Trust-Based Protocol for Securing Routing in Opportunistic Networks

被引:0
|
作者
Wu, Xiaojun [1 ]
Xiao, Jiakai [1 ]
Shao, Jianbo [1 ]
机构
[1] Xi An Jiao Tong Univ, Sch Software Engn, Xian 710049, Shaanxi, Peoples R China
来源
2017 13TH IEEE CONFERENCE ON AUTOMATION SCIENCE AND ENGINEERING (CASE) | 2017年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is hard to set up an end-to-end connection between source and destination in Opportunistic Networks, due to dynamic network topology and the lack of infrastructure. Instead, the store-carry-forward mechanism is used to achieve communication. Namely, communication in Opportunistic Networks relies on the cooperation among nodes. Correspondingly, Opportunistic Networks have some issues like long delays, packet loss and so on, which lead to many challenges in Opportunistic Networks. However, malicious nodes do not follow the routing rules, or refuse to cooperate with benign nodes. Some misbehaviors like black-hole attack, gray-hole attack may arbitrarily bloat their delivery competency to intercept and drop data. Selfishness in Opportunistic Networks will also drop some data from other nodes. These misbehaviors will seriously affect network performance like the delivery success ratio. In this paper, we design a Trust-based Routing Protocol (TRP), combined with various utility algorithms, to more comprehensively evaluate the competency of a candidate node and effectively reduce negative effects by malicious nodes. In simulation, we compare TRP with other protocols, and shows that our protocol is effective for misbehaviors.
引用
收藏
页码:434 / 439
页数:6
相关论文
共 50 条
  • [31] Trust-based secure directed diffusion routing protocol in WSN
    Xinying Yu
    Fengyin Li
    Tao Li
    Nan Wu
    Hua Wang
    Huiyu Zhou
    Journal of Ambient Intelligence and Humanized Computing, 2022, 13 : 1405 - 1417
  • [32] Trust-based secure directed diffusion routing protocol in WSN
    Yu, Xinying
    Li, Fengyin
    Li, Tao
    Wu, Nan
    Wang, Hua
    Zhou, Huiyu
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2022, 13 (03) : 1405 - 1417
  • [33] Adaptive Trust-Based Routing Protocol for Large Scale WSNs
    Khalid, Nor Azimah
    Bai, Quan
    Al-Anbuky, Adnan
    IEEE ACCESS, 2019, 7 : 143539 - 143549
  • [34] Trust-based energy-efficient routing protocol for Internet of things-based sensor networks
    Ilyas, Muhammad
    Ullah, Zahid
    Khan, Fakhri Alam
    Chaudary, Muhammad Hasanain
    Malik, Muhammad Sheraz Arshed
    Zaheer, Zafar
    Durrani, Hamood Ur Rehman
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (10):
  • [35] Trust Opportunistic Routing Protocol in Multi-hop Wireless Networks
    Wang Bo
    Huang Chuanhe
    Yang Wenzhong
    Wang Tong
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 563 - 567
  • [36] Trust-based LEACH Protocol for Wireless Sensor Networks
    Song, Fei
    Zhao, Baohua
    FGCN: PROCEEDINGS OF THE 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING, VOLS 1 AND 2, 2008, : 200 - 205
  • [37] A Secure Routing based on Social Trust in Opportunistic Networks
    Li, Li
    Zhong, Xiaoxiong
    Qin, Yang
    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS (ICCS), 2016,
  • [38] Trust-based Model for Securing Vehicular Networks Against RSU Attacks
    Alnasser, Aljawharah
    Sun, Hongjian
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (IEEE INFOCOM WKSHPS 2021), 2021,
  • [39] Time Routing: a community based routing protocol for Opportunistic Networks
    Ma, Xuebin
    Ouyang, Zhenchao
    Bai, Jing
    Zhan, Xin
    2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), 2014, : 20 - 25
  • [40] A Trust-based Secure Routing Algorithm for Wireless Sensor Networks
    Liu Wei
    Ye Qing
    Yang Nan
    2015 34TH CHINESE CONTROL CONFERENCE (CCC), 2015, : 7726 - 7729