Trust-Based Protocol for Securing Routing in Opportunistic Networks

被引:0
|
作者
Wu, Xiaojun [1 ]
Xiao, Jiakai [1 ]
Shao, Jianbo [1 ]
机构
[1] Xi An Jiao Tong Univ, Sch Software Engn, Xian 710049, Shaanxi, Peoples R China
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is hard to set up an end-to-end connection between source and destination in Opportunistic Networks, due to dynamic network topology and the lack of infrastructure. Instead, the store-carry-forward mechanism is used to achieve communication. Namely, communication in Opportunistic Networks relies on the cooperation among nodes. Correspondingly, Opportunistic Networks have some issues like long delays, packet loss and so on, which lead to many challenges in Opportunistic Networks. However, malicious nodes do not follow the routing rules, or refuse to cooperate with benign nodes. Some misbehaviors like black-hole attack, gray-hole attack may arbitrarily bloat their delivery competency to intercept and drop data. Selfishness in Opportunistic Networks will also drop some data from other nodes. These misbehaviors will seriously affect network performance like the delivery success ratio. In this paper, we design a Trust-based Routing Protocol (TRP), combined with various utility algorithms, to more comprehensively evaluate the competency of a candidate node and effectively reduce negative effects by malicious nodes. In simulation, we compare TRP with other protocols, and shows that our protocol is effective for misbehaviors.
引用
收藏
页码:434 / 439
页数:6
相关论文
共 50 条
  • [1] Message trust-based secure multipath routing protocol for opportunistic networks
    Dhurandher, Sanjay K.
    Singh, Jagdeep
    Woungang, Isaac
    Kumar, Raghav
    Gupta, Geetanshu
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (08)
  • [2] Towards a novel trust-based opportunistic routing protocol for wireless networks
    Mahmood Salehi
    Azzedine Boukerche
    Amir Darehshoorzadeh
    Abdelhamid Mammeri
    [J]. Wireless Networks, 2016, 22 : 927 - 943
  • [3] Towards a novel trust-based opportunistic routing protocol for wireless networks
    Salehi, Mahmood
    Boukerche, Azzedine
    Darehshoorzadeh, Amir
    Mammeri, Abdelhamid
    [J]. WIRELESS NETWORKS, 2016, 22 (03) : 927 - 943
  • [4] Verification and Validation of Trust-Based Opportunistic Routing Protocol
    Thorat, Sandeep A.
    Kulkarni, P. J.
    Yadav, S. V.
    [J]. PROGRESS IN COMPUTING, ANALYTICS AND NETWORKING, ICCAN 2017, 2018, 710 : 85 - 93
  • [5] AI-enabled trust-based routing protocol for social opportunistic IoT networks
    Nigam, Ritu
    Sharma, Deepak Kumar
    Jain, Satbir
    Bhardwaj, Kartik Krishna
    Banyal, Siddhant
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2024, 35 (04)
  • [6] An Efficient Trust-Based Opportunistic Routing for Ad Hoc Networks
    Wang, Bo
    Chen, Xunxun
    Chang, Weiling
    [J]. 2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP 2012), 2012,
  • [7] A trust-based routing protocol for ad hoc networks
    Xue, XY
    Leneutre, J
    Ben-Othman, J
    [J]. MOBILE AND WIRELESS COMMUNICATION NETWORKS, 2005, 162 : 251 - 262
  • [8] Trust-based minimum cost opportunistic routing for Ad hoc networks
    Wang Bo
    Huang Chuanhe
    Li Layuan
    Yang Wenzhong
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (12) : 2107 - 2122
  • [9] TBMOR: A lightweight trust-based model for secure routing of opportunistic networks
    Su, Bing
    Zhu, Ben
    [J]. EGYPTIAN INFORMATICS JOURNAL, 2023, 24 (02) : 205 - 214
  • [10] Trust-Based Security Protocol Against Blackhole Attacks in Opportunistic Networks
    Gupta, Sahil
    Woungang, Isaac
    Dhurandher, Sanjay Kumar
    Kumar, Arun
    Obaidat, Mohammed S.
    [J]. 2013 IEEE 9TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2013, : 724 - 729