Skip to main content
Erschienen in: Wireless Networks 3/2016

01.04.2016

Towards a novel trust-based opportunistic routing protocol for wireless networks

verfasst von: Mahmood Salehi, Azzedine Boukerche, Amir Darehshoorzadeh, Abdelhamid Mammeri

Erschienen in: Wireless Networks | Ausgabe 3/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Opportunistic routing is a promising research area in the context of wireless network communications. Security and trustworthy of routing in this field, however, needs to be considerably researched . In this paper, a novel trust establishment algorithm is proposed, designed, and implemented specifically for opportunistic routing protocols which benefits from direct interactions between wireless nodes. The proposed trust model benefits from a novel watchdog mechanism considering not only forwarding behaviour of nodes but also the quality of links between them. Furthermore, three different metrics for next hop selection is introduced enabling nodes to select their next hop forwarders more sophisticatedly using quality of links, geographical location of nodes, and their trust level. Extensive simulation results represent that proposed model can significantly improve the performance of network communications when malicious nodes try to collapse the system.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Attar, A., Tang, H., Vasilakos, A. V., Yu, F. R., & Leung, V. C. (2012). A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE, 100(12), 3172–3186.CrossRef Attar, A., Tang, H., Vasilakos, A. V., Yu, F. R., & Leung, V. C. (2012). A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE, 100(12), 3172–3186.CrossRef
2.
Zurück zum Zitat Biswas, S., & Morris, R. (2004). Opportunistic routing in multi-hop wireless networks. ACM SIGCOMM Computer Communication Review, 34(1), 69–74.CrossRef Biswas, S., & Morris, R. (2004). Opportunistic routing in multi-hop wireless networks. ACM SIGCOMM Computer Communication Review, 34(1), 69–74.CrossRef
3.
Zurück zum Zitat Boukerch, A., Xu, L., & EL-Khatib, K. (2007). Trust-based security for wireless ad hoc and sensor networks. Computer Communications, 30(1112), 2413–2427. special issue on security on wireless ad hoc and sensor networks.CrossRef Boukerch, A., Xu, L., & EL-Khatib, K. (2007). Trust-based security for wireless ad hoc and sensor networks. Computer Communications, 30(1112), 2413–2427. special issue on security on wireless ad hoc and sensor networks.CrossRef
4.
Zurück zum Zitat Boukerche, A., & Darehshoorzadeh, A. (2014). Opportunistic routing in wireless networks: Models, algorithms, and classifications. ACM Computing Surveys (CSUR), 47(2), 22.CrossRef Boukerche, A., & Darehshoorzadeh, A. (2014). Opportunistic routing in wireless networks: Models, algorithms, and classifications. ACM Computing Surveys (CSUR), 47(2), 22.CrossRef
5.
Zurück zum Zitat Boukerche, A., & Ren, Y. (2008). A trust-based security system for ubiquitous and pervasive computing environments. Computer Communications, 31(18), 4343–4351.CrossRef Boukerche, A., & Ren, Y. (2008). A trust-based security system for ubiquitous and pervasive computing environments. Computer Communications, 31(18), 4343–4351.CrossRef
6.
Zurück zum Zitat Boukerche, A., Ren, Y., & Pazzi, R. W. N. (2009). An adaptive computational trust model for mobile ad hoc networks. In Proceedings of the 2009 international conference on wireless communications and mobile computing: Connecting the world wirelessly (pp. 191–195). ACM. Boukerche, A., Ren, Y., & Pazzi, R. W. N. (2009). An adaptive computational trust model for mobile ad hoc networks. In Proceedings of the 2009 international conference on wireless communications and mobile computing: Connecting the world wirelessly (pp. 191–195). ACM.
7.
Zurück zum Zitat Boukerche, A., Turgut, B., Aydin, N., Ahmad, M. Z., Blni, L., & Turgut, D. (2011). Routing protocols in ad hoc networks: A survey. Computer Networks, 55(13), 3032–3080.CrossRef Boukerche, A., Turgut, B., Aydin, N., Ahmad, M. Z., Blni, L., & Turgut, D. (2011). Routing protocols in ad hoc networks: A survey. Computer Networks, 55(13), 3032–3080.CrossRef
8.
Zurück zum Zitat Buchegger, S., & Le Boudec, J. Y. (2002). Performance analysis of the confidant protocol. In Proceedings of the 3rd ACM international symposium on mobile ad hoc networking and computing (pp. 226–236). ACM. Buchegger, S., & Le Boudec, J. Y. (2002). Performance analysis of the confidant protocol. In Proceedings of the 3rd ACM international symposium on mobile ad hoc networking and computing (pp. 226–236). ACM.
9.
Zurück zum Zitat Cho, J. H., Swami, A., & Chen, R. (2011). A survey on trust management for mobile ad hoc networks. Communications Surveys and Tutorials, IEEE, 13(4), 562–583.CrossRef Cho, J. H., Swami, A., & Chen, R. (2011). A survey on trust management for mobile ad hoc networks. Communications Surveys and Tutorials, IEEE, 13(4), 562–583.CrossRef
10.
Zurück zum Zitat Darehshoorzadeh, A., & Boukerche, A. (2014). An efficient heuristic candidate selection algorithm for opportunistic routing in wireless multihop networks. In IEEE symposium on Computers and communication (ISCC), 2014. (pp. 1–6). IEEE. Darehshoorzadeh, A., & Boukerche, A. (2014). An efficient heuristic candidate selection algorithm for opportunistic routing in wireless multihop networks. In IEEE symposium on Computers and communication (ISCC), 2014. (pp. 1–6). IEEE.
11.
Zurück zum Zitat Darehshoorzadeh, A., & Cerda-Alabern, L. (2012). Distance progress based opportunistic routing for wireless mesh networks. In 8th International wireless communications and mobile computing conference (IWCMC), 2012. (pp. 179–184). IEEE. Darehshoorzadeh, A., & Cerda-Alabern, L. (2012). Distance progress based opportunistic routing for wireless mesh networks. In 8th International wireless communications and mobile computing conference (IWCMC), 2012. (pp. 179–184). IEEE.
12.
Zurück zum Zitat Darehshoorzadeh, A., Almulla, M., Boukerche, A., & Chaiwala, S. (2013). On the number of candidates in opportunistic routing for multi-hop wireless networks. In Proceedings of the 11th ACM international symposium on mobility management and wireless access (pp. 9–16). ACM. Darehshoorzadeh, A., Almulla, M., Boukerche, A., & Chaiwala, S. (2013). On the number of candidates in opportunistic routing for multi-hop wireless networks. In Proceedings of the 11th ACM international symposium on mobility management and wireless access (pp. 9–16). ACM.
13.
Zurück zum Zitat Deng, H., Li, W., & Agrawal, D. P. (2002). Routing security in wireless ad hoc networks. Communications Magazine, IEEE, 40(10), 70–75.CrossRef Deng, H., Li, W., & Agrawal, D. P. (2002). Routing security in wireless ad hoc networks. Communications Magazine, IEEE, 40(10), 70–75.CrossRef
14.
Zurück zum Zitat Dubois-Ferrière, H., Grossglauser, M., & Vetterli, M. (2007). Least-cost opportunistic routing. Tech. rep. Dubois-Ferrière, H., Grossglauser, M., & Vetterli, M. (2007). Least-cost opportunistic routing. Tech. rep.
15.
Zurück zum Zitat Dubois-Ferrière, H., Grossglauser, M., & Vetterli, M. (2011). Valuable detours: Least-cost anypath routing. Networking, IEEE/ACM Transactions on, 19(2), 333–346.CrossRef Dubois-Ferrière, H., Grossglauser, M., & Vetterli, M. (2011). Valuable detours: Least-cost anypath routing. Networking, IEEE/ACM Transactions on, 19(2), 333–346.CrossRef
16.
Zurück zum Zitat Fall, K., & Varadhan, K. (2005). The ns manual (formerly ns notes and documentation). The VINT project 47. Fall, K., & Varadhan, K. (2005). The ns manual (formerly ns notes and documentation). The VINT project 47.
17.
Zurück zum Zitat Füßler, H., Widmer, J., Käsemann, M., Mauve, M., & Hartenstein, H. (2003). Contention-based forwarding for mobile ad hoc networks. Ad Hoc Networks, 1(4), 351–369.CrossRef Füßler, H., Widmer, J., Käsemann, M., Mauve, M., & Hartenstein, H. (2003). Contention-based forwarding for mobile ad hoc networks. Ad Hoc Networks, 1(4), 351–369.CrossRef
18.
Zurück zum Zitat Ganeriwal, S., Balzano, L. K., & Srivastava, M. B. (2008). Reputation-based framework for high integrity sensor networks. ACM Transactions on Sensor Networks (TOSN), 4(3), 15.CrossRef Ganeriwal, S., Balzano, L. K., & Srivastava, M. B. (2008). Reputation-based framework for high integrity sensor networks. ACM Transactions on Sensor Networks (TOSN), 4(3), 15.CrossRef
19.
Zurück zum Zitat Ghosh, T., Pissinou, N., & Makki, K. (2005). Towards designing a trusted routing solution in mobile ad hoc networks. Mobile Networks and Applications, 10(6), 985–995.CrossRef Ghosh, T., Pissinou, N., & Makki, K. (2005). Towards designing a trusted routing solution in mobile ad hoc networks. Mobile Networks and Applications, 10(6), 985–995.CrossRef
20.
Zurück zum Zitat He, Q., Wu, D., & Khosla, P. (2004). Sori: A secure and objective reputation-based incentive scheme for ad-hoc networks. In Wireless communications and networking conference, 2004. WCNC. 2004 IEEE (vol 2. pp. 825–830). IEEE. He, Q., Wu, D., & Khosla, P. (2004). Sori: A secure and objective reputation-based incentive scheme for ad-hoc networks. In Wireless communications and networking conference, 2004. WCNC. 2004 IEEE (vol 2. pp. 825–830). IEEE.
21.
Zurück zum Zitat Hsu, C. J., Liu, H. I., & Seah, W. K. (2011). Opportunistic routing-a review and the challenges ahead. Computer Networks, 55(15), 3592–3603.CrossRef Hsu, C. J., Liu, H. I., & Seah, W. K. (2011). Opportunistic routing-a review and the challenges ahead. Computer Networks, 55(15), 3592–3603.CrossRef
22.
Zurück zum Zitat Li, F., & Wu, J. (2007). Mobility reduces uncertainty in manets. In INFOCOM 2007. 26th IEEE International conference on computer communications. IEEE (pp. 1946–1954). IEEE. Li, F., & Wu, J. (2007). Mobility reduces uncertainty in manets. In INFOCOM 2007. 26th IEEE International conference on computer communications. IEEE (pp. 1946–1954). IEEE.
23.
Zurück zum Zitat Li, J., Jannotti, J., De Couto, D. S. J., Karger, D. R., & Morris, R. (2000). A scalable location service for geographic ad hoc routing. In Proceedings of the 6th annual international conference on mobile computing and networking (pp. 120–130). New York, NY, USA: ACM, MobiCom ’00. Li, J., Jannotti, J., De Couto, D. S. J., Karger, D. R., & Morris, R. (2000). A scalable location service for geographic ad hoc routing. In Proceedings of the 6th annual international conference on mobile computing and networking (pp. 120–130). New York, NY, USA: ACM, MobiCom ’00.
24.
Zurück zum Zitat Li, N., & Das, S. K. (2013). A trust-based framework for data forwarding in opportunistic networks. Ad Hoc Networks, 11(4), 1497–1509.CrossRef Li, N., & Das, S. K. (2013). A trust-based framework for data forwarding in opportunistic networks. Ad Hoc Networks, 11(4), 1497–1509.CrossRef
25.
Zurück zum Zitat Li, P., Guo, S., Yu, S., & Vasilakos, A. V. (2014). Reliable multicast with pipelined network coding using opportunistic feeding and routing. IEEE Transactions on Parallel and Distributed Systems, 25(12), 3264–3273.CrossRef Li, P., Guo, S., Yu, S., & Vasilakos, A. V. (2014). Reliable multicast with pipelined network coding using opportunistic feeding and routing. IEEE Transactions on Parallel and Distributed Systems, 25(12), 3264–3273.CrossRef
26.
Zurück zum Zitat Liu, H., Zhang, B., Mouftah, H. T., Shen, X., & Ma, J. (2009). Opportunistic routing for wireless ad hoc and sensor networks: Present and future directions. Communications Magazine, IEEE, 47(12), 103–109.CrossRef Liu, H., Zhang, B., Mouftah, H. T., Shen, X., & Ma, J. (2009). Opportunistic routing for wireless ad hoc and sensor networks: Present and future directions. Communications Magazine, IEEE, 47(12), 103–109.CrossRef
27.
Zurück zum Zitat Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual international conference on mobile computing and networking (pp. 255–265). ACM. Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual international conference on mobile computing and networking (pp. 255–265). ACM.
28.
Zurück zum Zitat Michiardi, P., & Molva, R. (2002). Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In B. Jerman-Blažič & T. Klobučar (Eds.), Advanced communications and multimedia security (pp. 107–121). New York: Springer.CrossRef Michiardi, P., & Molva, R. (2002). Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In B. Jerman-Blažič & T. Klobučar (Eds.), Advanced communications and multimedia security (pp. 107–121). New York: Springer.CrossRef
29.
Zurück zum Zitat Nguyen, H. A., & Giordano, S. (2009). Routing in opportunistic networks. International Journal of Ambient Computing and Intelligence (IJACI), 1(3), 19–38.CrossRef Nguyen, H. A., & Giordano, S. (2009). Routing in opportunistic networks. International Journal of Ambient Computing and Intelligence (IJACI), 1(3), 19–38.CrossRef
30.
Zurück zum Zitat Pelusi, L., Passarella, A., & Conti, M. (2006). Opportunistic networking: data forwarding in disconnected mobile ad hoc networks. Communications Magazine, IEEE, 44(11), 134–141.CrossRef Pelusi, L., Passarella, A., & Conti, M. (2006). Opportunistic networking: data forwarding in disconnected mobile ad hoc networks. Communications Magazine, IEEE, 44(11), 134–141.CrossRef
31.
Zurück zum Zitat Rozner, E., Seshadri, J., Mehta, Y., & Qiu, L. (2009). Soar: Simple opportunistic adaptive routing protocol for wireless mesh networks. Mobile Computing, IEEE Transactions on, 8(12), 1622–1635.CrossRef Rozner, E., Seshadri, J., Mehta, Y., & Qiu, L. (2009). Soar: Simple opportunistic adaptive routing protocol for wireless mesh networks. Mobile Computing, IEEE Transactions on, 8(12), 1622–1635.CrossRef
32.
Zurück zum Zitat Salehi, M., & Boukerche, A. (2014). Trust-aware opportunistic routing protocol for wireless networks. In Proceedings of the 10th ACM symposium on QoS and security for wireless and mobile networks (pp. 79–86). New York, NY, USA: ACM, Q2SWinet ’14. Salehi, M., & Boukerche, A. (2014). Trust-aware opportunistic routing protocol for wireless networks. In Proceedings of the 10th ACM symposium on QoS and security for wireless and mobile networks (pp. 79–86). New York, NY, USA: ACM, Q2SWinet ’14.
33.
Zurück zum Zitat Salehi, M., & Samavati, H. (2012). Dsr vs olsr: Simulation based comparison of ad hoc reactive and proactive algorithms under the effect of new routing attacks. In 6th International conference on next generation mobile applications, services and technologies (NGMAST), 2012. (pp. 100–105). IEEE. Salehi, M., & Samavati, H. (2012). Dsr vs olsr: Simulation based comparison of ad hoc reactive and proactive algorithms under the effect of new routing attacks. In 6th International conference on next generation mobile applications, services and technologies (NGMAST), 2012. (pp. 100–105). IEEE.
34.
Zurück zum Zitat Shafer, G., et al. (1976). A mathematical theory of evidence (Vol. 1). Princeton: Princeton University Press.MATH Shafer, G., et al. (1976). A mathematical theory of evidence (Vol. 1). Princeton: Princeton University Press.MATH
35.
Zurück zum Zitat Wei, Z., Yu, F. R., & Boukerche, A. (2014). Trust based security enhancements for vehicular ad hocnetworks. In Proceedings of the fourth ACM international symposium on development and analysis of intelligent vehicular networks and applications (pp. 103–109). ACM. Wei, Z., Yu, F. R., & Boukerche, A. (2014). Trust based security enhancements for vehicular ad hocnetworks. In Proceedings of the fourth ACM international symposium on development and analysis of intelligent vehicular networks and applications (pp. 103–109). ACM.
36.
Zurück zum Zitat Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for internet of things. Journal of Network and Computer Applications, 42, 120–134.CrossRef Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for internet of things. Journal of Network and Computer Applications, 42, 120–134.CrossRef
37.
Zurück zum Zitat Yan, Z., Zhang, P., & Vasilakos, A. V. (2015). A security and trust framework for virtualized networks and software-defined networking. Security and Communication Networks. doi:10.1002/sec.1243. Yan, Z., Zhang, P., & Vasilakos, A. V. (2015). A security and trust framework for virtualized networks and software-defined networking. Security and Communication Networks. doi:10.​1002/​sec.​1243.
38.
Zurück zum Zitat Yang, S., Zhong, F., Yeo, C. K., Lee, B. S., & Boleng, J. (2009) Position based opportunistic routing for robust data delivery in manets. In Global telecommunications conference, 2009. GLOBECOM 2009. IEEE (pp. 1–6). IEEE. Yang, S., Zhong, F., Yeo, C. K., Lee, B. S., & Boleng, J. (2009) Position based opportunistic routing for robust data delivery in manets. In Global telecommunications conference, 2009. GLOBECOM 2009. IEEE (pp. 1–6). IEEE.
39.
Zurück zum Zitat Yu, H., Shen, Z., Miao, C., Leung, C., & Niyato, D. (2010). A survey of trust and reputation management systems in wireless communications. Proceedings of the IEEE, 98(10), 1755–1772.CrossRef Yu, H., Shen, Z., Miao, C., Leung, C., & Niyato, D. (2010). A survey of trust and reputation management systems in wireless communications. Proceedings of the IEEE, 98(10), 1755–1772.CrossRef
40.
Zurück zum Zitat Zhang, J. (2011). A survey on trust management for vanets. In IEEE International conference on advanced information networking and applications (AINA), 2011. (pp. 105–112). IEEE. Zhang, J. (2011). A survey on trust management for vanets. In IEEE International conference on advanced information networking and applications (AINA), 2011. (pp. 105–112). IEEE.
41.
Zurück zum Zitat Zhong, Z., Wang, J., Nelakuditi, S., & Lu, G. H. (2006). On selection of candidates for opportunistic anypath forwarding. ACM SIGMOBILE Mobile Computing and Communications Review, 10(4), 1–2.CrossRef Zhong, Z., Wang, J., Nelakuditi, S., & Lu, G. H. (2006). On selection of candidates for opportunistic anypath forwarding. ACM SIGMOBILE Mobile Computing and Communications Review, 10(4), 1–2.CrossRef
Metadaten
Titel
Towards a novel trust-based opportunistic routing protocol for wireless networks
verfasst von
Mahmood Salehi
Azzedine Boukerche
Amir Darehshoorzadeh
Abdelhamid Mammeri
Publikationsdatum
01.04.2016
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 3/2016
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-015-1010-4

Weitere Artikel der Ausgabe 3/2016

Wireless Networks 3/2016 Zur Ausgabe

Neuer Inhalt