Cryptography-Based Misbehavior Detection and Trust Control Mechanism for Opportunistic Network Systems

被引:24
作者
Dhurandher, Sanjay K. [1 ]
Kumar, Arun [1 ]
Obaidat, Mohammad S. [2 ]
机构
[1] Univ Delhi, Div Informat Technol, CAITFS, NSIT, Delhi 110021, India
[2] Fordham Univ, Dept Comp & Informat Sci, Bronx, NY 10458 USA
来源
IEEE SYSTEMS JOURNAL | 2018年 / 12卷 / 04期
关键词
Computer network systems; delay tolerant networks (DTNs); misbehavior detection; modeling and simulation; opportunistic network (OppNet) systems; trust control mechanisms; ATTACKS; SCHEME;
D O I
10.1109/JSYST.2017.2720757
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Opportunistic networks (OppNets) are a subclass of delay tolerant networks and are characterized by intermittent end-to-end connections. The sparsity in the network and the resource constraint of devices always restricts the use of cryptographic solutions for security needs in the OppNets for thwarting selfishness of the nodes. The trust-based mechanisms are capable of providing social security in terms of access control in the network. But the trust-based protocols do not solve the problem of isolating, avoiding, and detecting the malicious intent nodes with the provision of security services such as authentication, confidentiality, and message integrity through cryptographic means. In this work, a robust and scalable infrastructure based security overlay is designed over the base trust-based routing for detecting malicious nodes and providing security services through the established cryptographic mechanism. The proposed security-based algorithm is general enough to accommodate and use latest cryptographic techniques in trust-based routing for ensuring more participation through building confidence in the network. The simulation results are taken using ONE simulator and the results confirm that the application of security overlay above the base trust-based protocol helps in increasing the average performance by 35%.
引用
收藏
页码:3191 / 3202
页数:12
相关论文
共 34 条
[1]   Lightweight Sybil Attack Detection in MANETs [J].
Abbas, Sohail ;
Merabti, Madjid ;
Llewellyn-Jones, David ;
Kifayat, Kashif .
IEEE SYSTEMS JOURNAL, 2013, 7 (02) :236-248
[2]   An Obfuscation-Based Approach for Protecting Location Privacy [J].
Ardagna, Claudio A. ;
Cremonini, Marco ;
di Vimercati, Sabrina De Capitani ;
Samarati, Pierangela .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (01) :13-27
[3]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[4]  
Bigwood G., 2011, Proceedings of the 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and IEEE Third International Conference on Social Computing (PASSAT/SocialCom 2011), P65, DOI 10.1109/PASSAT/SocialCom.2011.60
[5]  
Boldrini Chiara, 2011, Performance Evaluation of Computer and Communication Systems. Milestones and Future Challenges. IFIP WG 6.3/7.3 International Workshop, PERFORM 2010 in Honor of Gunter Haring on the Occasion of His Emeritus Celebration. Revised Selected Papers, P141, DOI 10.1007/978-3-642-25575-5_12
[6]  
Boneh D., 2004, ADV CRYPTOLOGY EUROC
[7]  
Daly E, 2007, MOBIHOC'07: PROCEEDINGS OF THE EIGHTH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING, P32
[8]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[9]   Efficient Authentication and Key Agreement Protocol with Anonymity for Delay Tolerant Networks [J].
Ding, Yan ;
Zhou, Xian-wei ;
Cheng, Zhi-mi ;
Zeng, Wen-lu .
WIRELESS PERSONAL COMMUNICATIONS, 2013, 70 (04) :1473-1485
[10]  
Dora L., 2010, P 2 INT WORKSHOP MOB, P135