Security and trust management in opportunistic networks: a survey

As a new networking paradigm, opportunistic networking communications have great vision in animal migration tracking, mobile social networking, network communications in remote areas and intelligent transportation, and so on. Opportunistic networks are one of the evolutionary mobile ad hoc networks, whose communication links often suffer from frequent disruption and long communication delays. Therefore, many opportunistic forwarding protocols present major security issues, and the design of opportunistic networks faces serious challenges such as how to effectively protect data confidentiality and integrity and how to ensure routing security, privacy, cooperation, and trust management. In this paper, we first systematically describe the security threats and requirements in opportunistic networks; then propose a general security architecture of opportunistic networks; and then make an in-depth analysis on authentication and access control, secure routing, privacy protection, trust management, and incentive cooperation mechanisms; and at the same time, we present a comparison of various security and trust solutions for opportunistic networks. Finally, we conclude and give future research directions. Copyright © 2014 John Wiley & Sons, Ltd.

[1]  Scott Shenker,et al.  A data-oriented (and beyond) network architecture , 2007, SIGCOMM 2007.

[2]  Mun Choon Chan,et al.  MobiCent: a Credit-Based Incentive System for Disruption Tolerant Network , 2010, 2010 Proceedings IEEE INFOCOM.

[3]  Scott C. Burleigh,et al.  Bundle Protocol Specification , 2007, RFC.

[4]  Mihaela Cardei,et al.  A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .

[5]  Xiaodong Lin,et al.  A privacy-preserving proximity friend notification scheme with opportunistic networking , 2012, 2012 IEEE International Conference on Communications (ICC).

[6]  Antonio Alfredo Ferreira Loureiro,et al.  Protocols, mobility models and tools in opportunistic networks: A survey , 2014, Comput. Commun..

[7]  Stephen Farrell,et al.  Bundle Security Protocol Specification , 2011, RFC.

[8]  Franck Legendre,et al.  Social Trust in Opportunistic Networks , 2010, 2010 INFOCOM IEEE Conference on Computer Communications Workshops.

[9]  A. F. Adams,et al.  The Survey , 2021, Dyslexia in Higher Education.

[10]  Van Jacobson,et al.  Networking named content , 2009, CoNEXT '09.

[11]  V. Jacobson,et al.  Securing Network Content , 2009 .

[12]  Yonggang Wen,et al.  Towards name-based trust and security for content-centric network , 2011, 2011 19th IEEE International Conference on Network Protocols.

[13]  Xuemin Shen,et al.  Stimulating Cooperation in Multi-hop Wireless Networks Using Cheating Detection System , 2010, 2010 Proceedings IEEE INFOCOM.

[14]  Jianfeng Ma,et al.  PRIAM: Privacy Preserving Identity and Access Management Scheme in Cloud , 2014, KSII Trans. Internet Inf. Syst..

[15]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[16]  G. Pulla,et al.  A SURVEY ON TRUST MANAGEMENT FOR MOBILE AD HOC NETWORKS , 2010 .

[17]  Milena Radenkovic,et al.  Efficient Location Privacy-Aware Forwarding in Opportunistic Mobile Networks , 2014, IEEE Transactions on Vehicular Technology.

[18]  Xiaodong Lin,et al.  A secure incentive scheme for delay tolerant networks , 2008, 2008 Third International Conference on Communications and Networking in China.

[19]  John S. Baras,et al.  Trust evaluation in ad-hoc networks , 2004, WiSe '04.

[20]  Mary Baker,et al.  Observation-based Cooperation Enforcement in Ad Hoc Networks , 2003, ArXiv.

[21]  Brian Gallagher,et al.  MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[22]  Refik Molva,et al.  Privacy in Content-Based Opportunistic Networks , 2009, 2009 International Conference on Advanced Information Networking and Applications Workshops.

[23]  Cauligi S. Raghavendra,et al.  Spray and wait: an efficient routing scheme for intermittently connected mobile networks , 2005, WDTN '05.

[24]  Liam McNamara,et al.  Making the most of your contacts: transfer ordering in data-centric opportunistic networks , 2012, MobiOpp '12.

[25]  Christine Julien,et al.  MADServer: a server architecture for mobile advanced delivery , 2012, CHANTS '12.

[26]  Jean-Yves Le Boudec,et al.  Vulnerabilities in Epidemic Forwarding , 2007, 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[27]  V. Cahill,et al.  Security considerations in space and delay tolerant networks , 2006, 2nd IEEE International Conference on Space Mission Challenges for Information Technology (SMC-IT'06).

[28]  Paolo Santi,et al.  Social-aware stateless forwarding in pocket switched networks , 2011, 2011 Proceedings IEEE INFOCOM.

[29]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[30]  Abbas Jamalipour,et al.  Opportunistic node authentication in intermittently connected mobile ad hoc networks , 2010, 2010 16th Asia-Pacific Conference on Communications (APCC).

[31]  Khaled A. Harras,et al.  Social-Based Trust in Mobile Opportunistic Networks , 2011, 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN).

[32]  S. Belle,et al.  Consistent deniable lying : privacy in mobile social networks , 2008 .

[33]  Refik Molva,et al.  Privacy in context-based and epidemic forwarding , 2009, 2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops.

[34]  K. Komathy,et al.  Best neighbor strategy to enforce cooperation among selfish nodes in wireless ad hoc network , 2007, Comput. Commun..

[35]  Levente Buttyán,et al.  Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..

[36]  Panagiotis Papadimitratos,et al.  On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[37]  Joan Feigenbaum,et al.  The Role of Trust Management in Distributed Systems Security , 2001, Secure Internet Programming.

[38]  Marco Conti,et al.  From ego network to social network models , 2012, MobiOpp '12.

[39]  Vikram Srinivasan,et al.  Cooperation in wireless ad hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[40]  Aris S. Lalos,et al.  Experimental Investigation of Cooperative Schemes on a Real-Time DSP-Based Testbed , 2009, EURASIP J. Wirel. Commun. Netw..

[41]  David Lazer,et al.  Inferring friendship network structure by using mobile phone data , 2009, Proceedings of the National Academy of Sciences.

[42]  Mucheol Kim,et al.  Trust and Risk based Access Control and Access Control Constraints , 2011, KSII Trans. Internet Inf. Syst..

[43]  Anders Lindgren,et al.  Probabilistic routing in intermittently connected networks , 2003, MOCO.

[44]  Haitham S. Cruickshank,et al.  Managing Access Control in Delay/Disruption Tolerant Networking (DTN) Environment , 2011, 2011 4th IFIP International Conference on New Technologies, Mobility and Security.

[45]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[46]  Paolo Santi,et al.  Privacy-preserving interest-casting in opportunistic networks , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).

[47]  Brian L. Mark,et al.  Robust cooperative trust establishment for MANETs , 2006, SASN '06.

[48]  Jörg Ott,et al.  Applicability of identity-based cryptography for disruption-tolerant networking , 2007, MobiOpp '07.

[49]  Mads Haahr,et al.  Social Network Analysis for Information Flow in Disconnected Delay-Tolerant MANETs , 2009, IEEE Transactions on Mobile Computing.

[50]  Marco Conti,et al.  From opportunistic networks to opportunistic computing , 2010, IEEE Communications Magazine.

[51]  Nai-Wei Lo,et al.  A Reputation System for Traffic Safety Event on Vehicular Ad Hoc Networks , 2009, EURASIP J. Wirel. Commun. Netw..

[52]  Glenn Shafer,et al.  A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.

[53]  Amin Vahdat,et al.  Epidemic Routing for Partially-Connected Ad Hoc Networks , 2009 .

[54]  Xiaodong Lin,et al.  SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks , 2009, IEEE Transactions on Vehicular Technology.

[55]  Iain Parris,et al.  Privacy-enhanced social-network routing , 2012, Comput. Commun..

[56]  Marco Conti,et al.  Opportunistic networking: data forwarding in disconnected mobile ad hoc networks , 2006, IEEE Communications Magazine.

[57]  Xiaodong Lin,et al.  SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks , 2009, 2010 Proceedings IEEE INFOCOM.

[58]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.

[59]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[60]  Chunming Qiao,et al.  A Game-Theoretic Approach to Stimulate Cooperation for Probabilistic Routing in Opportunistic Networks , 2013, IEEE Transactions on Wireless Communications.

[61]  Franck Legendre,et al.  Trust in Opportunistic Networks , 2009 .

[62]  Yin Zhang,et al.  Incentive-aware routing in DTNs , 2008, 2008 IEEE International Conference on Network Protocols.

[63]  Mike Burmester,et al.  Cooperation in Mobile Ad Hoc Networks , 2009, Guide to Wireless Ad Hoc Networks.

[64]  Leszek Lilien,et al.  The Concept of Opportunistic Networks and their Research Challenges in Privacy and Security , 2007 .

[65]  Marcel Waldvogel,et al.  Major Domus Redux: Privacy in Mobile Social P2P Networks , 2008 .

[66]  David F. Ferraiolo,et al.  Assessment of Access Control Systems , 2006 .

[67]  K. Psounis,et al.  Efficient Routing in Intermittently Connected Mobile Networks: The Single-Copy Case , 2008, IEEE/ACM Transactions on Networking.

[68]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[69]  Eitan Altman,et al.  Non-cooperative Forwarding in Ad-Hoc Networks , 2005, NETWORKING.

[70]  Ioannis Stavrakakis,et al.  On the Effects of Cooperation in DTNs , 2007, 2007 2nd International Conference on Communication Systems Software and Middleware.

[71]  John S. Baras,et al.  On Trust Establishment in Mobile Ad-Hoc Networks , 2002, Security Protocols Workshop.

[72]  Xiaodong Lin,et al.  Pi: A practical incentive protocol for delay tolerant networks , 2010, IEEE Transactions on Wireless Communications.

[73]  Aniket Kate,et al.  Anonymity and security in delay tolerant networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[74]  Sajal K. Das,et al.  RADON: reputation-assisted data forwarding in opportunistic networks , 2010, MobiOpp '10.

[75]  Iain Parris Privacy-enhanced opportunistic networks , 2010, MobiOpp '10.

[76]  Sajal K. Das,et al.  A trust-based framework for data forwarding in opportunistic networks , 2013, Ad Hoc Networks.

[77]  Milena Radenkovic,et al.  Adaptive user anonymity for mobile opportunistic networks , 2012, CHANTS '12.

[78]  Stephen Farrell,et al.  Delay-Tolerant Networking Security Overview , 2009 .