Secure opportunistic routing protocols: methods, models, and classification

被引:6
作者
Salehi, Mahmood [1 ]
Boukerche, Azzedine [1 ]
机构
[1] Univ Ottawa, Sch Elect Engn & Comp Sci, Ottawa, ON, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Wireless networks; Opportunistic routing; Security; WIRELESS SENSOR NETWORKS; TRUST MANAGEMENT; GAME-THEORY; ALGORITHMS; ATTACKS;
D O I
10.1007/s11276-017-1575-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Addressing communication reliability and security has always been of significant importance in wireless networks. Opportunistic routing(OR) protocols comprise a promising area of research that aims to improve the reliability of communications, particularly in lossy networks. The main concept behind OR protocols is to utilize the broadcast nature of the wireless medium and determine a group of neighboring node candidates, known as candidate set, to collaboratively forward packets towards the destination using a candidate coordination approach. However, similar to traditional routing protocols, OR protocols operate poorly in the presence of malicious nodes and attackers. Therefore, researchers have designed and developed a number of security enhancements, considering the specific characteristics of such protocols. In this paper, following a brief overview on OR protocols, we examine, classify, and compare the different categories of security approaches proposed for OR protocols. More precisely, we divide security-related OR protocols into three categories, including trust-based approaches, game-theory-oriented solutions, and other related protocols. Furthermore, the most significant algorithms of each category are investigated as case studies. Finally, a comparison of different protocols is presented considering the main features, advantages, and shortcomings of each protocol.
引用
收藏
页码:559 / 571
页数:13
相关论文
共 37 条
[1]  
Agrawal S., 2011, ARXIV11055623
[2]  
[Anonymous], 2010, P IEEE GLOBECOM
[3]  
[Anonymous], AD HOC NETW, DOI DOI 10.1016/S1570-8705(03)00008-8
[4]  
[Anonymous], 2009, GLOBECOM 2009
[5]   Reliable routing against selective packet drop attack in DSR based MANET [J].
Bhalaji, N. ;
Shanmugam, A. .
Journal of Software, 2009, 4 (06) :536-543
[6]   Opportunistic routing in multi-hop wireless networks [J].
Biswas, S ;
Morris, R .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2004, 34 (01) :69-74
[7]   Opportunistic Routing in Wireless Networks: Models, Algorithms, and Classifications [J].
Boukerche, Azzedine ;
Darehshoorzadeh, Amir .
ACM COMPUTING SURVEYS, 2015, 47 (02)
[8]   Routing protocols in ad hoc networks: A survey [J].
Boukerche, Azzedine ;
Turgut, Begumhan ;
Aydin, Nevin ;
Ahmad, Mohammad Z. ;
Boeloeni, Ladislau ;
Turgut, Damla .
COMPUTER NETWORKS, 2011, 55 (13) :3032-3080
[9]   Trading structure for randomness in wireless opportunistic routing [J].
Chachulski, Szymon ;
Jennings, Michael ;
Katti, Sachin ;
Katabi, Dina .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2007, 37 (04) :169-180
[10]   A survey on game theory applications in wireless networks [J].
Charilas, Dimitris E. ;
Panagopoulos, Athanasios D. .
COMPUTER NETWORKS, 2010, 54 (18) :3421-3430