Font Size: a A A

Research On Securing Incentive-Based Routing Algorithm In Opportunistic Networks

Posted on:2014-02-09Degree:MasterType:Thesis
Country:ChinaCandidate:J WangFull Text:PDF
GTID:2248330395999155Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Opportunistic network is a kind of self-organizing network derived from DTNs (Delay Tolerant Networks). As the characteristics that lacking of end-to-end connections, long propagation delays, low frequent encounter, frequent mobility and limited resources like energy and storage of mobile nodes, the message transmission progress in opportunistic network complies with the "store-carry-and-forward" mode. As the contacts are unpredictable, the routing protocols for traditional mobile ad hoc networks are not appropriate for opportunistic networks. Therefore, the routing scheme for opportunistic network gains a lot of concerns all over the world.Firstly, the background and significance of this research is outlined, and then the concept and characteristic of opportunistic network is introduced in this paper. Secondly, typical routing protocols for opportunistic network as well as their respective advantages and disadvantages are reviewed. As the existing routing protocols for DTNs rely on the assumption that each individual node is willing to help in forwarding messages for other nodes. However, most of the nodes are managed by rational human or organizations, and will exhibit selfish or even malicious in real life, in which case the network performance can be considerably degraded. In this paper, to address the selfish and malicious problems, a secure incentive scheme called SIR is proposed for opportunistic networks. SIR is the preliminary attempt for combination between credit-based incentive scheme and social-context environment. In this paper, credits are adopted to stimulate the cooperation in relaying messages among nodes. In addition, identity based cryptosystems upon social attributes are used to ensure the security of nodes and messages. Moreover, a layered coin mechanisms is adopted to resist a variety of attacks of malicious nodes.The performances are evaluated via ONEs as a simulations tool for opportunistic networks, two other protocol schemes are used as compare to the proposed SIR scheme. Security analysis illustrate that the proposed scheme can effectively inspire the cooperation of nodes while keeping the confidentiality and integrity of messages.
Keywords/Search Tags:Opportunistic Networks, Secure Routing, Incentive Scheme
PDF Full Text Request
Related items