Security and trust management in opportunistic networks: a survey

被引:47
|
作者
Wu, Yue [1 ]
Zhao, Yimeng [2 ]
Riguidel, Michel [2 ]
Wang, Guanghao [1 ]
Yi, Ping [1 ]
机构
[1] Shanghai Jiao Tong Univ, Natl Engn Lab Informat Content Anal, Shanghai 200240, Peoples R China
[2] Telecom Paristech, Dept Network & Comp Sci, F-75013 Paris, France
基金
美国国家科学基金会;
关键词
opportunistic networks; security; authentication; privacy; trust management; incentive mechanism; HOC; COOPERATION;
D O I
10.1002/sec.1116
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As a new networking paradigm, opportunistic networking communications have great vision in animal migration tracking, mobile social networking, network communications in remote areas and intelligent transportation, and so on. Opportunistic networks are one of the evolutionary mobile ad hoc networks, whose communication links often suffer from frequent disruption and long communication delays. Therefore, many opportunistic forwarding protocols present major security issues, and the design of opportunistic networks faces serious challenges such as how to effectively protect data confidentiality and integrity and how to ensure routing security, privacy, cooperation, and trust management. In this paper, we first systematically describe the security threats and requirements in opportunistic networks; then propose a general security architecture of opportunistic networks; and then make an in-depth analysis on authentication and access control, secure routing, privacy protection, trust management, and incentive cooperation mechanisms; and at the same time, we present a comparison of various security and trust solutions for opportunistic networks. Finally, we conclude and give future research directions. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:1812 / 1827
页数:16
相关论文
共 50 条
  • [21] Security and Trust Management in MANET
    Singh, Akash
    Maheshwari, Manish
    Nikhil
    Kumar, Neeraj
    INFORMATION TECHNOLOGY AND MOBILE COMMUNICATION, 2011, 147 : 384 - 387
  • [22] Design Guidelines on Trust Management for Underwater Wireless Sensor Networks
    Zhu, Rongxin
    Boukerche, Azzedine
    Long, Libo
    Yang, Qiuling
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2024, 26 (04): : 2547 - 2576
  • [23] Reducing the Negative Effect of Malicious Nodes in Opportunistic Networks Using Reputation Based Trust Management
    Barai, Smritikona
    Boral, Nupur
    Bhaumik, Parama
    INNOVATIONS IN BIO-INSPIRED COMPUTING AND APPLICATIONS, 2019, 939 : 339 - 349
  • [24] Survey on Interoperability, Security, Trust, Privacy Standardization of Cloud Computing
    Saravanakumar, C.
    Arun, C.
    2014 INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2014, : 977 - 982
  • [25] A Survey on Security, Privacy, Trust, and Architectural Challenges in IoT Systems
    Adam, Mumin
    Hammoudeh, Mohammad
    Alrawashdeh, Rana
    Alsulaimy, Basil
    IEEE ACCESS, 2024, 12 : 57128 - 57149
  • [26] A review of trust management, security and privacy policy languages
    De Coi, Juri Luca
    Olmedilla, Daniel
    SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 483 - 490
  • [27] Management and applications of trust in Wireless Sensor Networks: A survey
    Han, Guangjie
    Jiang, Jinfang
    Shu, Lei
    Niu, Jianwei
    Chao, Han-Chieh
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2014, 80 (03) : 602 - 617
  • [28] Security and trust issues in Fog computing: A survey
    Zhang, PeiYun
    Zhou, MengChu
    Fortino, Giancarlo
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 88 : 16 - 27
  • [29] Trust and reputation management in cognitive radio networks: a survey
    Ling, Mee Hong
    Yau, Kok-Lim Alvin
    Poh, Geong Sen
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 2160 - 2179
  • [30] Security management based on trust determination in cognitive radio networks
    Jianwu Li
    Zebing Feng
    Zhiqing Wei
    Zhiyong Feng
    Ping Zhang
    EURASIP Journal on Advances in Signal Processing, 2014