Trust-based minimum cost opportunistic routing for Ad hoc networks

Recently, opportunistic routing has received much attention as a new design direction. It can exploit the wireless broadcast and more highly reliable opportunistic forwarding, so as to substantially increase the throughput of network. Due to dynamic topology, distributed collaboration, limited bandwidth and computing ability, the absence of enough physical protection in Ad hoc networks, opportunistic routing is vulnerable to attacks by malicious nodes. In order to alleviate the malicious behaviors, we incorporate the concept of trust to Ad hoc networks, build a simple trust model to evaluate neighbors' forwarding behavior and apply this model to opportunistic routing for Ad hoc networks. A new trusted opportunistic forwarding model is proposed by choosing the trusted and highest priority candidate forwarder, then a trusted minimum cost routing algorithm (MCOR) is formally formulated, the correctness and effectiveness of this algorithm from theoretical analysis are also approved. Finally, MCOR algorithm is verified by simulation using nsclick software and compared its performance with the classic protocols: ExOR, TAODV and Watchdog-DSR. The simulation results show that MCOR scheme can detect and mitigate node misbehaviors. Furthermore, MCOR scheme outperforms the other protocols in terms of: throughput, delay, Expected ETX, security-gains and cost of routing.

[1]  Wenjing Lou,et al.  Multi-Rate Geographic Opportunistic Routing in Wireless Ad Hoc Networks , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[2]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[3]  Zhenyu Yang,et al.  Opportunistic Routing in Multi-Radio Multi-Channel Multi-Hop Wireless Networks , 2010, IEEE Transactions on Wireless Communications.

[4]  Lili Qiu,et al.  SOAR: Simple Opportunistic Adaptive Routing Protocol for Wireless Mesh Networks , 2009, IEEE Transactions on Mobile Computing.

[5]  Jie Wu,et al.  Opportunistic Routing Algebra and its Applications , 2009, IEEE INFOCOM 2009.

[6]  Elizabeth M. Belding-Royer,et al.  Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.

[7]  Amitava Datta,et al.  Performance comparison of trust-based reactive routing protocols , 2006, IEEE Transactions on Mobile Computing.

[8]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[9]  Lachlan L. H. Andrew,et al.  Opportunistic Source Coding for Data Gathering in Wireless Sensor Networks , 2007, MASS.

[10]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[11]  Robert Tappan Morris,et al.  a high-throughput path metric for multi-hop wireless routing , 2003, MobiCom '03.

[12]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[13]  Chris Blondia,et al.  Enabling cross layer design: adding the MadWifi extensions to Nsclick , 2007, Valuetools 2007.

[14]  BERNARD M. WAXMAN,et al.  Routing of multipoint connections , 1988, IEEE J. Sel. Areas Commun..

[15]  Wenjing Lou,et al.  On throughput efficiency of geographic opportunistic routing in multihop wireless networks , 2007, QSHINE.

[16]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[17]  Yi Zhang,et al.  Fuzzy trust recommendation based on collaborative filtering for mobile ad-hoc networks , 2008, 2008 33rd IEEE Conference on Local Computer Networks (LCN).

[18]  Tao Cui Opportunistic Source Coding for Data Gathering in Wireless Sensor Networks , 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.

[19]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[20]  EDDIE KOHLER,et al.  The click modular router , 2000, TOCS.

[21]  Manel Guerrero Zapata Secure ad hoc on-demand distance vector routing , 2002, MOCO.

[22]  Muqing Wu,et al.  A Priority Based Opportunistic Routing Mechanism for Real-Time Voice Service in Mobile Ad hoc Networks , 2010, Wirel. Pers. Commun..

[23]  Weijia Jia,et al.  Voting-Based Clustering Algorithm with Subjective Trust and Stability in Mobile Ad Hoc Networks , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[24]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[25]  Joseph P. Macker,et al.  Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations , 1999, RFC.

[26]  Sachin Katti,et al.  Trading structure for randomness in wireless opportunistic routing , 2007, SIGCOMM 2007.

[27]  Antonio F. Gómez-Skarmeta,et al.  PKI-based trust management in inter-domain scenarios , 2010, Comput. Secur..

[28]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[29]  Matthias Grossglauser,et al.  Least-Cost Opportunistic Routing , 2007 .

[30]  John S. Baras,et al.  On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[31]  Yacine Challal,et al.  Reliable and fully distributed trust model for mobile ad hoc networks , 2009, Comput. Secur..

[32]  Ruidong Li,et al.  Future trust management framework for mobile ad hoc networks , 2008, IEEE Communications Magazine.

[33]  Zhu Han,et al.  Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[34]  Jie Wu,et al.  Efficient Opportunistic Routing in Utility-Based Ad Hoc Networks , 2009, IEEE Transactions on Reliability.

[35]  Robert Tappan Morris,et al.  ExOR: opportunistic multi-hop routing for wireless networks , 2005, SIGCOMM '05.

[36]  Xiaoqi Li,et al.  A trust model based routing protocol for secure ad hoc networks , 2004, 2004 IEEE Aerospace Conference Proceedings (IEEE Cat. No.04TH8720).

[37]  Hongqiang Zhai,et al.  On End-to-End Throughput of Opportunistic Routing in Multirate and Multihop Wireless Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[38]  Manel Guerrero Zapata Secure Ad hoc On-Demand Distance Vector (SAODV) Routing , 2006 .

[39]  Srihari Nelakuditi,et al.  On the Efficacy of Opportunistic Routing , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[40]  Ma Jian,et al.  Opportunistic Routing Protocols for Wireless Multihop Networks , 2010 .

[41]  Vladimiro Sassone,et al.  An analysis of the exponential decay principle in probabilistic trust models , 2009, Theor. Comput. Sci..