Trust-Based Protocol for Securing Routing in Opportunistic Networks

被引:0
|
作者
Wu, Xiaojun [1 ]
Xiao, Jiakai [1 ]
Shao, Jianbo [1 ]
机构
[1] Xi An Jiao Tong Univ, Sch Software Engn, Xian 710049, Shaanxi, Peoples R China
来源
2017 13TH IEEE CONFERENCE ON AUTOMATION SCIENCE AND ENGINEERING (CASE) | 2017年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is hard to set up an end-to-end connection between source and destination in Opportunistic Networks, due to dynamic network topology and the lack of infrastructure. Instead, the store-carry-forward mechanism is used to achieve communication. Namely, communication in Opportunistic Networks relies on the cooperation among nodes. Correspondingly, Opportunistic Networks have some issues like long delays, packet loss and so on, which lead to many challenges in Opportunistic Networks. However, malicious nodes do not follow the routing rules, or refuse to cooperate with benign nodes. Some misbehaviors like black-hole attack, gray-hole attack may arbitrarily bloat their delivery competency to intercept and drop data. Selfishness in Opportunistic Networks will also drop some data from other nodes. These misbehaviors will seriously affect network performance like the delivery success ratio. In this paper, we design a Trust-based Routing Protocol (TRP), combined with various utility algorithms, to more comprehensively evaluate the competency of a candidate node and effectively reduce negative effects by malicious nodes. In simulation, we compare TRP with other protocols, and shows that our protocol is effective for misbehaviors.
引用
收藏
页码:434 / 439
页数:6
相关论文
共 50 条
  • [41] A Trust-based Secure Routing Algorithm for Wireless Sensor Networks
    Liu Wei
    Ye Qing
    Yang Nan
    2015 34TH CHINESE CONTROL CONFERENCE (CCC), 2015, : 7726 - 7729
  • [42] Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks
    Buccafurri, Francesco
    Coppolino, Luigi
    D'Antonio, Salvatore
    Garofalo, Alessia
    Lax, Gianluca
    Nocera, Antonino
    Romano, Luigi
    COMPUTER SAFETY, RELIABILITY, AND SECURITY (SAFECOMP 2014), 2014, 8666 : 214 - 229
  • [43] Trust-based QoS Routing Algorithm for Wireless Sensor Networks
    Wang, Junwei
    Wang, Haifeng
    26TH CHINESE CONTROL AND DECISION CONFERENCE (2014 CCDC), 2014, : 2492 - 2495
  • [44] Trust-based security routing mechanism in mobile social networks
    Yang, Shuang
    Wang, Xingwei
    Zhang, Shuang
    Yi, Bo
    Huang, Min
    NEURAL COMPUTING & APPLICATIONS, 2020, 32 (10) : 5609 - 5620
  • [45] Trust-based routing for ad-hoc wireless networks
    Pirzada, AA
    Datta, A
    McDonald, C
    2004 12TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2 , PROCEEDINGS: UNITY IN DIVERSITY, 2004, : 326 - 330
  • [46] Trust prediction and trust-based source routing in mobile ad hoc networks
    Xia, Hui
    Jia, Zhiping
    Li, Xin
    Ju, Lei
    Sha, Edwin H. -M.
    AD HOC NETWORKS, 2013, 11 (07) : 2096 - 2114
  • [47] Trust-based Geographical Routing For Smart Grid Communication Networks
    Xiang, Ming
    Liu, William
    Bai, Quan
    2012 IEEE THIRD INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2012, : 704 - 709
  • [48] RTRV: An RSU-assisted trust-based routing protocol for VANETs ∗
    Azizi, Mohamad
    Shokrollahi, Saeed
    AD HOC NETWORKS, 2024, 154
  • [49] Trust-Based and Energy-Aware Incentive Routing Protocol for Multi-hop Wireless Networks
    Mahmoud, Mohamed Elsalih
    Shen, Xuemin
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [50] Routing protocol based on social characteristics for opportunistic networks
    CHENG Gang
    SONG Mei
    ZHANG Yong
    XING Yihai
    BAO Xuyan
    TheJournalofChinaUniversitiesofPostsandTelecommunications, 2014, 21 (01) : 67 - 73+103