Disjoint Multipath Based Secure Routing in Opportunistic Networks

被引:4
作者
Dhurandher, Sanjay K. [1 ]
Singh, Jagdeep [2 ]
Woungang, Isaac [3 ]
Rodrigues, Joel J. P. C. [4 ,5 ]
机构
[1] Netaji Subhas Univ Technol, Dept Informat Technol, New Delhi, India
[2] Univ Delhi, Netaji Subhas Inst Technol, Div Informat Technol, New Delhi, India
[3] Ryerson Univ, Dept Comp Sci, Toronto, ON, Canada
[4] Fed Univ Piaui UFPI, Teresina, PI, Brazil
[5] Inst Telecomunicacoes, Lisbon, Portugal
来源
JOURNAL OF INTERNET TECHNOLOGY | 2019年 / 20卷 / 06期
基金
加拿大自然科学与工程研究理事会;
关键词
Opportunistic Networks (OppNets); Security; Routing; Disjoint path; Real mobility data traces; PATH; PROTOCOL; SCHEME;
D O I
10.3966/160792642019102006001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Opportunistic Networks (OppNets) are composed of wireless nodes opportunistically communicating with each other. These networks are designed to operate in a challenging environment characterized by high delay, intermittent connectivity, and no-guarantee of fixed path between the sender and destination nodes. One of the most vital issues in designing such a network is the security of the messages flowing in it. This paper proposes a new method called Disjoint Multipath based Secure Routing in Opportunistic Networks, called as D-MUST, which relays the message to the destination through four disjoint paths; each applying a soft-encryption technique to prevent message fabrication attacks. Simulations are conducted using the HAGGLE INFOCOM 2006 real mobility data traces, showing that when time-to-live is varied, (1) the proposed D-MUST scheme outperforms RSASec by 15.05%, 8.4%, 5.81% 2.16% respectively in terms of delivery probability, hop count, messages dropped and average latency; (2) it also outperforms SHBPR by 16.17%, 9.2%, 6.85%, 3.95% respectively in terms of delivery probability, hop count, messages dropped and average latency.
引用
收藏
页码:1683 / 1692
页数:10
相关论文
共 27 条
  • [21] H-SPREAD: A hybrid multipath scheme for secure and reliable data collection in wireless sensor networks
    Lou, Wenjing
    Kwon, Younggoo
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2006, 55 (04) : 1320 - 1330
  • [22] Routing Protocols for Delay Tolerant Networks: A Reference Architecture and a Thorough Quantitative Evaluation
    Massri, Khalil
    Vitaletti, Andrea
    Vernata, Alessandro
    Chatzigiannakis, Ioannis
    [J]. JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2016, 5 (02)
  • [23] Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing
    Narula, Prayag
    Dhurandher, Sanjay Kumar
    Misra, Sudip
    Woungang, Isaac
    [J]. COMPUTER COMMUNICATIONS, 2008, 31 (04) : 760 - 769
  • [24] On the Levy-Walk Nature of Human Mobility
    Rhee, Injong
    Shin, Minsu
    Hong, Seongik
    Lee, Kyunghan
    Kim, Seong Joon
    Chong, Song
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2011, 19 (03) : 630 - 643
  • [25] Sharma D.K., 2016, Recent Advances in Communications and Networking Technology, V5, P73, DOI [10.2174/2215081106666161206124014, DOI 10.2174/2215081106666161206124014]
  • [26] LA-MHR: Learning Automata Based Multilevel Heterogeneous Routing for Opportunistic Shared Spectrum Access to Enhance Lifetime of WSN
    Tanwar, Sudeep
    Tyagi, Sudhanshu
    Kumar, Neeraj
    Obaidat, Mohammad S.
    [J]. IEEE SYSTEMS JOURNAL, 2019, 13 (01): : 313 - 323
  • [27] Contact duration aware cache refreshing for mobile opportunistic networks
    Wang, Fang
    Wang, Zhaocheng
    Yang, Zhixing
    Chen, Sheng
    [J]. IET NETWORKS, 2016, 5 (04) : 93 - 103