A trust-based framework for data forwarding in opportunistic networks

被引:76
|
作者
Li, Na [1 ]
Das, Sajal K. [1 ]
机构
[1] Univ Texas Arlington, Comp Sci & Engn Dept, CReWMaN Lab, Arlington, TX 76019 USA
基金
美国国家科学基金会;
关键词
Opportunistic networks; Data forwarding; Reputation; Trust; Black hole attack; ATTACKS;
D O I
10.1016/j.adhoc.2011.01.018
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In general, the encounter probability is leveraged to evaluate whether a node is a qualified next-hop forwarder in Opportunistic Networks (OppNets); however, it does not truly present the node's competency of delivering data in a hostile wireless environment, because a malicious node can arbitrarily bloat that probability to intercept data from others. In this paper, we design a trust-based framework to more accurately evaluate an encounter's delivery competency, which can be flexibly integrated with a large family of existing data forwarding protocols designed for OppNets. As a case study, we integrate our proposed framework with PROPHET, and demonstrate its effectiveness against "black hole" attacks through experimental study. (c) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:1497 / 1509
页数:13
相关论文
共 50 条
  • [1] Trust-Based Protocol for Securing Routing in Opportunistic Networks
    Wu, Xiaojun
    Xiao, Jiakai
    Shao, Jianbo
    [J]. 2017 13TH IEEE CONFERENCE ON AUTOMATION SCIENCE AND ENGINEERING (CASE), 2017, : 434 - 439
  • [2] An Efficient Trust-Based Opportunistic Routing for Ad Hoc Networks
    Wang, Bo
    Chen, Xunxun
    Chang, Weiling
    [J]. 2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP 2012), 2012,
  • [3] A framework for opportunistic forwarding in disconnected networks
    Carreras, Iacopo
    Miorandi, Daniele
    Chlamtac, Imrich
    [J]. 2006 THIRD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2006, : 257 - +
  • [4] Trust-Based Data Disclosure in Sensor Networks
    Aivaloglou, Efthimia
    Gritzalis, Stefanos
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 741 - 746
  • [5] Trust-Based Security Protocol Against Blackhole Attacks in Opportunistic Networks
    Gupta, Sahil
    Woungang, Isaac
    Dhurandher, Sanjay Kumar
    Kumar, Arun
    Obaidat, Mohammed S.
    [J]. 2013 IEEE 9TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2013, : 724 - 729
  • [6] Trust-based minimum cost opportunistic routing for Ad hoc networks
    Wang Bo
    Huang Chuanhe
    Li Layuan
    Yang Wenzhong
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (12) : 2107 - 2122
  • [7] Trust-based Anonymity Framework for Wireless Mesh Networks
    Siddiqui, Muhammad Shoaib
    Shaikh, Riaz Ahmed
    Hong, Choong Seon
    [J]. 11TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III, PROCEEDINGS,: UBIQUITOUS ICT CONVERGENCE MAKES LIFE BETTER!, 2009, : 1638 - 1642
  • [8] Towards a novel trust-based opportunistic routing protocol for wireless networks
    Salehi, Mahmood
    Boukerche, Azzedine
    Darehshoorzadeh, Amir
    Mammeri, Abdelhamid
    [J]. WIRELESS NETWORKS, 2016, 22 (03) : 927 - 943
  • [9] Towards a novel trust-based opportunistic routing protocol for wireless networks
    Mahmood Salehi
    Azzedine Boukerche
    Amir Darehshoorzadeh
    Abdelhamid Mammeri
    [J]. Wireless Networks, 2016, 22 : 927 - 943
  • [10] Message trust-based secure multipath routing protocol for opportunistic networks
    Dhurandher, Sanjay K.
    Singh, Jagdeep
    Woungang, Isaac
    Kumar, Raghav
    Gupta, Geetanshu
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (08)