Towards a novel trust-based opportunistic routing protocol for wireless networks

被引:28
|
作者
Salehi, Mahmood [1 ]
Boukerche, Azzedine [1 ]
Darehshoorzadeh, Amir [1 ]
Mammeri, Abdelhamid [1 ]
机构
[1] Univ Ottawa, Sch Elect Engn & Comp Sci, Ottawa, ON, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Wireless network; Opportunistic routing; Trust; Candidate set; AD-HOC; MANAGEMENT; SECURITY;
D O I
10.1007/s11276-015-1010-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Opportunistic routing is a promising research area in the context of wireless network communications. Security and trustworthy of routing in this field, however, needs to be considerably researched. In this paper, a novel trust establishment algorithm is proposed, designed, and implemented specifically for opportunistic routing protocols which benefits from direct interactions between wireless nodes. The proposed trust model benefits from a novel watchdog mechanism considering not only forwarding behaviour of nodes but also the quality of links between them. Furthermore, three different metrics for next hop selection is introduced enabling nodes to select their next hop forwarders more sophisticatedly using quality of links, geographical location of nodes, and their trust level. Extensive simulation results represent that proposed model can significantly improve the performance of network communications when malicious nodes try to collapse the system.
引用
收藏
页码:927 / 943
页数:17
相关论文
共 50 条
  • [21] Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks
    Buccafurri, Francesco
    Coppolino, Luigi
    D'Antonio, Salvatore
    Garofalo, Alessia
    Lax, Gianluca
    Nocera, Antonino
    Romano, Luigi
    [J]. COMPUTER SAFETY, RELIABILITY, AND SECURITY (SAFECOMP 2014), 2014, 8666 : 214 - 229
  • [22] Trust-Based Security Protocol Against Blackhole Attacks in Opportunistic Networks
    Gupta, Sahil
    Woungang, Isaac
    Dhurandher, Sanjay Kumar
    Kumar, Arun
    Obaidat, Mohammed S.
    [J]. 2013 IEEE 9TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2013, : 724 - 729
  • [23] An Encrypted Trust-Based Routing Protocol
    Gahi, Youssef
    Guennoun, Mouhcine
    Guennoun, Zouhair
    El-Khatib, Khalil
    [J]. 2012 IEEE CONFERENCE ON OPEN SYSTEMS (ICOS 2012), 2012, : 206 - 210
  • [24] TrustLP: A Trust-Based Localization Protocol for Wireless Sensor Networks
    Abbas, Ash Mohammad
    [J]. 2015 13TH INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC, AND WIRELESS NETWORKS (WIOPT), 2015, : 529 - 536
  • [25] Towards Trust-based Security Mechanism for Wireless Sensor Networks
    Gao, Jianqiao
    Pan, Julong
    Xu, Zhanyi
    Li, Ziyin
    [J]. 2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [26] Trust-Based and Energy-Aware Incentive Routing Protocol for Multi-hop Wireless Networks
    Mahmoud, Mohamed Elsalih
    Shen, Xuemin
    [J]. 2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [27] TRAS: A Trust-Based Routing Protocol for Ad Hoc and Sensor Networks
    Jawhar, Imad
    Mohammed, Farhan
    Al Jaroodi, Jameela
    Mohamed, Nader
    [J]. 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, : 382 - 387
  • [28] A Formal Study of Trust-Based Routing in Wireless Ad Hoc Networks
    Zhang, Chi
    Zhu, Xiaoyan
    Song, Yang
    Fang, Yuguang
    [J]. 2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [29] Towards trust-based routing for data plane security in heterogeneous Software-Defined Wireless Networks
    Quinn, Travis
    Shah, Syed Danial Ali
    Bouhafs, Faycal
    den Hartog, Frank
    [J]. 2024 IEEE 10TH INTERNATIONAL CONFERENCE ON NETWORK SOFTWARIZATION, NETSOFT 2024, 2024, : 37 - 42
  • [30] Trust-based security for the OLSR routing protocol
    Adnane, Asma
    Bidan, Christophe
    de Sousa Junior, Rafael Timoteo
    [J]. COMPUTER COMMUNICATIONS, 2013, 36 (10-11) : 1159 - 1171