Weitere Artikel dieser Ausgabe durch Wischen aufrufen
In this paper, a new way to a selection of the secure relay nodes in hybrid MANET–DTN networks based on the cooperation between routing, trust and game theory mechanisms is introduced. The hybrid MANET–DTN enables delivering the data or messages in the situation when communication paths are disconnected or broken and also in the emergency situations. We focus on the situations when MANET routing protocol cannot establish the end-to-end connection between source and destination nodes. In this situation, it is necessary to select relay nodes, that will be able to transport data or messages between isolated islands of mobile terminals with limited connectivity to other terminals. The proposed algorithm enables to select the relay nodes, that will come into contact with other mobile nodes located in different network areas with regards to trust and game theory. The parameter trust is computed for all mobile nodes and relies on a parameter obtained during routing and data transport processes. The game theory provides a powerful tool to select one candidate from a number of possible nodes with respect to confidence and security. Moreover, we propose a new mechanism to compute and select the trusted node, that can be used for transportation of the secure data in this hostile and disconnected environment. In order to verify the functionalities of this mechanism, we implement this mechanism into the OPNET modeler simulation environment and introduce performance analysis.
Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten
Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:
Cizmar, A., Dobos, L., & Papaj, J. (2012). Security and QoS integration model for MANETs. Computing and Informatics, 31(5), 1025–1044. ISSN 1335-9150.
Bhatt, U. R., Nema, N., & Upadhyay, R. (2014). Enhanced DSR an efficient routing protocol for MANET. Issues and challenges in intelligent computing techniques (ICICT) (pp. 215–219). doi: 10.1109/ICICICT.2014.6781282.
Jones, E. P. C., Li, L., Schmidtke, J. K., & Ward, P. A. S. (2007). Practical routing in delay-tolerant networks. IEEE Mobile Computing, 6(8), 943–959. CrossRef
Brida, P., Machaj, J., & Benikovsky, J. (2014). A modular localization system as a positioning service for road transport. International Journal of Antennas and Propagation, Sensors, 14(11), 20274–20296. ISSN 1424-8220.
Papaj, J., Dobos, L., & Cizmar, A. (2012). Routing strategies in opportunistic networks. Journal of Electrical and Electronics Engineering, 5(1), 167–172. ISSN 1844-6035.
Kurth, J. P., Zubow, A., & Redlich, J. P. (2008). Cooperative opportunistic routing using transmit diversity in wireless mesh networks. In INFOCOM 2008, The 27th Conference on Computer Communications, IEEE (2008) (pp. 1310–1318). doi: 10.1109/INFOCOM.2007.188.
Whitbeck, J., & Conan, V. (2009). HYMAD hybrid DTN-MANET routing for dense and highly dynamic wireless networks. In IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops (WoWMoM 2009) (pp. 1–7). doi: 10.1109/WOWMOM.2009.5282448.
Raffelsberger, C., & Hellwagner, H. (2013). A hybrid MANET-DTN routing scheme for emergency response scenarios. In Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM '13) (pp. 505–510). doi: 10.1109/PerComW.2013.6529549.
Ni, X., Lan, K., & Malaney, R. (2008). On the performance of expected transmission count (ETX) for wireless mesh networks. In Proceedings of the 3rd international conference on performance evaluation methodologies and tools, Belgium.
Fang, X., Yang, D., Gundecha, P., & Xue, G. (2010). Multi-constrained anypath routing in wireless mesh networks. In 7th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (pp. 1–9). doi: 10.1109/SECON.2010.5508266.
Govindan, K., & Mohapatra, P. (2012). Trust computations and trust dynamics in mobile adhoc networks: A survey, communications surveys and tutorials. IEEE, 14(2), 279–298. ISSN 1553-877X.
Li, Y., Chen, W., & Zhang, Z. L. (2009). Optimal forwarder list selection in opportunistic routing. In IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, MASS '09 (pp. 670–675). doi: 10.1109/MOBHOC.2009.5336939.
De Rango, F., Amelio, S., & Fazio, P. (2015). Epidemic strategies in delay tolerant networks from an energetic point of view: Main issues and performance evaluation. Journal of Networks, 10(01), 4–14. CrossRef
Maia, S. L. F., Silva, E. R., & Guardieiro, P. R. (2014). A new optimization strategy proposal for multi-copy forwarding in energy constrained DTNs. IEEE Communications Letters, 18(9), 1623–1626. CrossRef
Thorat, M., Sandeep, A., & Kulkarni, P. J. (2014). Design issues in trust based routing for MANET. In 5th International Conference on Computing Communication and Networking Technologies, ICCCNT 2014 (pp. 1–7). doi: 10.1109/ICCCNT.2014.6963101.
Xia, H., Jia, Z., Li, X., Ju, L., & Sha, E. (2013). Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Networks, 11(7), 2096–2114. ISSN 1570-8705.
Trifunovic, S., Legendre, F., & Anastasiades, C. (2010). Social trust in opportunistic networks. In INFOCOM IEEE Conference on Computer Communications Workshops (pp. 1–6). doi: 10.1109/INFCOMW.2010.5466696.
Guanghao, W., & Yue, W. (2014). BIBRM: A Bayesian inference based road message trust model in vehicular ad hoc networks. In Trust, security and privacy in computing and communications (TrustCom) (pp. 481–486). IEEE.
Zhexiong, W., Tang, H., Yu, F. R., & Mason, P. (2014). Trust establishment based on Bayesian networks for threat mitigation in mobile ad hoc networks. In Military communications conference (MILCOM) (pp. 171–177). IEEE.
Baras, J. S., & Tao, J. (2004). Cooperative games, phase transitions on graphs and distributed trust in MANET. CDC, 1, 93–98.
Ben-Jy, Ch., & Szu-Liang, K. (2009). Markov chain trust model for trust-value analysis and key management in distributed multicast MANETs. IEEE Vehicular Technology, 58(4), 1846–1863. CrossRef
Estahbanati, M. M., Rasti, M., & Hamami, S. M. S. (2014). A mobile ad hoc network routing based on energy and Markov chain trust. In Telecommunications (IST), 2014 7th International Symposium on (pp. 596–601). doi: 10.1109/ISTEL.2014.7000775.
Lupia, A., & De Rango, F. (2015). Evaluation of the energy consumption introduced by a trust management scheme on mobile ad-hoc networks. Journal of Networks, 10(4), 240–251. CrossRef
Eissa, T., Razak, A., Khokhar, R. S., & Samian, N. (2011). Trust-based routing mechanism in MANET: Design and implementation. Berlin: Springer.
Rashidi, R., Jamali, M. A. J., Salmasi, A., & Tati, R. (2009). Trust routing protocol based on congestion control in MANET. In International Conference on Application of Information and Communication Technologies (pp. 1–50). doi: 10.1109/ICAICT.2009.5372623.
Xia, H., Yu, J., Zhang, Z.-Y., Cheng, X. G., Pan, Z. K. (2014). Trust-enhanced multicast routing protocol based on node's behavior assessment for MANETs. In Trust, security and privacy in computing and communications (TrustCom) (pp. 473–480). doi: 10.1109/TrustCom.2014.60.
Azer, M. A., El-Kassas, S. M., Hassan, A. W. F., & El-Soudani, M. (2008). A survey on trust and reputation schemes in ad hoc networks. In ARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings (pp. 881–886). doi: 10.1109/ARES.2008.180.
Liang, X., & Xiao, Y. (2013). Game theory for network security. IEEE Communications Surveys & Tutorials, 15(1), 472–486. CrossRef
Santosh, N., Saranyan, R., Senthil, K. P., & Vetriselvi, V. (2008). Cluster based co-operative game theory approach for intrusion detection in mobile ad-hoc grid. In Proceedings of the 2008 16th International Conference on Advanced Computing and Communications, ADCOM 2008 (pp. 273–278). doi: 10.1109/ADCOM.2008.4760460.
Li, F., Yang, Y., & Wu, J. (2010). Attack and flee: Game-theory-based analysis on interactions among nodes in MANETs. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), 40, 612–622. CrossRef
OPNET Modeler Simulator. http://www.opnet.com.
Sok, P., Tan, S., & Kim, K. (2013). PRoPHET routing protocol based on neighbor node distance using a community mobility model in delay tolerant networks. High performance computing and communications (pp. 1233–1240).
Scott, K., & Burleigh, S. (2007). Bundle protocol specification, RFC5050. https://tools.ietf.org/html/rfc5050.
- Hybrid MANET–DTN and a New Algorithm for Relay Nodes Selection
- Springer US