An Efficient Trust-Based Opportunistic Routing for Ad Hoc Networks

被引:0
|
作者
Wang, Bo [1 ]
Chen, Xunxun [1 ]
Chang, Weiling [1 ]
机构
[1] CNCERT CC, Beijing, Peoples R China
关键词
trusted opportunistic forwarding model; trusted routing; opportunistic routing; degree of trust; cost of routing;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Recently, opportunistic routing (OR) can exploit the wireless broadcast and higher reliable opportunistic forwarding, so as to substantially increase the throughput of network. In this paper, we incorporate the trust mechanism into OR, so it can enhance the security of routing to resist the malicious attacks. While the precondition of the forwarder list is trusted, a new trusted opportunistic forwarding model based on degree of trust and cost of routing is proposed, then a trusted minimum cost routing algorithm (MCOR) is formally formulated. Finally, MCOR algorithm is verified by simulation using nsclick software and compared its performance with the classic ExOR. The simulation results show that MCOR scheme can prevent attacks from malicious nodes and boost the survivability of network. Furthermore, MCOR algorithm outperforms ExOR in terms of: throughput, expected ETX and cost of routing.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Trust-based minimum cost opportunistic routing for Ad hoc networks
    Wang Bo
    Huang Chuanhe
    Li Layuan
    Yang Wenzhong
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (12) : 2107 - 2122
  • [2] A Trust-based Opportunistic Routing Algorithm in Ad Hoc Network
    Dan Feng
    Ma Yajie
    Zhou Fengxing
    Lu Shaowu
    [J]. 2014 5TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2014, : 1150 - 1153
  • [3] A trust-based routing protocol for ad hoc networks
    Xue, XY
    Leneutre, J
    Ben-Othman, J
    [J]. MOBILE AND WIRELESS COMMUNICATION NETWORKS, 2005, 162 : 251 - 262
  • [4] Trust-based routing for ad-hoc wireless networks
    Pirzada, AA
    Datta, A
    McDonald, C
    [J]. 2004 12TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2 , PROCEEDINGS: UNITY IN DIVERSITY, 2004, : 326 - 330
  • [5] Trust prediction and trust-based source routing in mobile ad hoc networks
    Xia, Hui
    Jia, Zhiping
    Li, Xin
    Ju, Lei
    Sha, Edwin H. -M.
    [J]. AD HOC NETWORKS, 2013, 11 (07) : 2096 - 2114
  • [6] Decreasing of Trust-based Routing Delay in Vehicular ad hoc Networks
    Heibati, Somayeh
    Movahedinia, Naser
    [J]. 2016 EIGHTH INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE TECHNOLOGY (IKT), 2016, : 161 - 166
  • [7] TRAS: A Trust-Based Routing Protocol for Ad Hoc and Sensor Networks
    Jawhar, Imad
    Mohammed, Farhan
    Al Jaroodi, Jameela
    Mohamed, Nader
    [J]. 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, : 382 - 387
  • [8] A Formal Study of Trust-Based Routing in Wireless Ad Hoc Networks
    Zhang, Chi
    Zhu, Xiaoyan
    Song, Yang
    Fang, Yuguang
    [J]. 2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [9] A Secure Trust-Based Location-Aided Routing for Ad Hoc Networks
    Wang, Kun
    Wu, Meng
    Xia, Pengrui
    Shen, Subin
    [J]. 2008 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1-3, 2008, : 793 - 797
  • [10] Trust-based on-demand multipath routing in mobile ad hoc networks
    Li, X.
    Jia, Z.
    Zhang, P.
    Zhang, R.
    Wang, H.
    [J]. IET INFORMATION SECURITY, 2010, 4 (04) : 212 - 232