SATS: Secure Data-Forwarding Scheme for Delay-Tolerant Wireless Networks

被引:0
|
作者
Mahmoud, Mohamed Elsalih [1 ]
Barua, Mrinmoy [1 ]
Shen, Xuemin [1 ]
机构
[1] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
关键词
Black-Hole attacks; cooperation incentive scheme; secure data-forwarding schemes; security; trust systems;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we propose a secure data-forwarding scheme, called SATS, for delay-tolerant wireless networks. SATS uses credits (or micropayment) to stimulate the nodes' cooperation in relaying other nodes' messages and to enforce fairness. SATS also makes use of a trust system to assign a trust value for each node. A node's trust value is high when the node actively forwards others' messages. The highly trusted nodes are preferable in data forwarding to avoid the Black-Hole attackers that drop messages intentionally to degrade the message delivery rate. In this way, SATS can stimulate the nodes' cooperation not only to earn credits but also to maintain high trust values to increase their chances to participate in future data forwarding. Our security evaluation demonstrates that SATS can secure the payment and trust calculation. The performance evaluation demonstrates that SATS can significantly improve the message delivery rate due to avoiding the Black-Hole attackers in message forwarding and stimulating the nodes' cooperation.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Secure Information Forwarding through Fragmentation in Delay-tolerant Networks
    Datta, Shudip
    Madria, Sanjay
    Milligan, James
    Linderman, Mark
    [J]. 2018 IEEE 37TH INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2018, : 93 - 102
  • [2] Message Forwarding with Ferries in Delay-Tolerant Networks
    Hu, Chin-Lin
    Lin, Hau-Yun
    Hsu, Yu-Feng
    Huang, Sheng-Zhi
    Hui, Lin
    Zhang, Zhenjiang
    [J]. 2019 28TH WIRELESS AND OPTICAL COMMUNICATIONS CONFERENCE (WOCC), 2019, : 515 - 519
  • [3] Efficient data-forwarding method in delay-tolerant P2P networking for IoT services
    Kim, Seokhoon
    Kim, Dae-Young
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (06) : 1176 - 1185
  • [4] Efficient data-forwarding method in delay-tolerant P2P networking for IoT services
    Seokhoon Kim
    Dae-Young Kim
    [J]. Peer-to-Peer Networking and Applications, 2018, 11 : 1176 - 1185
  • [5] Augur: A Delay Aware Forwarding Protocol for Delay-Tolerant Networks
    El Shoghri, Ahmad
    Kusy, Branislav
    Jurdak, Raja
    Bergmann, Neil
    [J]. 2015 IEEE 11TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2015, : 460 - 467
  • [6] Asynchronous data-forwarding strategy to reduce forwarding delay in energy-harvesting wireless sensor networks
    Suh, B.
    Berber, S.
    [J]. ELECTRONICS LETTERS, 2013, 49 (23) : 1493 - 1494
  • [7] Message Prioritization of Epidemic Forwarding in Delay-Tolerant Networks
    Liu, Xu
    Chen, Yuanzhu
    Li, Cheng
    Taylor, Walter
    Moore, Jason H.
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2014, : 573 - 577
  • [8] TIS: A Threshold Incentive Scheme for Secure and Reliable Data Forwarding in Vehicular Delay Tolerant Networks
    Zhou, Jun
    Cao, Zhenfu
    [J]. 2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 985 - 990
  • [9] Optimal Forwarding in Delay-Tolerant Networks With Multiple Destinations
    Singh, Chandramani
    Altman, Eitan
    Kumar, Anurag
    Sundaresan, Rajesh
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2013, 21 (06) : 1812 - 1826
  • [10] On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks
    Gao, Wei
    Cao, Guohong
    La Porta, Tom
    Han, Jiawei
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2013, 12 (01) : 151 - 165