Skip to main content
Top

2017 | OriginalPaper | Chapter

A Credibility Evaluation Method in Opportunistic Networks

Authors : Jinxia Dou, Wenbin Yao, Dongbin Wang

Published in: Cloud Computing and Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

There are lots of misbehaving nodes in opportunistic networks which can cause severe performance downgrade. Those misbehaving nodes contains malicious nodes and selfish nodes. Selfish nodes don’t cooperate in routing and forwarding. Malicious nodes drop data packets or forward lots of garbage packets hindering the normal process of data forwarding. In order to improve network performance, a credibility evaluation method is proposed in this paper, named FICT. According to the FICT, familiar degree, intimate degree and contribution degree are defined to describe the social attributes of nodes. We use the number of contacts, connect time and PLR to calculate the value of the credibility of nodes. Just when the value of credibility is greater than or equal to the threshold, the node is selected to forward data packets. We performed simulation experiments with FICT method on the ONE. The simulation results show that by using the FICT method, the success rate of message delivery increases and the average latency of message delivery reduces. Especially when the number of misbehaving nodes becomes large, the FICT method can improve the performance of the networks significantly.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Xiong, Y.P., Sun, L.M., et al.: Opportunistic networks. J. Softw. 20(1), 124–137 (2009)CrossRef Xiong, Y.P., Sun, L.M., et al.: Opportunistic networks. J. Softw. 20(1), 124–137 (2009)CrossRef
2.
go back to reference Huang, C.M., Lan, K.C., et al.: A survey of opportunistic networks. In: International Conference on Advanced Information Networking and Applications, pp. 1672–1677. IEEE (2008) Huang, C.M., Lan, K.C., et al.: A survey of opportunistic networks. In: International Conference on Advanced Information Networking and Applications, pp. 1672–1677. IEEE (2008)
3.
go back to reference Spyropoulos, T., et al.: Efficient routing in intermittently connected mobile networks. IEEE/ACM Trans. Netw. 16(1), 77–90 (2008)CrossRef Spyropoulos, T., et al.: Efficient routing in intermittently connected mobile networks. IEEE/ACM Trans. Netw. 16(1), 77–90 (2008)CrossRef
4.
go back to reference Li, Q., et al.: A routing protocol for socially selfish delay tolerant networks. Ad Hoc Netw. 10(1), 1619–1632 (2012)CrossRef Li, Q., et al.: A routing protocol for socially selfish delay tolerant networks. Ad Hoc Netw. 10(1), 1619–1632 (2012)CrossRef
5.
go back to reference Wang, B., et al.: Trust-based minimum cost opportunistic routing for Ad hoc networks. J. Syst. Softw. 84, 2107–2122 (2011)CrossRef Wang, B., et al.: Trust-based minimum cost opportunistic routing for Ad hoc networks. J. Syst. Softw. 84, 2107–2122 (2011)CrossRef
6.
go back to reference Hu, Y., Perrig, A.: A survey of secure wireless Ad hoc routing. IEEE Secur. Priv. 2(3), 28–39 (2004)CrossRef Hu, Y., Perrig, A.: A survey of secure wireless Ad hoc routing. IEEE Secur. Priv. 2(3), 28–39 (2004)CrossRef
7.
go back to reference Wu, Y., Li, J.H., et al.: Survey of security and trust in opportunistic networks. J. Comput. Res. Dev. 50(2), 278–290 (2013) Wu, Y., Li, J.H., et al.: Survey of security and trust in opportunistic networks. J. Comput. Res. Dev. 50(2), 278–290 (2013)
8.
go back to reference Conti, M., Kumar, M.: Opportunities in opportunistic computing. Computer 43(1), 42–50 (2010)CrossRef Conti, M., Kumar, M.: Opportunities in opportunistic computing. Computer 43(1), 42–50 (2010)CrossRef
9.
go back to reference Trifunovic, S., Legendre, F., et al.: Social trust in opportunistic networks. In: INFOCOM IEEE Conference on Computer Communications Workshops, pp. 1–6. IEEE (2010) Trifunovic, S., Legendre, F., et al.: Social trust in opportunistic networks. In: INFOCOM IEEE Conference on Computer Communications Workshops, pp. 1–6. IEEE (2010)
10.
go back to reference Mtibaa, A., Harras, K.A.: Social-based trust in mobile opportunistic networks. In: Proceedings of IEEE Simna (2011) Mtibaa, A., Harras, K.A.: Social-based trust in mobile opportunistic networks. In: Proceedings of IEEE Simna (2011)
11.
go back to reference Becker, C., Schlinga, S., et al.: Trustful data forwarding in social opportunistic networks. In: 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing, and 10th International Conference on Autonomic and Trusted Computing (UIC/ATC), pp. 430–437. IEEE (2013) Becker, C., Schlinga, S., et al.: Trustful data forwarding in social opportunistic networks. In: 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing, and 10th International Conference on Autonomic and Trusted Computing (UIC/ATC), pp. 430–437. IEEE (2013)
12.
go back to reference Bigwood, G., Henderson, T.: IRONMAN: using social networks to add incentives and reputation to opportunistic networks. In: 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust (PASSAT), and 2011 IEEE Third International Conference on Social Computing (Social Com), pp. 65–72. IEEE (2011) Bigwood, G., Henderson, T.: IRONMAN: using social networks to add incentives and reputation to opportunistic networks. In: 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust (PASSAT), and 2011 IEEE Third International Conference on Social Computing (Social Com), pp. 65–72. IEEE (2011)
13.
go back to reference Gupta, S., Dhurandher, S.K., et al.: Trust-based security protocol against black hole attacks in opportunistic networks. In: 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 724–729. IEEE, Lyon (2013) Gupta, S., Dhurandher, S.K., et al.: Trust-based security protocol against black hole attacks in opportunistic networks. In: 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 724–729. IEEE, Lyon (2013)
14.
go back to reference Premalatha, S., Mary Anita Rajam, V.: Reputation management for data forwarding in opportunistic networks. In: 2014 International Conference on Computer Communication and Informatics (ICCCI), pp. 1–7. IEEE, Coimbatore (2014) Premalatha, S., Mary Anita Rajam, V.: Reputation management for data forwarding in opportunistic networks. In: 2014 International Conference on Computer Communication and Informatics (ICCCI), pp. 1–7. IEEE, Coimbatore (2014)
17.
go back to reference Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., Ren, K.: A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11, 2594–2608 (2016). doi:10.1109/TIFS.2016.2590944 CrossRef Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., Ren, K.: A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11, 2594–2608 (2016). doi:10.​1109/​TIFS.​2016.​2590944 CrossRef
18.
go back to reference Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27, 2546–2559 (2016). doi:10.1109/TPDS.2015.2506573 CrossRef Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27, 2546–2559 (2016). doi:10.​1109/​TPDS.​2015.​2506573 CrossRef
20.
Metadata
Title
A Credibility Evaluation Method in Opportunistic Networks
Authors
Jinxia Dou
Wenbin Yao
Dongbin Wang
Copyright Year
2017
DOI
https://doi.org/10.1007/978-3-319-68505-2_33

Premium Partner