Security and Trust in Opportunistic Networks – A Survey

ABSTRACT Opportunistic networks or OppNets refer to a number of wireless nodes opportunistically communicating with each other in a form of “Store–Carry–Forward”. This occurs when they come into contact with each other without proper network infrastructure. OppNets use wireless technologies, such as IEEE 802.11, WiMAX, Bluetooth, and other short-range radio communication. In OppNets, there is no end-to-end connection between the source and the destination nodes, and the nodes usually have high mobility, low density, limited power, short radio range, and often subject to different kinds of attacks by malicious nodes. Due to these characteristics and features, OppNets are subject to serious security challenges. OppNets strongly depend on human interaction; therefore, the success of securing such networks is based on trust between people. This survey includes the security approaches in OppNets and techniques used to increase their security levels.

[1]  Cristina Nita-Rotaru,et al.  JANUS: towards robust and malicious resilient routing in hybrid wireless networks , 2004, WiSe '04.

[2]  Robert H. Deng,et al.  Highly reliable trust establishment scheme in ad hoc networks , 2004, Comput. Networks.

[3]  Mohammad S. Obaidat,et al.  Trust-based Security Protocol against blackhole attacks in opportunistic networks , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[4]  Franck Legendre,et al.  Social Trust in Opportunistic Networks , 2010, 2010 INFOCOM IEEE Conference on Computer Communications Workshops.

[5]  Wenke Lee,et al.  A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.

[6]  Iwao Sasase,et al.  Trust level evaluation for communication paths in MANETs by using Attribute Certificates , 2010, International Conference on Communications and Electronics 2010.

[7]  Zygmunt J. Haas,et al.  The shared wireless infostation model: a new ad hoc networking paradigm (or where there is a whale, there is a way) , 2003, MobiHoc '03.

[8]  Nidal Nasser,et al.  Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks , 2007, 2007 IEEE International Conference on Communications.

[9]  Wang Bo,et al.  Trust-based minimum cost opportunistic routing for Ad hoc networks , 2011 .

[10]  Yue Wu,et al.  Security and trust management in opportunistic networks: a survey , 2015, Secur. Commun. Networks.

[11]  Xin Zhang,et al.  Packet-dropping adversary identification for data plane security , 2008, CoNEXT '08.

[12]  Hiroshi Shigeno,et al.  PTrust: Provisional Value based trust for reputation aggregation in peer-to-peer networks , 2011, 2011 1st International Symposium on Access Spaces (ISAS).

[13]  Guo Yajun,et al.  Establishing Trust Relationship in Mobile Ad-Hoc Network , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.

[14]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[15]  S. Buchegger,et al.  A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .

[16]  Khaled A. Harras,et al.  Social-Based Trust in Mobile Opportunistic Networks , 2011, 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN).

[17]  Zhenhua Tan,et al.  A New Method of Trust Inference Based on Markov Model for Peer-to-Peer Network , 2012, 2012 IEEE 12th International Conference on Computer and Information Technology.

[18]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[19]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[20]  Ananthram Swami,et al.  Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks , 2012, J. Netw. Comput. Appl..

[21]  Zhu Han,et al.  Trust modeling and evaluation in ad hoc networks , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[22]  Ahmed Helmy,et al.  PROTECT: proximity-based trust-advisor using encounters for mobile societies , 2010, IWCMC.

[23]  Levente Buttyán,et al.  Barter-based cooperation in delay-tolerant personal wireless networks , 2007, 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[24]  Jie Wu,et al.  Thwarting Blackhole Attacks in Disruption-Tolerant Networks using Encounter Tickets , 2009, IEEE INFOCOM 2009.

[25]  Peng Yang,et al.  Impact of Selective Dropping Attacks on Network Coding Performance in DTNs and a Potential Mitigation Scheme , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.

[26]  Gianluca Dini,et al.  Towards a reputation-based routing protocol to contrast blackholes in a delay tolerant network , 2012, Ad Hoc Networks.

[27]  Elisa Bertino,et al.  A Provenance Based Mechanism to Identify Malicious Packet Dropping Adversaries in Sensor Networks , 2011, 2011 31st International Conference on Distributed Computing Systems Workshops.

[28]  Amin Vahdat,et al.  Epidemic Routing for Partially-Connected Ad Hoc Networks , 2009 .

[29]  Yih-Chun Hu Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .

[30]  Jianping Wu,et al.  TrustP2PNet: P2P Social Network with Admission Control Model based on Trust , 2013 .

[31]  Abderrahmane Baadache,et al.  Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks , 2012, J. Netw. Comput. Appl..

[32]  Sajal K. Das,et al.  A trust-based framework for data forwarding in opportunistic networks , 2013, Ad Hoc Networks.

[33]  Jie Yang,et al.  MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks , 2010, 2010 IEEE Wireless Communication and Networking Conference.

[34]  Ma Ke,et al.  A new packet dropping policy in delay tolerant network , 2010, 2010 IEEE 12th International Conference on Communication Technology.

[35]  Jaydip Sen,et al.  A distributed protocol for detection of packet dropping attack in mobile ad hoc networks , 2007, 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications.

[36]  Donald F. Towsley,et al.  Anti-localization anonymous routing for Delay Tolerant Network , 2010, Comput. Networks.

[37]  Mun Choon Chan,et al.  MobiCent: a Credit-Based Incentive System for Disruption Tolerant Network , 2010, 2010 Proceedings IEEE INFOCOM.

[38]  Zhenfu Cao,et al.  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks , 2014 .

[39]  Xue Liu,et al.  A trust model based on fuzzy recommendation for mobile ad-hoc networks , 2009, Comput. Networks.

[40]  Mihaela Cardei,et al.  A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .

[41]  Yong Wang,et al.  Energy-efficient computing for wildlife tracking: design tradeoffs and early experiences with ZebraNet , 2002, ASPLOS X.

[42]  Marianne Azer,et al.  A Novel Proximity Based Trust Model for Opportunistic Networks , 2013, 2013 International Conference on Availability, Reliability and Security.

[43]  Karin Anna Hummel,et al.  Preventing spam in opportunistic networks , 2014, Comput. Commun..

[44]  Soo Young Shin,et al.  Wormhole attacks detection in MANETs using routes redundancy and time-based hop calculation , 2012, 2012 International Conference on ICT Convergence (ICTC).

[45]  Vicky H. Mak-Hau,et al.  Packet Faking Attack: A Novel Attack and Detection Mechanism in OppNets , 2014, 2014 Tenth International Conference on Computational Intelligence and Security.

[46]  JianHua Song,et al.  A reputation-based scheme against malicious packet dropping for mobile ad hoc networks , 2009, 2009 IEEE International Conference on Intelligent Computing and Intelligent Systems.

[47]  Shivakant Mishra,et al.  CenWits: a sensor-based loosely coupled search and rescue system using witnesses , 2005, SenSys '05.

[48]  Zhu Han,et al.  A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[49]  Indranil Sengupta,et al.  Approach for modelling trust in cluster-based wireless ad hoc networks , 2014, IET Networks.

[50]  Peng Yang,et al.  A Ferry-based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks , 2007, 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous).

[51]  Robert Beverly,et al.  Toward anonymity in Delay Tolerant Networks: Threshold Pivot Scheme , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.

[52]  Jie Yang,et al.  Detecting blackhole attacks in Disruption-Tolerant Networks through packet exchange recording , 2010, 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).

[53]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[54]  Yang Xiang,et al.  A novel multiple-level trust management framework for wireless sensor networks , 2014, Comput. Networks.

[55]  Brejesh Lall,et al.  Privacy Protection Through k.anonymity in Location.based Services , 2012 .

[56]  Lorena González-Manzano,et al.  Security Models in Vehicular Ad-hoc Networks: A Survey , 2014 .

[57]  Ling Liu,et al.  PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.

[58]  Jean-Yves Le Boudec,et al.  Self-policing mobile ad hoc networks by reputation systems , 2005, IEEE Communications Magazine.

[59]  Edson dos Santos Moreira,et al.  Trust Management in Opportunistic Networks , 2010, 2010 Ninth International Conference on Networks.

[60]  Robin Doss,et al.  Defense against packet dropping attacks in opportunistic networks , 2014, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[61]  Erman Ayday,et al.  Trust management and adversary detection for delay tolerant networks , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.