Secure opportunistic routing protocols: methods, models, and classification
- 123 Downloads
Addressing communication reliability and security has always been of significant importance in wireless networks. Opportunistic routing (OR) protocols comprise a promising area of research that aims to improve the reliability of communications, particularly in lossy networks. The main concept behind OR protocols is to utilize the broadcast nature of the wireless medium and determine a group of neighboring node candidates, known as candidate set, to collaboratively forward packets towards the destination using a candidate coordination approach. However, similar to traditional routing protocols, OR protocols operate poorly in the presence of malicious nodes and attackers. Therefore, researchers have designed and developed a number of security enhancements, considering the specific characteristics of such protocols. In this paper, following a brief overview on OR protocols, we examine, classify, and compare the different categories of security approaches proposed for OR protocols. More precisely, we divide security-related OR protocols into three categories, including trust-based approaches, game-theory-oriented solutions, and other related protocols. Furthermore, the most significant algorithms of each category are investigated as case studies. Finally, a comparison of different protocols is presented considering the main features, advantages, and shortcomings of each protocol.
KeywordsWireless networks Opportunistic routing Security
This work was partially supported by Canada Research Chair Programs, DIVA Strategic Research Network, and Natural Sciences and Engineering Research Council of Canada (NSERC).
- 1.Agrawal, S., Jain, S., & Sharma, S. (2011). A survey of routing attacks and security measures in mobile ad-hoc networks. arXiv preprint arXiv:1105.5623.
- 11.Darehshoorzadeh, A., & Cerda-Alabern, L. (2012). Distance progress based opportunistic routing for wireless mesh networks. In Wireless Communications and Mobile Computing Conference (IWCMC), 2012 8th International (pp. 179–184). IEEEGoogle Scholar
- 16.Laufer, R., Dubois-Ferriere, H., & Kleinrock, L. (2009). Multirate anypath routing in wireless mesh networks. In INFOCOM 2009, IEEE (pp. 37–45). IEEE.Google Scholar
- 18.Le, T., & Liu, Y. (2010). Opportunistic overlay multicast in wireless networks. In Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE (pp. 1–5). IEEE.Google Scholar
- 19.Li, Y., Chen, W., & Zhang, Z. L. (2009). Optimal forwarder list selection in opportunistic routing. In Mobile Adhoc and Sensor Systems, 2009. MASS’09. IEEE 6th International Conference on (pp. 670–675). IEEE.Google Scholar
- 20.Lin, Y., Li, B., & Liang, B. (2008). CodeOR: Opportunistic routing in wireless mesh networks with segmented network coding. In Network Protocols, 2008. ICNP 2008. IEEE International Conference on (pp. 13–22). IEEE.Google Scholar
- 23.Salehi, M., & Boukerche, A. (2014). Trust-aware opportunistic routing protocol for wireless networks. In Proceedings of the 10th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Q2SWinet ’14 (pp. 79–86). New York, NY: ACM. doi: 10.1145/2642687.2642692.
- 24.Salehi, M., & Boukerche, A. (2016). PASOR: A packet salvaging model for opportunistic routing protocols. In Accepted in IEEE International Conference on Mobile Ad hoc and Sensor Systems (MASS), 2016 13th International Conference on (pp. 1–8). IEEE.Google Scholar
- 25.Salehi, M., Boukerche, A., & Darehshoorzadeh, A. (2016). Modeling and performance evaluation of security attacks on opportunistic routing protocols for multihop wireless networks. Ad Hoc Networks. doi: 10.1016/j.adhoc.2016.07.004.
- 26.Salehi, M., & Samavati, H. (2012). Dsr vs olsr: Simulation based comparison of ad hoc reactive and proactive algorithms under the effect of new routing attacks. In Next Generation Mobile Applications, Services and Technologies (NGMAST), 2012 6th International Conference on (pp. 100–105). IEEEGoogle Scholar
- 27.Shah, N., & Huang, D. (2010). A-weor: Communication privacy protection for wireless mesh networks using encoded opportunistic routing. In INFOCOM IEEE Conference on Computer Communications Workshops, 2010 (pp. 1–6). IEEE.Google Scholar
- 29.WenZhong, Y., ChuanHe, H., Bo, W., ZhenYu, Z., & Tong, W. (2010). A reliable multicast for MANETs based on opportunistic routing and network coding. In Wireless Communications, Networking and Information Security (WCNIS), 2010 IEEE International Conference on (pp. 540–545). IEEE.Google Scholar
- 33.Yan, Z., Zhang, P., & Virtanen, T. (2003). Trust evaluation based security solution in ad hoc networks. In Proceedings of the Seventh Nordic Workshop on Secure IT Systems (Vol. 14).Google Scholar
- 34.Yang, S., Zhong, F., Yeo, C. K., Lee, B. S., & Boleng, J. (2009). Position based opportunistic routing for robust data delivery in MANETs. In Global Telecommunications Conference, 2009. GLOBECOM 2009. IEEE (pp. 1–6). IEEE.Google Scholar
- 36.Zhang, J. (2011). A survey on trust management for vanets. In Advanced Information Networking and Applications (AINA), 2011 IEEE International Conference on (pp. 105–112). IEEE.Google Scholar
- 37.Zhang, K., Wang, R., & Qian, D. (2010). Aim: An auction incentive mechanism in wireless networks with opportunistic routing. In Computational Science and Engineering (CSE), 2010 IEEE 13th International Conference on (pp. 28–33). IEEE.Google Scholar