Skip to main content
Log in

Towards a novel trust-based opportunistic routing protocol for wireless networks

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Opportunistic routing is a promising research area in the context of wireless network communications. Security and trustworthy of routing in this field, however, needs to be considerably researched . In this paper, a novel trust establishment algorithm is proposed, designed, and implemented specifically for opportunistic routing protocols which benefits from direct interactions between wireless nodes. The proposed trust model benefits from a novel watchdog mechanism considering not only forwarding behaviour of nodes but also the quality of links between them. Furthermore, three different metrics for next hop selection is introduced enabling nodes to select their next hop forwarders more sophisticatedly using quality of links, geographical location of nodes, and their trust level. Extensive simulation results represent that proposed model can significantly improve the performance of network communications when malicious nodes try to collapse the system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Attar, A., Tang, H., Vasilakos, A. V., Yu, F. R., & Leung, V. C. (2012). A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE, 100(12), 3172–3186.

    Article  Google Scholar 

  2. Biswas, S., & Morris, R. (2004). Opportunistic routing in multi-hop wireless networks. ACM SIGCOMM Computer Communication Review, 34(1), 69–74.

    Article  Google Scholar 

  3. Boukerch, A., Xu, L., & EL-Khatib, K. (2007). Trust-based security for wireless ad hoc and sensor networks. Computer Communications, 30(1112), 2413–2427. special issue on security on wireless ad hoc and sensor networks.

    Article  Google Scholar 

  4. Boukerche, A., & Darehshoorzadeh, A. (2014). Opportunistic routing in wireless networks: Models, algorithms, and classifications. ACM Computing Surveys (CSUR), 47(2), 22.

    Article  Google Scholar 

  5. Boukerche, A., & Ren, Y. (2008). A trust-based security system for ubiquitous and pervasive computing environments. Computer Communications, 31(18), 4343–4351.

    Article  Google Scholar 

  6. Boukerche, A., Ren, Y., & Pazzi, R. W. N. (2009). An adaptive computational trust model for mobile ad hoc networks. In Proceedings of the 2009 international conference on wireless communications and mobile computing: Connecting the world wirelessly (pp. 191–195). ACM.

  7. Boukerche, A., Turgut, B., Aydin, N., Ahmad, M. Z., Blni, L., & Turgut, D. (2011). Routing protocols in ad hoc networks: A survey. Computer Networks, 55(13), 3032–3080.

    Article  Google Scholar 

  8. Buchegger, S., & Le Boudec, J. Y. (2002). Performance analysis of the confidant protocol. In Proceedings of the 3rd ACM international symposium on mobile ad hoc networking and computing (pp. 226–236). ACM.

  9. Cho, J. H., Swami, A., & Chen, R. (2011). A survey on trust management for mobile ad hoc networks. Communications Surveys and Tutorials, IEEE, 13(4), 562–583.

    Article  Google Scholar 

  10. Darehshoorzadeh, A., & Boukerche, A. (2014). An efficient heuristic candidate selection algorithm for opportunistic routing in wireless multihop networks. In IEEE symposium on Computers and communication (ISCC), 2014. (pp. 1–6). IEEE.

  11. Darehshoorzadeh, A., & Cerda-Alabern, L. (2012). Distance progress based opportunistic routing for wireless mesh networks. In 8th International wireless communications and mobile computing conference (IWCMC), 2012. (pp. 179–184). IEEE.

  12. Darehshoorzadeh, A., Almulla, M., Boukerche, A., & Chaiwala, S. (2013). On the number of candidates in opportunistic routing for multi-hop wireless networks. In Proceedings of the 11th ACM international symposium on mobility management and wireless access (pp. 9–16). ACM.

  13. Deng, H., Li, W., & Agrawal, D. P. (2002). Routing security in wireless ad hoc networks. Communications Magazine, IEEE, 40(10), 70–75.

    Article  Google Scholar 

  14. Dubois-Ferrière, H., Grossglauser, M., & Vetterli, M. (2007). Least-cost opportunistic routing. Tech. rep.

  15. Dubois-Ferrière, H., Grossglauser, M., & Vetterli, M. (2011). Valuable detours: Least-cost anypath routing. Networking, IEEE/ACM Transactions on, 19(2), 333–346.

    Article  Google Scholar 

  16. Fall, K., & Varadhan, K. (2005). The ns manual (formerly ns notes and documentation). The VINT project 47.

  17. Füßler, H., Widmer, J., Käsemann, M., Mauve, M., & Hartenstein, H. (2003). Contention-based forwarding for mobile ad hoc networks. Ad Hoc Networks, 1(4), 351–369.

    Article  Google Scholar 

  18. Ganeriwal, S., Balzano, L. K., & Srivastava, M. B. (2008). Reputation-based framework for high integrity sensor networks. ACM Transactions on Sensor Networks (TOSN), 4(3), 15.

    Article  Google Scholar 

  19. Ghosh, T., Pissinou, N., & Makki, K. (2005). Towards designing a trusted routing solution in mobile ad hoc networks. Mobile Networks and Applications, 10(6), 985–995.

    Article  Google Scholar 

  20. He, Q., Wu, D., & Khosla, P. (2004). Sori: A secure and objective reputation-based incentive scheme for ad-hoc networks. In Wireless communications and networking conference, 2004. WCNC. 2004 IEEE (vol 2. pp. 825–830). IEEE.

  21. Hsu, C. J., Liu, H. I., & Seah, W. K. (2011). Opportunistic routing-a review and the challenges ahead. Computer Networks, 55(15), 3592–3603.

    Article  Google Scholar 

  22. Li, F., & Wu, J. (2007). Mobility reduces uncertainty in manets. In INFOCOM 2007. 26th IEEE International conference on computer communications. IEEE (pp. 1946–1954). IEEE.

  23. Li, J., Jannotti, J., De Couto, D. S. J., Karger, D. R., & Morris, R. (2000). A scalable location service for geographic ad hoc routing. In Proceedings of the 6th annual international conference on mobile computing and networking (pp. 120–130). New York, NY, USA: ACM, MobiCom ’00.

  24. Li, N., & Das, S. K. (2013). A trust-based framework for data forwarding in opportunistic networks. Ad Hoc Networks, 11(4), 1497–1509.

    Article  Google Scholar 

  25. Li, P., Guo, S., Yu, S., & Vasilakos, A. V. (2014). Reliable multicast with pipelined network coding using opportunistic feeding and routing. IEEE Transactions on Parallel and Distributed Systems, 25(12), 3264–3273.

    Article  Google Scholar 

  26. Liu, H., Zhang, B., Mouftah, H. T., Shen, X., & Ma, J. (2009). Opportunistic routing for wireless ad hoc and sensor networks: Present and future directions. Communications Magazine, IEEE, 47(12), 103–109.

    Article  Google Scholar 

  27. Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual international conference on mobile computing and networking (pp. 255–265). ACM.

  28. Michiardi, P., & Molva, R. (2002). Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In B. Jerman-Blažič & T. Klobučar (Eds.), Advanced communications and multimedia security (pp. 107–121). New York: Springer.

    Chapter  Google Scholar 

  29. Nguyen, H. A., & Giordano, S. (2009). Routing in opportunistic networks. International Journal of Ambient Computing and Intelligence (IJACI), 1(3), 19–38.

    Article  Google Scholar 

  30. Pelusi, L., Passarella, A., & Conti, M. (2006). Opportunistic networking: data forwarding in disconnected mobile ad hoc networks. Communications Magazine, IEEE, 44(11), 134–141.

    Article  Google Scholar 

  31. Rozner, E., Seshadri, J., Mehta, Y., & Qiu, L. (2009). Soar: Simple opportunistic adaptive routing protocol for wireless mesh networks. Mobile Computing, IEEE Transactions on, 8(12), 1622–1635.

    Article  Google Scholar 

  32. Salehi, M., & Boukerche, A. (2014). Trust-aware opportunistic routing protocol for wireless networks. In Proceedings of the 10th ACM symposium on QoS and security for wireless and mobile networks (pp. 79–86). New York, NY, USA: ACM, Q2SWinet ’14.

  33. Salehi, M., & Samavati, H. (2012). Dsr vs olsr: Simulation based comparison of ad hoc reactive and proactive algorithms under the effect of new routing attacks. In 6th International conference on next generation mobile applications, services and technologies (NGMAST), 2012. (pp. 100–105). IEEE.

  34. Shafer, G., et al. (1976). A mathematical theory of evidence (Vol. 1). Princeton: Princeton University Press.

    MATH  Google Scholar 

  35. Wei, Z., Yu, F. R., & Boukerche, A. (2014). Trust based security enhancements for vehicular ad hocnetworks. In Proceedings of the fourth ACM international symposium on development and analysis of intelligent vehicular networks and applications (pp. 103–109). ACM.

  36. Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for internet of things. Journal of Network and Computer Applications, 42, 120–134.

    Article  Google Scholar 

  37. Yan, Z., Zhang, P., & Vasilakos, A. V. (2015). A security and trust framework for virtualized networks and software-defined networking. Security and Communication Networks. doi:10.1002/sec.1243.

    Google Scholar 

  38. Yang, S., Zhong, F., Yeo, C. K., Lee, B. S., & Boleng, J. (2009) Position based opportunistic routing for robust data delivery in manets. In Global telecommunications conference, 2009. GLOBECOM 2009. IEEE (pp. 1–6). IEEE.

  39. Yu, H., Shen, Z., Miao, C., Leung, C., & Niyato, D. (2010). A survey of trust and reputation management systems in wireless communications. Proceedings of the IEEE, 98(10), 1755–1772.

    Article  Google Scholar 

  40. Zhang, J. (2011). A survey on trust management for vanets. In IEEE International conference on advanced information networking and applications (AINA), 2011. (pp. 105–112). IEEE.

  41. Zhong, Z., Wang, J., Nelakuditi, S., & Lu, G. H. (2006). On selection of candidates for opportunistic anypath forwarding. ACM SIGMOBILE Mobile Computing and Communications Review, 10(4), 1–2.

    Article  Google Scholar 

Download references

Acknowledgments

This work is partially supported by NSERC, the Canada Research Chair program, ORF funds, and EAR Research Award.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mahmood Salehi.

Ethics declarations

Conflict of interest

The authors have no conflict of interests.

Human and animal rights

The research doesn’t involve any human participants and/or animals.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Salehi, M., Boukerche, A., Darehshoorzadeh, A. et al. Towards a novel trust-based opportunistic routing protocol for wireless networks. Wireless Netw 22, 927–943 (2016). https://doi.org/10.1007/s11276-015-1010-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-015-1010-4

Keywords

Navigation