Enhancement of Security in Opportunistic Networks

被引:0
作者
Mathur, Mansi [1 ]
Verma, Jyoti [1 ]
Poonam [1 ]
机构
[1] JC Bose Univ Sci & Technol, YMCA, Sect 6, Faridabad, Haryana, India
来源
ADVANCED NETWORK TECHNOLOGIES AND INTELLIGENT COMPUTING, ANTIC 2023, PT I | 2024年 / 2090卷
关键词
OppNet; Security; Privacy; Trust-based models; Routing; TRUST;
D O I
10.1007/978-3-031-64076-6_3
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Messages are transmitted opportunistically from a source to the destination in Opportunistic networks (OppNets), which are also known as a subset of disruption-tolerant networks. Such network lacks end-to-end connection because of dynamic network topology and sporadic device connectivity. The two most difficult problems in constructing an OppNet, the process for choosing the subsequent nodes and ensuring confidentiality along with security. Due to this kind of behavior, it is not only difficult to maintain trust but also to perform routing in such networks. To keep up with one parameter, the other is automatically compromised. To solve these issues, existing researchers proposed many trust-based routing techniques which are either based on privacy-preservation routing, delay-aware routing, encryption-based or node reputation-basedmechanisms. The intent of this paper is to provide a comprehensive survey of all the existing and recent security solutions in OppNets and a method to distinguish the trusted nodes from non-trustworthy nodes to enhance security of the network.
引用
收藏
页码:27 / 43
页数:17
相关论文
共 33 条
[1]   Security and Trust in Opportunistic Networks - A Survey [J].
Alajeely, Majeed ;
Doss, Robin ;
Ahmad, Asma'a .
IETE TECHNICAL REVIEW, 2016, 33 (03) :256-268
[2]   Securing and Facilitating Communication Within Opportunistic Networks: A Holistic Survey [J].
Avoussoukpo, Cossi Blaise ;
Ogunseyi, Taiwo Blessing ;
Tchenagnon, Marius .
IEEE ACCESS, 2021, 9 :55009-55035
[3]  
Avoussoukpo CB, 2018, 2018 IEEE 18TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), P885, DOI 10.1109/ICCT.2018.8600239
[4]  
Bhuvaneswari R., 2015, MIDDLE-EAST J SCI RE, V23, P1346, DOI DOI 10.5829/idosi.mejsr.2015.23.07.104
[5]   A Probabilistic Spray-and-Wait Routing Algorithm Based on Node Interest Preference in Delay Tolerant Networks [J].
Chang, Yanan ;
Zhang, Ruijie ;
Cui, Jianqun ;
Zhou, Hao ;
Wan, Qiyun ;
Wu, Jike .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
[6]   A trust change detection mechanism in mobile ad-hoc networks [J].
Chatzidakis, Michail ;
Hadjiefthymiades, Stathes .
COMPUTER COMMUNICATIONS, 2022, 187 :155-163
[7]   Message trust-based secure multipath routing protocol for opportunistic networks [J].
Dhurandher, Sanjay K. ;
Singh, Jagdeep ;
Woungang, Isaac ;
Kumar, Raghav ;
Gupta, Geetanshu .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (08)
[8]   Cryptography-Based Misbehavior Detection and Trust Control Mechanism for Opportunistic Network Systems [J].
Dhurandher, Sanjay K. ;
Kumar, Arun ;
Obaidat, Mohammad S. .
IEEE SYSTEMS JOURNAL, 2018, 12 (04) :3191-3202
[9]   A Privacy Preserved, Trust Relationship (PTR) Model for Internet of Vehicles [J].
Farman, Haleem ;
Khalil, Abizar ;
Ahmad, Naveed ;
Albattah, Waleed ;
Khan, Muazzam A. ;
Islam, Muhammad .
ELECTRONICS, 2021, 10 (24)
[10]   Decentralized content sharing in mobile ad-hoc networks: A survey [J].
Kaisar, Shahriar ;
Kamruzzaman, Joarder ;
Karmakar, Gour ;
Rashid, Md Mamunur .
DIGITAL COMMUNICATIONS AND NETWORKS, 2023, 9 (06) :1363-1398