Skip to main content
Erschienen in: Wireless Networks 2/2019

11.09.2017

Secure opportunistic routing protocols: methods, models, and classification

verfasst von: Mahmood Salehi, Azzedine Boukerche

Erschienen in: Wireless Networks | Ausgabe 2/2019

Einloggen

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Addressing communication reliability and security has always been of significant importance in wireless networks. Opportunistic routing (OR) protocols comprise a promising area of research that aims to improve the reliability of communications, particularly in lossy networks. The main concept behind OR protocols is to utilize the broadcast nature of the wireless medium and determine a group of neighboring node candidates, known as candidate set, to collaboratively forward packets towards the destination using a candidate coordination approach. However, similar to traditional routing protocols, OR protocols operate poorly in the presence of malicious nodes and attackers. Therefore, researchers have designed and developed a number of security enhancements, considering the specific characteristics of such protocols. In this paper, following a brief overview on OR protocols, we examine, classify, and compare the different categories of security approaches proposed for OR protocols. More precisely, we divide security-related OR protocols into three categories, including trust-based approaches, game-theory-oriented solutions, and other related protocols. Furthermore, the most significant algorithms of each category are investigated as case studies. Finally, a comparison of different protocols is presented considering the main features, advantages, and shortcomings of each protocol.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Agrawal, S., Jain, S., & Sharma, S. (2011). A survey of routing attacks and security measures in mobile ad-hoc networks. arXiv preprint arXiv:1105.5623. Agrawal, S., Jain, S., & Sharma, S. (2011). A survey of routing attacks and security measures in mobile ad-hoc networks. arXiv preprint arXiv:​1105.​5623.
2.
Zurück zum Zitat Bhalaji, N., & Shanmugam, A. (2009). Reliable routing against selective packet drop attack in DSR based MANET. Journal of Software, 4(6), 536–543.CrossRef Bhalaji, N., & Shanmugam, A. (2009). Reliable routing against selective packet drop attack in DSR based MANET. Journal of Software, 4(6), 536–543.CrossRef
3.
Zurück zum Zitat Biswas, S., & Morris, R. (2004). Opportunistic routing in multi-hop wireless networks. ACM SIGCOMM Computer Communication Review, 34(1), 69–74.CrossRef Biswas, S., & Morris, R. (2004). Opportunistic routing in multi-hop wireless networks. ACM SIGCOMM Computer Communication Review, 34(1), 69–74.CrossRef
4.
Zurück zum Zitat Bo, W., Chuanhe, H., Layuan, L., & Wenzhong, Y. (2011). Trust-based minimum cost opportunistic routing for ad hoc networks. Journal of Systems and Software, 84(12), 2107–2122.CrossRef Bo, W., Chuanhe, H., Layuan, L., & Wenzhong, Y. (2011). Trust-based minimum cost opportunistic routing for ad hoc networks. Journal of Systems and Software, 84(12), 2107–2122.CrossRef
5.
Zurück zum Zitat Boukerche, A., & Darehshoorzadeh, A. (2014). Opportunistic routing in wireless networks: Models, algorithms, and classifications. ACM Computing Surveys (CSUR), 47(2), 22.CrossRef Boukerche, A., & Darehshoorzadeh, A. (2014). Opportunistic routing in wireless networks: Models, algorithms, and classifications. ACM Computing Surveys (CSUR), 47(2), 22.CrossRef
6.
Zurück zum Zitat Boukerche, A., Turgut, B., Aydin, N., Ahmad, M. Z., Bölöni, L., & Turgut, D. (2011). Routing protocols in ad hoc networks: A survey. Computer Networks, 55(13), 3032–3080.CrossRef Boukerche, A., Turgut, B., Aydin, N., Ahmad, M. Z., Bölöni, L., & Turgut, D. (2011). Routing protocols in ad hoc networks: A survey. Computer Networks, 55(13), 3032–3080.CrossRef
7.
Zurück zum Zitat Chachulski, S., Jennings, S., Katti, S., & Katabi, D. (2007). Trading structure for randomness in wireless opportunistic routing. ACM SIGCOMM Computer Communication Review, 37, 169.CrossRef Chachulski, S., Jennings, S., Katti, S., & Katabi, D. (2007). Trading structure for randomness in wireless opportunistic routing. ACM SIGCOMM Computer Communication Review, 37, 169.CrossRef
8.
Zurück zum Zitat Charilas, D. E., & Panagopoulos, A. D. (2010). A survey on game theory applications in wireless networks. Computer Networks, 54(18), 3421–3430.CrossRefMATH Charilas, D. E., & Panagopoulos, A. D. (2010). A survey on game theory applications in wireless networks. Computer Networks, 54(18), 3421–3430.CrossRefMATH
9.
Zurück zum Zitat Chen, T., & Zhong, S. (2014). An enforceable scheme for packet forwarding cooperation in network-coding wireless networks with opportunistic routing. IEEE Transactions on Vehicular Technology, 63(9), 4476–4491.CrossRef Chen, T., & Zhong, S. (2014). An enforceable scheme for packet forwarding cooperation in network-coding wireless networks with opportunistic routing. IEEE Transactions on Vehicular Technology, 63(9), 4476–4491.CrossRef
10.
Zurück zum Zitat Cho, J. H., Swami, A., & Chen, R. (2011). A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys and Tutorials, 13(4), 562–583.CrossRef Cho, J. H., Swami, A., & Chen, R. (2011). A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys and Tutorials, 13(4), 562–583.CrossRef
11.
Zurück zum Zitat Darehshoorzadeh, A., & Cerda-Alabern, L. (2012). Distance progress based opportunistic routing for wireless mesh networks. In Wireless Communications and Mobile Computing Conference (IWCMC), 2012 8th International (pp. 179–184). IEEE Darehshoorzadeh, A., & Cerda-Alabern, L. (2012). Distance progress based opportunistic routing for wireless mesh networks. In Wireless Communications and Mobile Computing Conference (IWCMC), 2012 8th International (pp. 179–184). IEEE
12.
Zurück zum Zitat Han, G., Jiang, J., Shu, L., Niu, J., & Chao, H. C. (2014). Management and applications of trust in wireless sensor networks: A survey. Journal of Computer and System Sciences, 80(3), 602–617.CrossRefMATH Han, G., Jiang, J., Shu, L., Niu, J., & Chao, H. C. (2014). Management and applications of trust in wireless sensor networks: A survey. Journal of Computer and System Sciences, 80(3), 602–617.CrossRefMATH
13.
Zurück zum Zitat Hsu, C. J., Liu, H. I., & Seah, W. K. (2011). Opportunistic routing—A review and the challenges ahead. Computer Networks, 55(15), 3592–3603.CrossRef Hsu, C. J., Liu, H. I., & Seah, W. K. (2011). Opportunistic routing—A review and the challenges ahead. Computer Networks, 55(15), 3592–3603.CrossRef
14.
Zurück zum Zitat Ji, S., Chen, T., & Zhong, S. (2015). Wormhole attack detection algorithms in wireless network coding systems. IEEE Transactions on Mobile Computing, 14(3), 660–674.CrossRef Ji, S., Chen, T., & Zhong, S. (2015). Wormhole attack detection algorithms in wireless network coding systems. IEEE Transactions on Mobile Computing, 14(3), 660–674.CrossRef
15.
Zurück zum Zitat Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Ad hoc Networks, 1(2), 293–315.CrossRef Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Ad hoc Networks, 1(2), 293–315.CrossRef
16.
Zurück zum Zitat Laufer, R., Dubois-Ferriere, H., & Kleinrock, L. (2009). Multirate anypath routing in wireless mesh networks. In INFOCOM 2009, IEEE (pp. 37–45). IEEE. Laufer, R., Dubois-Ferriere, H., & Kleinrock, L. (2009). Multirate anypath routing in wireless mesh networks. In INFOCOM 2009, IEEE (pp. 37–45). IEEE.
17.
Zurück zum Zitat Laufer, R., Dubois-Ferrière, H., & Kleinrock, L. (2012). Polynomial-time algorithms for multirate anypath routing in wireless multihop networks. IEEE/ACM Transactions on Networking, 20(3), 742–755.CrossRef Laufer, R., Dubois-Ferrière, H., & Kleinrock, L. (2012). Polynomial-time algorithms for multirate anypath routing in wireless multihop networks. IEEE/ACM Transactions on Networking, 20(3), 742–755.CrossRef
18.
Zurück zum Zitat Le, T., & Liu, Y. (2010). Opportunistic overlay multicast in wireless networks. In Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE (pp. 1–5). IEEE. Le, T., & Liu, Y. (2010). Opportunistic overlay multicast in wireless networks. In Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE (pp. 1–5). IEEE.
19.
Zurück zum Zitat Li, Y., Chen, W., & Zhang, Z. L. (2009). Optimal forwarder list selection in opportunistic routing. In Mobile Adhoc and Sensor Systems, 2009. MASS’09. IEEE 6th International Conference on (pp. 670–675). IEEE. Li, Y., Chen, W., & Zhang, Z. L. (2009). Optimal forwarder list selection in opportunistic routing. In Mobile Adhoc and Sensor Systems, 2009. MASS’09. IEEE 6th International Conference on (pp. 670–675). IEEE.
20.
Zurück zum Zitat Lin, Y., Li, B., & Liang, B. (2008). CodeOR: Opportunistic routing in wireless mesh networks with segmented network coding. In Network Protocols, 2008. ICNP 2008. IEEE International Conference on (pp. 13–22). IEEE. Lin, Y., Li, B., & Liang, B. (2008). CodeOR: Opportunistic routing in wireless mesh networks with segmented network coding. In Network Protocols, 2008. ICNP 2008. IEEE International Conference on (pp. 13–22). IEEE.
21.
Zurück zum Zitat Lyu, C., Gu, D., Zhang, X., Sun, S., Zhang, Y., & Pande, A. (2015). SGOR: Secure and scalable geographic opportunistic routing with received signal strength in WSNs. Computer Communications, 59, 37–51.CrossRef Lyu, C., Gu, D., Zhang, X., Sun, S., Zhang, Y., & Pande, A. (2015). SGOR: Secure and scalable geographic opportunistic routing with received signal strength in WSNs. Computer Communications, 59, 37–51.CrossRef
22.
Zurück zum Zitat Rozner, E., Seshadri, J., Mehta, Y., & Qiu, L. (2009). SOAR: Simple opportunistic adaptive routing protocol for wireless mesh networks. IEEE Transactions on Mobile Computing, 8(12), 1622–1635.CrossRef Rozner, E., Seshadri, J., Mehta, Y., & Qiu, L. (2009). SOAR: Simple opportunistic adaptive routing protocol for wireless mesh networks. IEEE Transactions on Mobile Computing, 8(12), 1622–1635.CrossRef
23.
Zurück zum Zitat Salehi, M., & Boukerche, A. (2014). Trust-aware opportunistic routing protocol for wireless networks. In Proceedings of the 10th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Q2SWinet ’14 (pp. 79–86). New York, NY: ACM. doi:10.1145/2642687.2642692. Salehi, M., & Boukerche, A. (2014). Trust-aware opportunistic routing protocol for wireless networks. In Proceedings of the 10th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Q2SWinet ’14 (pp. 79–86). New York, NY: ACM. doi:10.​1145/​2642687.​2642692.
24.
Zurück zum Zitat Salehi, M., & Boukerche, A. (2016). PASOR: A packet salvaging model for opportunistic routing protocols. In Accepted in IEEE International Conference on Mobile Ad hoc and Sensor Systems (MASS), 2016 13th International Conference on (pp. 1–8). IEEE. Salehi, M., & Boukerche, A. (2016). PASOR: A packet salvaging model for opportunistic routing protocols. In Accepted in IEEE International Conference on Mobile Ad hoc and Sensor Systems (MASS), 2016 13th International Conference on (pp. 1–8). IEEE.
25.
Zurück zum Zitat Salehi, M., Boukerche, A., & Darehshoorzadeh, A. (2016). Modeling and performance evaluation of security attacks on opportunistic routing protocols for multihop wireless networks. Ad Hoc Networks. doi:10.1016/j.adhoc.2016.07.004. Salehi, M., Boukerche, A., & Darehshoorzadeh, A. (2016). Modeling and performance evaluation of security attacks on opportunistic routing protocols for multihop wireless networks. Ad Hoc Networks. doi:10.​1016/​j.​adhoc.​2016.​07.​004.
26.
Zurück zum Zitat Salehi, M., & Samavati, H. (2012). Dsr vs olsr: Simulation based comparison of ad hoc reactive and proactive algorithms under the effect of new routing attacks. In Next Generation Mobile Applications, Services and Technologies (NGMAST), 2012 6th International Conference on (pp. 100–105). IEEE Salehi, M., & Samavati, H. (2012). Dsr vs olsr: Simulation based comparison of ad hoc reactive and proactive algorithms under the effect of new routing attacks. In Next Generation Mobile Applications, Services and Technologies (NGMAST), 2012 6th International Conference on (pp. 100–105). IEEE
27.
Zurück zum Zitat Shah, N., & Huang, D. (2010). A-weor: Communication privacy protection for wireless mesh networks using encoded opportunistic routing. In INFOCOM IEEE Conference on Computer Communications Workshops, 2010 (pp. 1–6). IEEE. Shah, N., & Huang, D. (2010). A-weor: Communication privacy protection for wireless mesh networks using encoded opportunistic routing. In INFOCOM IEEE Conference on Computer Communications Workshops, 2010 (pp. 1–6). IEEE.
28.
Zurück zum Zitat Shi, H. Y., Wang, W. L., Kwok, N. M., & Chen, S. Y. (2012). Game theory for wireless sensor networks: A survey. Sensors, 12(7), 9055–9097.CrossRef Shi, H. Y., Wang, W. L., Kwok, N. M., & Chen, S. Y. (2012). Game theory for wireless sensor networks: A survey. Sensors, 12(7), 9055–9097.CrossRef
29.
Zurück zum Zitat WenZhong, Y., ChuanHe, H., Bo, W., ZhenYu, Z., & Tong, W. (2010). A reliable multicast for MANETs based on opportunistic routing and network coding. In Wireless Communications, Networking and Information Security (WCNIS), 2010 IEEE International Conference on (pp. 540–545). IEEE. WenZhong, Y., ChuanHe, H., Bo, W., ZhenYu, Z., & Tong, W. (2010). A reliable multicast for MANETs based on opportunistic routing and network coding. In Wireless Communications, Networking and Information Security (WCNIS), 2010 IEEE International Conference on (pp. 540–545). IEEE.
30.
Zurück zum Zitat Wu, B., Chen, J., Wu, J., & Cardei, M. (2007). A survey of attacks and countermeasures in mobile ad hoc networks. In Y. Xiao, X. S. Shen, & D. Z. Du (Eds.), Wireless network security (pp. 103–135). Boston: Springer.CrossRef Wu, B., Chen, J., Wu, J., & Cardei, M. (2007). A survey of attacks and countermeasures in mobile ad hoc networks. In Y. Xiao, X. S. Shen, & D. Z. Du (Eds.), Wireless network security (pp. 103–135). Boston: Springer.CrossRef
31.
Zurück zum Zitat Wu, F., Gong, K., Zhang, T., Chen, G., & Qiao, C. (2015). COMO: A game-theoretic approach for joint multirate opportunistic routing and forwarding in non-cooperative wireless networks. IEEE Transactions on Wireless Communications, 14(2), 948–959.CrossRef Wu, F., Gong, K., Zhang, T., Chen, G., & Qiao, C. (2015). COMO: A game-theoretic approach for joint multirate opportunistic routing and forwarding in non-cooperative wireless networks. IEEE Transactions on Wireless Communications, 14(2), 948–959.CrossRef
32.
Zurück zum Zitat Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for internet of things. Journal of Network and Computer Applications, 42, 120–134.CrossRef Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for internet of things. Journal of Network and Computer Applications, 42, 120–134.CrossRef
33.
Zurück zum Zitat Yan, Z., Zhang, P., & Virtanen, T. (2003). Trust evaluation based security solution in ad hoc networks. In Proceedings of the Seventh Nordic Workshop on Secure IT Systems (Vol. 14). Yan, Z., Zhang, P., & Virtanen, T. (2003). Trust evaluation based security solution in ad hoc networks. In Proceedings of the Seventh Nordic Workshop on Secure IT Systems (Vol. 14).
34.
Zurück zum Zitat Yang, S., Zhong, F., Yeo, C. K., Lee, B. S., & Boleng, J. (2009). Position based opportunistic routing for robust data delivery in MANETs. In Global Telecommunications Conference, 2009. GLOBECOM 2009. IEEE (pp. 1–6). IEEE. Yang, S., Zhong, F., Yeo, C. K., Lee, B. S., & Boleng, J. (2009). Position based opportunistic routing for robust data delivery in MANETs. In Global Telecommunications Conference, 2009. GLOBECOM 2009. IEEE (pp. 1–6). IEEE.
35.
Zurück zum Zitat Yu, H., Shen, Z., Miao, C., Leung, C., & Niyato, D. (2010). A survey of trust and reputation management systems in wireless communications. Proceedings of the IEEE, 98(10), 1755–1772.CrossRef Yu, H., Shen, Z., Miao, C., Leung, C., & Niyato, D. (2010). A survey of trust and reputation management systems in wireless communications. Proceedings of the IEEE, 98(10), 1755–1772.CrossRef
36.
Zurück zum Zitat Zhang, J. (2011). A survey on trust management for vanets. In Advanced Information Networking and Applications (AINA), 2011 IEEE International Conference on (pp. 105–112). IEEE. Zhang, J. (2011). A survey on trust management for vanets. In Advanced Information Networking and Applications (AINA), 2011 IEEE International Conference on (pp. 105–112). IEEE.
37.
Zurück zum Zitat Zhang, K., Wang, R., & Qian, D. (2010). Aim: An auction incentive mechanism in wireless networks with opportunistic routing. In Computational Science and Engineering (CSE), 2010 IEEE 13th International Conference on (pp. 28–33). IEEE. Zhang, K., Wang, R., & Qian, D. (2010). Aim: An auction incentive mechanism in wireless networks with opportunistic routing. In Computational Science and Engineering (CSE), 2010 IEEE 13th International Conference on (pp. 28–33). IEEE.
Metadaten
Titel
Secure opportunistic routing protocols: methods, models, and classification
verfasst von
Mahmood Salehi
Azzedine Boukerche
Publikationsdatum
11.09.2017
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 2/2019
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-017-1575-1

Weitere Artikel der Ausgabe 2/2019

Wireless Networks 2/2019 Zur Ausgabe

Neuer Inhalt