Security and Trust in Opportunistic Networks - A Survey

被引:13
作者
Alajeely, Majeed [1 ]
Doss, Robin [1 ]
Ahmad, Asma'a [1 ]
机构
[1] Deakin Univ, Sch Informat Technol, Geelong, Vic, Australia
关键词
denial-of-service attack; DTN; opportunistic networks; routing protocols; security; trust; AD-HOC NETWORKS; DELAY-TOLERANT NETWORKS; MANAGEMENT; ESTABLISHMENT; MISBEHAVIOR; ATTACKS; SCHEME;
D O I
10.1080/02564602.2015.1094383
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Opportunistic networks or OppNets refer to a number of wireless nodes opportunistically communicating with each other in a form of Store-Carry-Forward. This occurs when they come into contact with each other without proper network infrastructure. OppNets use wireless technologies, such as IEEE 802.11, WiMAX, Bluetooth, and other short-range radio communication. In OppNets, there is no end-to-end connection between the source and the destination nodes, and the nodes usually have high mobility, low density, limited power, short radio range, and often subject to different kinds of attacks by malicious nodes. Due to these characteristics and features, OppNets are subject to serious security challenges. OppNets strongly depend on human interaction; therefore, the success of securing such networks is based on trust between people. This survey includes the security approaches in OppNets and techniques used to increase their security levels.
引用
收藏
页码:256 / 268
页数:13
相关论文
共 25 条
[1]  
[Anonymous], 2012, J COMPUT INFORM SYST
[2]  
[Anonymous], IEEE INT C INT COMP
[3]  
[Anonymous], 2000, HDB SYSTEMIC AUTOIMM
[4]   Trust Management and Adversary Detection for Delay Tolerant Networks [J].
Ayday, Erman ;
Lee, Hanseung ;
Fekri, Faramarz .
MILITARY COMMUNICATIONS CONFERENCE, 2010 (MILCOM 2010), 2010, :1788-1793
[5]   Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks [J].
Baadache, Abderrahmane ;
Belmehdi, Ali .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (03) :1130-1139
[6]  
Bo W., 2011, J SYST SOFTWARE, V84, P2107
[7]   Self-policing mobile ad hoc networks by reputation systems [J].
Buchegger, S ;
Le Boudec, JY .
IEEE COMMUNICATIONS MAGAZINE, 2005, 43 (07) :101-107
[8]   Approach for modelling trust in cluster-based wireless ad hoc networks [J].
Chatterjee, Pushpita ;
Ghosh, Uttam ;
Sengupta, Indranil ;
Ghosh, Soumya K. .
IET NETWORKS, 2014, 3 (03) :187-192
[9]   Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks [J].
Cho, Jin-Hee ;
Swami, Ananthram ;
Chen, Ing-Ray .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (03) :1001-1012
[10]   Towards a reputation-based routing protocol to contrast blackholes in a delay tolerant network [J].
Dini, Gianluca ;
Lo Duca, Angelica .
AD HOC NETWORKS, 2012, 10 (07) :1167-1178