Security and trust management in opportunistic networks: a survey

被引:47
|
作者
Wu, Yue [1 ]
Zhao, Yimeng [2 ]
Riguidel, Michel [2 ]
Wang, Guanghao [1 ]
Yi, Ping [1 ]
机构
[1] Shanghai Jiao Tong Univ, Natl Engn Lab Informat Content Anal, Shanghai 200240, Peoples R China
[2] Telecom Paristech, Dept Network & Comp Sci, F-75013 Paris, France
基金
美国国家科学基金会;
关键词
opportunistic networks; security; authentication; privacy; trust management; incentive mechanism; HOC; COOPERATION;
D O I
10.1002/sec.1116
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As a new networking paradigm, opportunistic networking communications have great vision in animal migration tracking, mobile social networking, network communications in remote areas and intelligent transportation, and so on. Opportunistic networks are one of the evolutionary mobile ad hoc networks, whose communication links often suffer from frequent disruption and long communication delays. Therefore, many opportunistic forwarding protocols present major security issues, and the design of opportunistic networks faces serious challenges such as how to effectively protect data confidentiality and integrity and how to ensure routing security, privacy, cooperation, and trust management. In this paper, we first systematically describe the security threats and requirements in opportunistic networks; then propose a general security architecture of opportunistic networks; and then make an in-depth analysis on authentication and access control, secure routing, privacy protection, trust management, and incentive cooperation mechanisms; and at the same time, we present a comparison of various security and trust solutions for opportunistic networks. Finally, we conclude and give future research directions. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:1812 / 1827
页数:16
相关论文
共 50 条
  • [41] A Survey of Trust Management for Internet of Things
    Konsta, Alyzia Maria
    Lafuente, Alberto Lluch
    Dragoni, Nicola
    IEEE ACCESS, 2023, 11 : 122175 - 122204
  • [42] Reputation Management for Data Forwarding in Opportunistic Networks
    Premalatha, S.
    Rajam, V. Mary Anita
    2014 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2014,
  • [43] A novel stereoscopic security architecture with Trust Management for wireless sensor networks
    Ma, Bin
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS, 2009, : 797 - 800
  • [44] Blockchain based distributed trust management in IoT and IIoT: a survey
    Lahbib, Asma
    Toumi, Khalifa
    Laouiti, Anis
    Martin, Steven
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (15) : 21867 - 21919
  • [45] A Survey on Blockchain-Based Trust Management for Internet of Things
    Liu, Yijia
    Wang, Jie
    Yan, Zheng
    Wan, Zhiguo
    Jantti, Riku
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (07) : 5898 - 5922
  • [46] Toward Zero-Trust Security for the Metaverse
    Cheng, Ruizhi
    Chen, Songqing
    Han, Bo
    IEEE COMMUNICATIONS MAGAZINE, 2024, 62 (02) : 156 - 162
  • [47] Routing Protocols in Opportunistic Networks - A Survey
    Alajeely, Majeed
    Doss, Robin
    Ahmad, Asma'a
    IETE TECHNICAL REVIEW, 2018, 35 (04) : 369 - 387
  • [48] Survey on Mobility Model of Opportunistic Networks
    Zhang, Sheng
    Yao, Ming-Hui
    Wang, Xin
    Khan, Imran
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND SENSOR NETWORKS (WCSN 2016), 2016, 44 : 475 - 483
  • [49] A Survey on Security in Wireless Mesh Networks
    Yi, Ping
    Wu, Yue
    Zou, Futai
    Liu, Ning
    IETE TECHNICAL REVIEW, 2010, 27 (01) : 6 - 14
  • [50] The Pervasive Trust Foundation for Security in Next Generation Networks
    Lilien, Leszek
    Al-Alawneh, Adawia
    Ben Othmane, Lotfi
    NEW SECURITY PARADIGMS WORKSHOP 2010, 2010, : 129 - 141