A Trust Management Scheme Based on Behavior Feedback for Opportunistic Networks

被引:2
|
作者
CHEN Xi [1 ,2 ]
SUN Liang [3 ]
MA Jian Feng [2 ]
MA Zhuo [2 ]
机构
[1] Department of Post-Doctoral Research Center,China Merchants Bank
[2] School of Computer Science and Technology,Xidian University
[3] Department of Information Technology,Smart Information and New Energy Group
基金
中央高校基本科研业务费专项资金资助;
关键词
opportunistic networks; trust management; key management; forwarding protocols; verifi ed feedback packet;
D O I
暂无
中图分类号
TN929.5 [移动通信];
学科分类号
080402 ; 080904 ; 0810 ; 081001 ;
摘要
In the harsh environment where n ode density is sparse, the slow-moving nodes cannot effectively utilize the encountering opportunities to realize the self-organized identity authentications, and do not have the chance to join the network routing. However, considering m ost of the communications in opportunistic networks are caused by forwarding operations, there is no need to establish the complete mutual authentications for each conversation. Accordingly, a novel trust management scheme is presented based on the information of behavior feedback, in order to complement the insufficiency of identity authentications. By utilizing the certificate chains based on social attributes, the mobile nodes build the local certificate graphs gradually to realize the web of "Identity Trust" relationship. Meanwhile, the successors generate Verified Feedback Packets for each positive behavior, and consequently the "Behavior Trust" relationship is formed for slow-moving nodes. Simulation result shows that, by implementing our trust scheme, the d elivery probability and trust reconstruction ratio can be effectively improved when there are large numbers of compromised nodes, and it means that our trust management scheme can efficiently explore and filter the trust nodes for secure forwarding in opportunistic networks.
引用
收藏
页码:117 / 129
页数:13
相关论文
共 50 条
  • [1] A Trust Management Scheme Based on Behavior Feedback for Opportunistic Networks
    Chen Xi
    Sun Liang
    Ma JianFeng
    Ma Zhu
    CHINA COMMUNICATIONS, 2015, 12 (04) : 117 - 129
  • [2] Security and trust management in opportunistic networks: a survey
    Wu, Yue
    Zhao, Yimeng
    Riguidel, Michel
    Wang, Guanghao
    Yi, Ping
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (09) : 1812 - 1827
  • [3] A Novel Blockchain-Based Trust Management Scheme for Vehicular Networks
    Pu, Cong
    2021 WIRELESS TELECOMMUNICATIONS SYMPOSIUM (WTS), 2021,
  • [4] A Cooperation Scheme based on Reputation for Opportunistic Networks
    Xu, Shuzhen
    Li, Mingchu
    Chen, Yuanfang
    Shu, Lei
    Gu, Xin
    2013 INTERNATIONAL CONFERENCE ON COMPUTING, MANAGEMENT AND TELECOMMUNICATIONS (COMMANTEL), 2013, : 289 - 294
  • [5] A Secure Routing based on Social Trust in Opportunistic Networks
    Li, Li
    Zhong, Xiaoxiong
    Qin, Yang
    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS (ICCS), 2016,
  • [6] Reducing the Negative Effect of Malicious Nodes in Opportunistic Networks Using Reputation Based Trust Management
    Barai, Smritikona
    Boral, Nupur
    Bhaumik, Parama
    INNOVATIONS IN BIO-INSPIRED COMPUTING AND APPLICATIONS, 2019, 939 : 339 - 349
  • [7] Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks
    Shaikh, Riaz Ahmed
    Jameel, Hassan
    d'Auriol, Brian J.
    Lee, Heejo
    Lee, Sungyoung
    Song, Young-Jae
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2009, 20 (11) : 1698 - 1712
  • [8] A trust-based framework for data forwarding in opportunistic networks
    Li, Na
    Das, Sajal K.
    AD HOC NETWORKS, 2013, 11 (04) : 1497 - 1509
  • [9] A Hybrid Trust Management Scheme for Wireless Sensor Networks
    N. Karthik
    V. S. Ananthanarayana
    Wireless Personal Communications, 2017, 97 : 5137 - 5170
  • [10] A Hybrid Trust Management Scheme for Wireless Sensor Networks
    Karthik, N.
    Ananthanarayana, V. S.
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 97 (04) : 5137 - 5170