Trust-based security routing mechanism in mobile social networks

被引:5
|
作者
Yang, Shuang [2 ]
Wang, Xingwei [1 ]
Zhang, Shuang [3 ]
Yi, Bo [2 ]
Huang, Min [4 ]
机构
[1] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang, Peoples R China
[2] Northeastern Univ, Coll Comp Sci & Engn, Shenyang, Peoples R China
[3] Northeastern Univ, Coll Software, Shenyang, Peoples R China
[4] Northeastern Univ, Coll Informat Sci & Engn, Shenyang, Peoples R China
来源
NEURAL COMPUTING & APPLICATIONS | 2020年 / 32卷 / 10期
基金
中国国家自然科学基金;
关键词
Mobile social network; Trust value; Network security; Routing mechanism; SCHEME; DISSEMINATION; ARCHITECTURES; ALGORITHM;
D O I
10.1007/s00521-019-04167-z
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Malicious and selfish behaviors represent a serious security threat against routing in mobile social networks (MSN). Due to MSN's unique network characteristics, such as sociability, mobility and diversity, it is a challenge to design a misbehavior detection scheme in MSN. To improve the security in MSN routing, a trust-based security routing mechanism is presented in this paper, i.e., a malicious behavior detection mechanism with identity verification scheme. The main idea is to introduce the behavior trust and the identity trust to guide the routing. Firstly, we judge a node's behavior based on both comprehensive trust and social relationship strength. And then, we forward messages according to the different measurement within and outside the friend groups. We also propose a distributed key management scheme which can issue, verify or revoke certificates based on the evaluation of the social relationship strength. We further improve the efficiency of the proposed mechanism by verifying the identity trust of the node. The simulation results indicate that the proposed routing mechanism can lower the impact of malicious behavior of nodes effectively and it has greater security performance than some classical routing algorithms do.
引用
收藏
页码:5609 / 5620
页数:12
相关论文
共 50 条
  • [1] Trust-based security routing mechanism in mobile social networks
    Shuang Yang
    Xingwei Wang
    Shuang Zhang
    Bo Yi
    Min Huang
    [J]. Neural Computing and Applications, 2020, 32 : 5609 - 5620
  • [2] A Neighbor Trust-Based Mechanism to Protect Mobile Networks
    Vaseer, Gurveen
    Ghai, Garima
    Ghai, Dhruva
    Patheja, Pushpinder S.
    [J]. IEEE Potentials, 2019, 38 (01): : 20 - 25
  • [3] Trust prediction and trust-based source routing in mobile ad hoc networks
    Xia, Hui
    Jia, Zhiping
    Li, Xin
    Ju, Lei
    Sha, Edwin H. -M.
    [J]. AD HOC NETWORKS, 2013, 11 (07) : 2096 - 2114
  • [4] Towards Trust-based Security Mechanism for Wireless Sensor Networks
    Gao, Jianqiao
    Pan, Julong
    Xu, Zhanyi
    Li, Ziyin
    [J]. 2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [5] Trust-based security adaptation mechanism for Vehicular Sensor Networks
    Javed, Muhammad Awais
    Zeadally, Sherali
    Hamid, Zara
    [J]. COMPUTER NETWORKS, 2018, 137 : 27 - 36
  • [6] Trust-based security for the OLSR routing protocol
    Adnane, Asma
    Bidan, Christophe
    de Sousa Junior, Rafael Timoteo
    [J]. COMPUTER COMMUNICATIONS, 2013, 36 (10-11) : 1159 - 1171
  • [7] An Elevated Trust-based Security for Mobile Ad-hoc Networks
    Pei, Yanli
    Zheng, Shijue
    [J]. DCABES 2008 PROCEEDINGS, VOLS I AND II, 2008, : 1028 - 1032
  • [8] A Lightweight Trust-Based Security Architecture for RPL in Mobile IoT Networks
    Thulasiraman, Preetha
    Wang, Yizhong
    [J]. 2019 16TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2019,
  • [9] Integrated Social and QoS Trust-Based Routing in Delay Tolerant Networks
    Chen, Ing-Ray
    Bao, Fenye
    Chang, MoonJeong
    Cho, Jin-Hee
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2012, 66 (02) : 443 - 459
  • [10] Integrated Social and QoS Trust-Based Routing in Delay Tolerant Networks
    Ing-Ray Chen
    Fenye Bao
    MoonJeong Chang
    Jin-Hee Cho
    [J]. Wireless Personal Communications, 2012, 66 : 443 - 459