Disjoint Multipath Based Secure Routing in Opportunistic Networks

被引:4
作者
Dhurandher, Sanjay K. [1 ]
Singh, Jagdeep [2 ]
Woungang, Isaac [3 ]
Rodrigues, Joel J. P. C. [4 ,5 ]
机构
[1] Netaji Subhas Univ Technol, Dept Informat Technol, New Delhi, India
[2] Univ Delhi, Netaji Subhas Inst Technol, Div Informat Technol, New Delhi, India
[3] Ryerson Univ, Dept Comp Sci, Toronto, ON, Canada
[4] Fed Univ Piaui UFPI, Teresina, PI, Brazil
[5] Inst Telecomunicacoes, Lisbon, Portugal
来源
JOURNAL OF INTERNET TECHNOLOGY | 2019年 / 20卷 / 06期
基金
加拿大自然科学与工程研究理事会;
关键词
Opportunistic Networks (OppNets); Security; Routing; Disjoint path; Real mobility data traces; PATH; PROTOCOL; SCHEME;
D O I
10.3966/160792642019102006001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Opportunistic Networks (OppNets) are composed of wireless nodes opportunistically communicating with each other. These networks are designed to operate in a challenging environment characterized by high delay, intermittent connectivity, and no-guarantee of fixed path between the sender and destination nodes. One of the most vital issues in designing such a network is the security of the messages flowing in it. This paper proposes a new method called Disjoint Multipath based Secure Routing in Opportunistic Networks, called as D-MUST, which relays the message to the destination through four disjoint paths; each applying a soft-encryption technique to prevent message fabrication attacks. Simulations are conducted using the HAGGLE INFOCOM 2006 real mobility data traces, showing that when time-to-live is varied, (1) the proposed D-MUST scheme outperforms RSASec by 15.05%, 8.4%, 5.81% 2.16% respectively in terms of delivery probability, hop count, messages dropped and average latency; (2) it also outperforms SHBPR by 16.17%, 9.2%, 6.85%, 3.95% respectively in terms of delivery probability, hop count, messages dropped and average latency.
引用
收藏
页码:1683 / 1692
页数:10
相关论文
共 27 条
  • [1] Single-path and multi-path label switched path allocation algorithms with quality-of-service constraints: performance analysis and implementation in NS2
    Adami, D.
    Callegari, C.
    Giordano, S.
    Pagano, M.
    [J]. IET COMMUNICATIONS, 2012, 6 (04) : 398 - 407
  • [2] [Anonymous], 2003, P 23 INT C DISTR COM
  • [3] [Anonymous], 2000, CS200006
  • [4] Bagula AB, 2008, LECT NOTES COMPUT SC, V5061, P453, DOI 10.1007/978-3-540-69293-5_36
  • [5] Boldrini C, 2007, I S WORLD WIREL MOBI, P78
  • [6] An Energy-Saving Node Communicability Computation Scheme in Opportunistic Mobile Social Networks Using Cloud Assistance
    Cai, Qingsong
    Bai, Yuqing
    Han, Guangjie
    Pak, Chun-hyok
    Zhao, Hai
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (05): : 929 - 938
  • [7] Dhurandher Sanjay K., 2009, Proceedings of the 2009 International Conference on Advances in Computing, Control, & Telecommunication Technologies (ACT 2009), P189, DOI 10.1109/ACT.2009.55
  • [8] Cryptography-Based Misbehavior Detection and Trust Control Mechanism for Opportunistic Network Systems
    Dhurandher, Sanjay K.
    Kumar, Arun
    Obaidat, Mohammad S.
    [J]. IEEE SYSTEMS JOURNAL, 2018, 12 (04): : 3191 - 3202
  • [9] Dias JA, 2011, IEEE GLOBE WORK, P51, DOI 10.1109/GLOCOMW.2011.6162504
  • [10] MMSPEED: Multipath multi-SPEED protocol for QoS guarantee of reliability and timeliness in wireless sensor networks
    Felemban, E
    Lee, CG
    Ekici, E
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2006, 5 (06) : 738 - 754