications Surveys and Tutorials, IEEE, 13(4), 562---583.
[10]
Darehshoorzadeh, A., & Boukerche, A. (2014). An efficient heuristic candidate selection algorithm for opportunistic routing in wireless multihop networks. In IEEE symposium on Computers and communication (ISCC), 2014. (pp. 1---6). IEEE.
[11]
Darehshoorzadeh, A., & Cerda-Alabern, L. (2012). Distance progress based opportunistic routing for wireless mesh networks. In 8th International wireless communications and mobile computing conference (IWCMC), 2012. (pp. 179---184). IEEE.
[12]
Darehshoorzadeh, A., Almulla, M., Boukerche, A., & Chaiwala, S. (2013). On the number of candidates in opportunistic routing for multi-hop wireless networks. In Proceedings of the 11th ACM international symposium on mobility management and wireless access (pp. 9---16). ACM.
[13]
Deng, H., Li, W., & Agrawal, D. P. (2002). Routing security in wireless ad hoc networks. Communications Magazine, IEEE, 40(10), 70---75.
[14]
Dubois-Ferrière, H., Grossglauser, M., & Vetterli, M. (2007). Least-cost opportunistic routing. Tech. rep.
[15]
Dubois-Ferrière, H., Grossglauser, M., & Vetterli, M. (2011). Valuable detours: Least-cost anypath routing. Networking, IEEE/ACM Transactions on, 19(2), 333---346.
[16]
Fall, K., & Varadhan, K. (2005). The ns manual (formerly ns notes and documentation). The VINT project 47.
[17]
Füßler, H., Widmer, J., Käsemann, M., Mauve, M., & Hartenstein, H. (2003). Contention-based forwarding for mobile ad hoc networks. Ad Hoc Networks, 1(4), 351---369.
[18]
Ganeriwal, S., Balzano, L. K., & Srivastava, M. B. (2008). Reputation-based framework for high integrity sensor networks. ACM Transactions on Sensor Networks (TOSN), 4(3), 15.
[19]
Ghosh, T., Pissinou, N., & Makki, K. (2005). Towards designing a trusted routing solution in mobile ad hoc networks. Mobile Networks and Applications, 10(6), 985---995.
[20]
He, Q., Wu, D., & Khosla, P. (2004). Sori: A secure and objective reputation-based incentive scheme for ad-hoc networks. In Wireless communications and networking conference, 2004. WCNC. 2004 IEEE (vol 2. pp. 825---830). IEEE.
[21]
Hsu, C. J., Liu, H. I., & Seah, W. K. (2011). Opportunistic routing-a review and the challenges ahead. Computer Networks, 55(15), 3592---3603.
[22]
Li, F., & Wu, J. (2007). Mobility reduces uncertainty in manets. In INFOCOM 2007. 26th IEEE International conference on computer communications. IEEE (pp. 1946---1954). IEEE.
[23]
Li, J., Jannotti, J., De Couto, D. S. J., Karger, D. R., & Morris, R. (2000). A scalable location service for geographic ad hoc routing. In Proceedings of the 6th annual international conference on mobile computing and networking (pp. 120---130). New York, NY, USA: ACM, MobiCom '00.
[24]
Li, N., & Das, S. K. (2013). A trust-based framework for data forwarding in opportunistic networks. Ad Hoc Networks, 11(4), 1497---1509.
[25]
Li, P., Guo, S., Yu, S., & Vasilakos, A. V. (2014). Reliable multicast with pipelined network coding using opportunistic feeding and routing. IEEE Transactions on Parallel and Distributed Systems, 25(12), 3264---3273.
[26]
Liu, H., Zhang, B., Mouftah, H. T., Shen, X., & Ma, J. (2009). Opportunistic routing for wireless ad hoc and sensor networks: Present and future directions. Communications Magazine, IEEE, 47(12), 103---109.
[27]
Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual international conference on mobile computing and networking (pp. 255---265). ACM.
[28]
Michiardi, P., & Molva, R. (2002). Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In B. Jerman-Bla¿iă¿ & T. Klobuă¿ar (Eds.), Advanced communications and multimedia security (pp. 107---121). New York: Springer.
[29]
Nguyen, H. A., & Giordano, S. (2009). Routing in opportunistic networks. International Journal of Ambient Computing and Intelligence (IJACI), 1(3), 19---38.
[30]
Pelusi, L., Passarella, A., & Conti, M. (2006). Opportunistic networking: data forwarding in disconnected mobile ad hoc networks. Communications Magazine, IEEE, 44(11), 134---141.
[31]
Rozner, E., Seshadri, J., Mehta, Y., & Qiu, L. (2009). Soar: Simple opportunistic adaptive routing protocol for wireless mesh networks. Mobile Computing, IEEE Transactions on, 8(12), 1622---1635.
[32]
Salehi, M., & Boukerche, A. (2014). Trust-aware opportunistic routing protocol for wireless networks. In Proceedings of the 10th ACM symposium on QoS and security for wireless and mobile networks (pp. 79---86). New York, NY, USA: ACM, Q2SWinet '14.
[33]
Salehi, M., & Samavati, H. (2012). Dsr vs olsr: Simulation based comparison of ad hoc reactive and proactive algorithms under the effect of new routing attacks. In 6th International conference on next generation mobile applications, services and technologies (NGMAST), 2012. (pp. 100---105). IEEE.
[34]
Shafer, G., et al. (1976). A mathematical theory of evidence (Vol. 1). Princeton: Princeton University Press.
[35]
Wei, Z., Yu, F. R., & Boukerche, A. (2014). Trust based security enhancements for vehicular ad hocnetworks. In Proceedings of the fourth ACM international symposium on development and analysis of intelligent vehicular networks and applications (pp. 103---109). ACM.
[36]
Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for internet of things. Journal of Network and Computer Applications, 42, 120---134.
[37]
Yan, Z., Zhang, P., & Vasilakos, A. V. (2015). A security and trust framework for virtualized networks and software-defined networking. Security and Communication Networks.
[38]
Yang, S., Zhong, F., Yeo, C. K., Lee, B. S., & Boleng, J. (2009) Position based opportunistic routing for robust data delivery in manets. In Global telecommunications conference, 2009. GLOBECOM 2009. IEEE (pp. 1---6). IEEE.
[39]
Yu, H., Shen, Z., Miao, C., Leung, C., & Niyato, D. (2010). A survey of trust and reputation management systems in wireless communications. Proceedings of the IEEE, 98(10), 1755---1772.
[40]
Zhang, J. (2011). A survey on trust management for vanets. In IEEE International conference on advanced information networking and applications (AINA), 2011. (pp. 105---112). IEEE.
[41]
Zhong, Z., Wang, J., Nelakuditi, S., & Lu, G. H. (2006). On selection of candidates for opportunistic anypath forwarding. ACM SIGMOBILE Mobile Computing and Communications Review, 10(4), 1---2.

Cited By

View all
  • (2024)SCIDP–Secure cloud-integrated data dissemination protocol for efficient reprogramming in internet of thingsCluster Computing10.1007/s10586-024-04570-927:9(12841-12860)Online publication date: 1-Dec-2024
  • (2023)Deep residual network-based data streaming approach for soil type application under IoT-based big data environmentWireless Networks10.1007/s11276-022-03195-329:4(1751-1769)Online publication date: 4-Jan-2023
  • (2023)Secure trust aware multi-objective routing protocol based on battle competitive swarm optimization in IoTArtificial Intelligence Review10.1007/s10462-023-10560-x56:Suppl 2(1685-1709)Online publication date: 1-Nov-2023
  • Show More Cited By

Index Terms

  1. Towards a novel trust-based opportunistic routing protocol for wireless networks

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image Wireless Networks
        Wireless Networks  Volume 22, Issue 3
        April 2016
        346 pages

        Publisher

        Springer-Verlag

        Berlin, Heidelberg

        Publication History

        Published: 01 April 2016

        Author Tags

        1. Candidate set
        2. Opportunistic routing
        3. Trust
        4. Wireless network

        Qualifiers

        • Article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 18 Jan 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)SCIDP–Secure cloud-integrated data dissemination protocol for efficient reprogramming in internet of thingsCluster Computing10.1007/s10586-024-04570-927:9(12841-12860)Online publication date: 1-Dec-2024
        • (2023)Deep residual network-based data streaming approach for soil type application under IoT-based big data environmentWireless Networks10.1007/s11276-022-03195-329:4(1751-1769)Online publication date: 4-Jan-2023
        • (2023)Secure trust aware multi-objective routing protocol based on battle competitive swarm optimization in IoTArtificial Intelligence Review10.1007/s10462-023-10560-x56:Suppl 2(1685-1709)Online publication date: 1-Nov-2023
        • (2022)ARPVP: Attack Resilient Position-Based VANET Protocol Using Ant Colony OptimizationWireless Personal Communications: An International Journal10.1007/s11277-022-09997-0128:2(1235-1258)Online publication date: 10-Nov-2022
        • (2022)A Trust Based Secure Intelligent Opportunistic Routing Protocol for Wireless Sensor NetworksWireless Personal Communications: An International Journal10.1007/s11277-021-08564-3127:2(1045-1066)Online publication date: 1-Nov-2022
        • (2020)Tanimoto Support Vector Regressive Linear Program Boost Based Node Trust Evaluation for Secure Communication in MANETWireless Personal Communications: An International Journal10.1007/s11277-020-07209-1117:4(2973-2993)Online publication date: 10-Mar-2020
        • (2019)On selection of forwarding nodes for long opportunistic routesWireless Networks10.1007/s11276-017-1636-525:4(1847-1854)Online publication date: 1-May-2019
        • (2019)A new cost function for improving Anypath routing performance of VANETs in highwaysWireless Networks10.1007/s11276-017-1620-025:4(1657-1667)Online publication date: 1-May-2019
        • (2017)An Energy Efficient Trust Aware Opportunistic Routing Protocol for Wireless Sensor NetworkInternational Journal of Information System Modeling and Design10.4018/IJISMD.20170401028:2(30-44)Online publication date: 1-Apr-2017
        • (2017)Quality of Information in Mobile CrowdsensingACM Transactions on Sensor Networks10.1145/313925613:4(1-43)Online publication date: 30-Nov-2017

        View Options

        View options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media