Security-oriented opportunistic data forwarding in Mobile Social Networks

被引:73
作者
Wu, Dapeng [1 ]
Zhang, Feng [1 ]
Wang, Honggang [2 ,3 ]
Wang, Ruyan [1 ]
机构
[1] Chongqing Univ Posts & Telecommun, Dept Commun & Informat Engn, Chongqing 400065, Peoples R China
[2] Univ Massachusetts, Dartmouth, MA 02747 USA
[3] Univ Massachusetts, Biomed Engn & Biotechnol PhD Program, Dartmouth, MA 02747 USA
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2018年 / 87卷
关键词
Mobile social networks; Malicious behavior detection; Trust and reputation management; Opportunistic forwarding; DELAY-TOLERANT NETWORKS; TRUST MANAGEMENT; RECOGNITION; PERSPECTIVE; FRAMEWORK; SYSTEM;
D O I
10.1016/j.future.2017.07.028
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years, Mobile Social Networks (MSNs) have been arising a growing interest in both scientific and industrial fields for its potential value. The effective data transmission of MSNs is generally achieved through opportunistic forwarding and node collaboration. However, malicious nodes may illegally intercept and drop the data packets which should be forwarded. Therefore, it is very challenging to detect these malicious nodes. In this paper, we proposed a new Resisting On-Off Attack Data Forwarding Mechanism (OADM) for MSNs to detect the on-off attack, which not only prevents malicious nodes from intercepting data packets, but also exploits the node collaboration to forward data packets. Our major contribution includes: (1) Exploiting Hidden Markov Model (HMM) model to learn node behaviors for the evaluation of attacking probabilities and node states; (2) Effective relay node selection based the estimation of node capability. Results show the proposed OADM can effectively identify the attacking behavior and collaborating states of nodes and significantly improve the data delivery rate of MSNs. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:803 / 815
页数:13
相关论文
共 48 条
[1]   Towards Location Privacy Awareness on Geo-Social Networks [J].
Alrayes, Fatma ;
Abdelmoty, Alia .
2016 10TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SECURITY AND TECHNOLOGIES (NGMAST), 2016, :105-114
[2]   A Unifying Perspective on Proximity-Based Cellular-Assisted Mobile Social Networking [J].
Andreev, Sergey ;
Hosek, Jiri ;
Olsson, Thomas ;
Johnsson, Kerstin ;
Pyattaev, Alexander ;
Ometov, Aleksandr ;
Olshannikova, Ekaterina ;
Gerasimenko, Mikhail ;
Masek, Pavel ;
Koucheryavy, Yevgeni ;
Mikkonen, Tommi .
IEEE COMMUNICATIONS MAGAZINE, 2016, 54 (04) :108-116
[3]  
[Anonymous], 2015, 2015 10 INT C INF CO
[4]  
[Anonymous], P IEEE INFOCOM BARC, DOI DOI 10.1109/INFOCOM.2006.172
[5]  
[Anonymous], I EL EL ENG INC IEEE
[6]  
[Anonymous], 2010, 2010 4 INT C BIOINF, DOI [10.1109/ICBBE.2010.5518267, DOI 10.1109/ICBBE.2010.5518267]
[7]   An Iterative Algorithm for Trust Management and Adversary Detection for Delay-Tolerant Networks [J].
Ayday, Erman ;
Fekri, Faramarz .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2012, 11 (09) :1514-1531
[8]  
Balasubramanian N, 2009, IMC'09: PROCEEDINGS OF THE 2009 ACM SIGCOMM INTERNET MEASUREMENT CONFERENCE, P280
[9]   Impact of human mobility on opportunistic forwarding algorithms [J].
Chaintreau, Augustin ;
Hui, Pan ;
Crowcroft, Jon ;
Diot, Christophe ;
Gass, Richard ;
Scott, James .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2007, 6 (06) :606-620
[10]   Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing [J].
Chen, Ing-Ray ;
Bao, Fenye ;
Chang, MoonJeong ;
Cho, Jin-Hee .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (05) :1200-1210