Advertisement

Energy based incentive scheme for secure opportunistic routing in vehicular delay tolerant networks

  • 30 Accesses

Abstract

Opportunistic forwarding mechanism in delay tolerant networks (DTN) makes the network exposed to vulnerabilities. Providing security to existing routing protocols available for delay tolerant network becomes very difficult due to unavailability of sufficient contacts. It is necessary to design a secure routing protocol to overcome these issues. Energy is one of the crucial parameters in data forwarding and incentives should be offered to vehicular DTN nodes on the basis of energy spent for a particular message. This paper presents the secure routing mechanism which is based on the trust value of the vehicular DTN nodes. Incentive scheme is based on energy spent by the vehicular DTN node for forwarding data successfully. Routing is based on the trust value of the vehicular DTN nodes and incentive will be offered on successful delivery of the message. A source node offers the payment for successful delivery based on the time in which the message is delivered. The trust authority evaluates the credit and trust value for the participating vehicular DTN nodes based on energy and efforts put in successful delivery of the message.

This is a preview of subscription content, log in to check access.

Access options

Buy single article

Instant unlimited access to the full article PDF.

US$ 39.95

Price includes VAT for USA

Subscribe to journal

Immediate online access to all issues from 2019. Subscription will auto renew annually.

US$ 99

This is the net price. Taxes to be calculated in checkout.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

References

  1. 1.

    Fall K (2003) A delay-tolerant network architecture for challenged internets. In: Proceedings of SIGCOMM 2003, ACM, New York, NY, USA, pp 27–34

  2. 2.

    Zhang L, Song J, Pan J (2016) A privacy-preserving and secure framework for opportunistic routing in DTNs. IEEE Trans Veh Technol 65(9):7684–7697

  3. 3.

    Li Q, Cao G (2012) Mitigating routing misbehavior in disruption tolerant networks. IEEE Trans Inf Forensics Secur 7(2):664–675

  4. 4.

    Kulkarni L, Ukey N, Bakal J, Chavan N (2017) A survey on energy-efficient techniques to reduce energy consumption in delay tolerant networks. In: Vishwakarma HR, Shyam Akashe (eds) Computing and network sustainability, vol 12. Springer, Singapore, pp 83–91

  5. 5.

    Eshghi S, Khouzani MHR, Sarkar S, Shroff NB, Venkatesh SS (2015) Optimal energy-aware epidemic routing in DTNs. IEEE Trans Autom Control 60(6):1554–1569

  6. 6.

    Zhu H, Du S, Gao Z, Dong M, Cao Z (2014) A probabilistic misbehavior detection scheme toward efficient trust establishment in delay-tolerant networks. IEEE Trans Parallel Distrib Syst 25(1):22–32

  7. 7.

    Kulkarni L, Mukhopadhyay D, Bakal J (2016) Analyzing security schemes in delay tolerant networks. In: Proceedings of the international conference on data engineering and communication technology. Springer, Singapore, vol 1, issue 468, pp 613–620

  8. 8.

    Shikfa A (2011) Security challenges in opportunistic communication. In: IEEE GCC conference and exhibition (GCC), Dubai, pp 425–428

  9. 9.

    Saha S, Nandi S, Verma R (2018) Design of efficient lightweight strategies to combat DoS attack in delay tolerant network routing. J Mob Commun Comput Inf Wirel Netw 24(1):173–194

  10. 10.

    Chen H, Lou W, Wang Z, Wang Q (2016) A secure credit-based incentive mechanism for message forwarding in noncooperative DTNs. IEEE Trans Veh Technol 65(8):6377–6388

  11. 11.

    Bo Yu, Cheng-Zhong X, Xiao B (2013) Detecting sybil attacks in VANETs. J Parallel Distrib Comput 73(6):746–756

  12. 12.

    Pham TND, Yeo CK (2016) Detecting colluding blackhole and greyhole attacks in delay tolerant networks. IEEE Trans Mob Comput 15(5):1116–1129

  13. 13.

    Ren Y, Chuah MC, Yang J, Chen Y (2010) Detecting wormhole attacks in delay-tolerant networks [Security and privacy in emerging wireless networks]. IEEE Wirel Commun 17(5):36–42

  14. 14.

    Ker A, Ott J, Teemu K (2009) The ONE simulator for DTN protocol evaluation. In: Proceedings of the 2nd international conference on simulation tools and techniques ICST, Rome, Italy, ISBN 978-963-9799-45-5

  15. 15.

    Bulut E, Szymanski BK (2011) On secure multi-copy based routing in compromised delay tolerant networks. In: Proceedings of 20th international conference on computer communications and networks (ICCCN), Maui, HI, pp 1–7

  16. 16.

    Khalid W, Ullah Z, Ahmed N, Cao Y, Khalid M, Arshad M, Cruickshank H (2018) A taxonomy on misbehaving nodes in delay tolerant networks. J Comput Secur 77:442–471

  17. 17.

    Conti M, Di Pietro R, Mancini L, Mei A (2011) Distributed detection of clone attacks in wireless sensor networks. IEEE Trans Dependable Secure Comput 8(5):685–698

  18. 18.

    Chen I, Bao F, Chang M, Cho J (2014) Dynamic trust management for delay tolerant networks and its application to secure routing. IEEE Trans Parallel Distrib Syst 25(5):1200–1210

  19. 19.

    Tamez EB, Woungang I, Lilien L, Denko MK (2009) Trust management in opportunistic networks: a semantic web approach. In: IEEE conference on world congress on privacy, security, trust and the management of e-business, Saint John, NB, pp 235–238

  20. 20.

    Ayday E, Fekri F (2012) Iterative trust and reputation management using belief propagation. IEEE Trans Depend Secure Comput 9(3):375–386

  21. 21.

    Trifunovic S, Legendre F, Anastasiades C (2010) Social trust in opportunistic networks. In: INFOCOM IEEE conference on computer communications workshops, San Diego, CA, pp 1–6

  22. 22.

    Asuquo P, Cruickshank H, Ogah CPA, Lei A, Sun Z (2018) A distributed trust management scheme for data forwarding in satellite DTN emergency communications. IEEE J Sel Areas Commun 36(2):246–256

  23. 23.

    Chen T, Zhu L, Wu F, Zhong S (2011) Stimulating cooperation in vehicular ad hoc networks: a coalitional game theoretical approach. IEEE Trans Veh Technol 60(2):566–579

  24. 24.

    Zhu H, Lin X, Lu R, Fan Y, Shen X (2009) SMART: a secure multilayer credit-based incentive scheme for delay-tolerant networks. IEEE Trans Veh Technol 58(8):4628–4639

  25. 25.

    Lu R, Lin X, Zhu H, Shen X, Preiss B (2010) Pi: a practical incentive protocol for delay tolerant networks. IEEE Trans Wirel Commun 9(4):1483–1493

  26. 26.

    Zhou J, Dong X, Cao Z, Vasilakos AV (2015) Secure and privacy preserving protocol for cloud-based vehicular DTNs. IEEE Trans Inf Forensics Secur 10(6):1299–1314

  27. 27.

    Zhou H, Chen J, Fan J, Du Y, Das SK (2013) ConSub: incentive-based content subscribing in selfish opportunistic mobile networks. IEEE J Sel Areas Commun 31(9):669–679

  28. 28.

    Cai Y, Fan Y, Wen D (2016) An incentive-compatible routing protocol for two-hop delay-tolerant networks. IEEE Trans Veh Technol 65(1):266–277

  29. 29.

    Li Q, Gao W, Zhu S, Cao G (2013) To lie or to comply: defending against flood attacks in disruption tolerant networks. IEEE Trans Depend Secure Comput 10(3):168–182

  30. 30.

    Pham TND, Yeo CK, Yanai N, Fujiwara T (2017) Detecting flooding attack and accommodating burst traffic in delay-tolerant networks. IEEE Trans Veh Technol 67(1):795–808

  31. 31.

    Wei L, Cao Z, Zhu H (2011) MobiGame: a user-centric reputation based incentive protocol for delay/disruption tolerant networks. In: 2011 IEEE global telecommunications conference—GLOBECOM 2011, Kathmandu, pp 1–5

  32. 32.

    Ma Y, Jamalipour A (2010) Opportunistic node authentication in intermittently connected mobile ad hoc networks. In: 16th Asia-Pacific conference on communications (APCC), Auckland, pp. 453–457

  33. 33.

    Lv X, Mu Y, Li H (2015) Loss-tolerant bundle fragment authentication for space-based DTNs. IEEE Trans Depend Secure Comput 12(6):615–625

  34. 34.

    Bhutta MNM, Cruickshank H, Sun Z (2017) Public-key infrastructure validation and revocation mechanism suitable for delay/disruption tolerant networks. IET Inf Secur 11(1):16–22

  35. 35.

    Li Z, Liu Y, Zhu H, Sun L (2015) Coff: contact-duration-aware cellular traffic offloading over delay tolerant networks. IEEE Trans Veh Technol 64(11):5257–5268

Download references

Author information

Correspondence to Lalit Kulkarni.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Kulkarni, L., Bakal, J. & Shrawankar, U. Energy based incentive scheme for secure opportunistic routing in vehicular delay tolerant networks. Computing 102, 201–219 (2020) doi:10.1007/s00607-019-00735-2

Download citation

Keywords

  • Opportunistic networks
  • DTN
  • Incentive scheme
  • Trust establishment scheme

Mathematices Subject Classification

  • 65R20
  • 68W01
  • 68Q25