skip to main content
10.1145/2642687.2642692acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
research-article

Trust-aware opportunistic routing protocol for wireless networks

Published:21 September 2014Publication History

ABSTRACT

Next hop selection can be considered as the most important challenge regarding packet routing in wireless networks. Opportunistic Routing is a novel research topic which benefits from the broadcast nature of the wireless medium to route packets to their destination more reliably. Trust management protocols, on the other hand, are developed to assist in delivering data packets in presence of attacker nodes in the network. In this paper, a novel opportunistic routing protocol is proposed which selects next hop forwarder nodes not only according to the link delivery probability between nodes, but also based upon the trust level that nodes calculate for other nodes while communicating packets. Simulation results represent that the proposed method performs well in a hostile environment where malicious nodes prevent from forwarding received packets.

References

  1. S. Biswas and R. Morris. Opportunistic routing in multi-hop wireless networks. SIGCOMM Comput. Commun. Rev., 34(1):69--74, Jan. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. A. Boukerche and A. Darehshoorzadeh. Opportunistic routing in wireless networks: Models, algorithms and classifications. Computing Surveys (ACM) (Accepted to appear in volume 47, issue 2), 2014.Google ScholarGoogle Scholar
  3. A. Boukerche, Y. Ren, and R. W. N. Pazzi. An adaptive computational trust model for mobile ad hoc networks. In Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, IWCMC '09, pages 191--195, New York, NY, USA, 2009. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. S. Buchegger and J.-Y. Le Boudec. Performance analysis of the confidant protocol. In Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing, MobiHoc '02, pages 226--236, New York, NY, USA, 2002. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J.-H. Cho, A. Swami, and I.-R. Chen. A survey on trust management for mobile ad hoc networks. Communications Surveys Tutorials, IEEE, 13(4):562--583, Fourth 2011.Google ScholarGoogle ScholarCross RefCross Ref
  6. A. Darehshoorzadeh, M. Almulla, A. Boukerche, and S. Chaiwala. On the number of candidates in opportunistic routing for multi-hop wireless networks. In Proceedings of the 11th ACM International Symposium on Mobility Management and Wireless Access, MobiWac '13, pages 9--16, New York, NY, USA, 2013. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. A. Darehshoorzadeh and L. Cerda-Alabern. Distance progress based opportunistic routing for wireless mesh networks. In Wireless Communications and Mobile Computing Conference (IWCMC), 2012 8th International, pages 179--184, Aug 2012.Google ScholarGoogle ScholarCross RefCross Ref
  8. H. Dubois-Ferriere, M. Grossglauser, and M. Vetterli. Least-cost opportunistic routing. In Proceedings of 2007 Allerton Conference on Communication, Control, and Computing, volume 5, page 11, 2007.Google ScholarGoogle Scholar
  9. H. Fußler, J. Widmer, M. Kasemann, M. Mauve, and H. Hartenstein. Contention-based forwarding for mobile ad hoc networks. Ad Hoc Networks, 1(4):351 -- 369, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  10. S. Ganeriwal, L. K. Balzano, and M. B. Srivastava. Reputation-based framework for high integrity sensor networks. ACM Trans. Sen. Netw., 4(3):15:1--15:37, June 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. T. Ghosh, N. Pissinou, and K. Makki. Towards designing a trusted routing solution in mobile ad hoc networks. Mob. Netw. Appl., 10(6):985--995, Dec. 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Q. He, D. Wu, and P. Khosla. Sori: a secure and objective reputation-based incentive scheme for ad-hoc networks. In Wireless Communications and Networking Conference, 2004. WCNC. 2004 IEEE, volume 2, pages 825--830 Vol.2, March 2004.Google ScholarGoogle Scholar
  13. C.-J. Hsu, H.-I. Liu, and W. K. Seah. Opportunistic routing - a review and the challenges ahead. Computer Networks, 55(15):3592 -- 3603, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. P. Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, A. Qayyum, and L. Viennot. Optimized link state routing protocol for ad hoc networks. In Multi Topic Conference, 2001. IEEE INMIC 2001. Technology for the 21st Century. Proceedings. IEEE International, pages 62--68, 2001.Google ScholarGoogle ScholarCross RefCross Ref
  15. D. Johnson and D. Maltz. Dynamic source routing in ad hoc wireless networks. In T. Imielinski and H. Korth, editors, Mobile Computing, volume 353 of The Kluwer International Series in Engineering and Computer Science, pages 153--181. Springer US, 1996.Google ScholarGoogle Scholar
  16. F. Li and J. Wu. Mobility reduces uncertainty in manets. In INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE, pages 1946--1954, May 2007.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. N. Li and S. K. Das. A trust-based framework for data forwarding in opportunistic networks. Ad Hoc Networks, 11(4):1497 -- 1509, 2013. 1. System and Theoretical Issues in Designing and Implementing Scalable and Sustainable Wireless Sensor Networks 2. Wireless Communications and Networking in Challenged Environments. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. H. Liu, B. Zhang, H. Mouftah, X. Shen, and J. Ma. Opportunistic routing for wireless ad hoc and sensor networks: Present and future directions. Communications Magazine, IEEE, 47(12):103--109, Dec 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. S. Marti, T. J. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, MobiCom '00, pages 255--265, New York, NY, USA, 2000. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. S. Mccanne, S. Floyd, and K. Fall. ns2 (network simulator 2). http://www-nrg.ee.lbl.gov/ns/.Google ScholarGoogle Scholar
  21. P. Michiardi and R. Molva. Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In B. Jerman-Blazic and T. Klobucar, editors, Advanced Communications and Multimedia Security, volume 100 of IFIP AT The International Federation for Information Processing, pages 107--121. Springer US, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. C. Perkins and E. Royer. Ad-hoc on-demand distance vector routing. In Mobile Computing Systems and Applications, 1999. Proceedings. WMCSA '99. Second IEEE Workshop on, pages 90--100, Feb 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. N. Pissinou, T. Ghosh, and K. Makki. Collaborative trust-based secure routing in multihop ad hoc networks. In N. Mitrou, K. Kontovasilis, G. Rouskas, I. Iliadis, and L. Merakos, editors, Networking 2004, volume 3042 of Lecture Notes in Computer Science, pages 1446--1451. Springer Berlin Heidelberg, 2004.Google ScholarGoogle Scholar
  24. E. Rozner, J. Seshadri, Y. Mehta, and L. Qiu. Soar: Simple opportunistic adaptive routing protocol for wireless mesh networks. Mobile Computing, IEEE Transactions on, 8(12):1622--1635, Dec 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. G. Shafer. A mathematical theory of evidence, volume 1. Princeton university press Princeton, 1976.Google ScholarGoogle Scholar
  26. S. Yang, F. Zhong, C.-K. Yeo, B. S. Lee, and J. Boleng. Position based opportunistic routing for robust data delivery in manets. In Global Telecommunications Conference, 2009. GLOBECOM 2009. IEEE, pages 1--6, Nov 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. H. Yu, Z. Shen, C. Miao, C. Leung, and D. Niyato. A survey of trust and reputation management systems in wireless communications. Proceedings of the IEEE, 98(10):1755--1772, Oct 2010.Google ScholarGoogle ScholarCross RefCross Ref
  28. Z. Zhong, J. Wang, S. Nelakuditi, and G.-H. Lu. On selection of candidates for opportunistic any path forwarding. SIGMOBILE Mob. Comput. Commun. Rev., 10(4):1--2, Oct. 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Trust-aware opportunistic routing protocol for wireless networks

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        Q2SWinet '14: Proceedings of the 10th ACM symposium on QoS and security for wireless and mobile networks
        September 2014
        146 pages
        ISBN:9781450330275
        DOI:10.1145/2642687

        Copyright © 2014 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 21 September 2014

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Q2SWinet '14 Paper Acceptance Rate14of30submissions,47%Overall Acceptance Rate46of131submissions,35%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader