Trust opportunistic routing protocol in multi-hop wireless networks

opportunistically perform packet forwarding. Network security is also a hot research topic on routing. However, combining above two ideas to devise an effective routing is none. This paper aims at giving a new solution to solve it by defining a new metric called E2TX(trustworthiness and ETX). Using this metric, we also consider the two key issues for a new routing protocol called TOR: candidate selection and prioritization of relays in classical opportunistic routing. Through extensive simulations by NS2, we demonstrate that TOR outperforms class routing:ExOR, in terms of packet

[1]  Robert Tappan Morris,et al.  ExOR: opportunistic multi-hop routing for wireless networks , 2005, SIGCOMM '05.

[2]  John S. Baras,et al.  Trust evaluation in ad-hoc networks , 2004, WiSe '04.

[3]  Sachin Katti,et al.  Trading structure for randomness in wireless opportunistic routing , 2007, SIGCOMM '07.

[4]  Levente Buttyán,et al.  Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..

[5]  Jim Dowling,et al.  Using feedback in collaborative reinforcement learning to adaptively optimize MANET routing , 2005, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[6]  H. Dubois-Ferriere,et al.  Multirate Anypath Routing in Wireless Mesh Networks , 2008, IEEE INFOCOM 2009.

[7]  Robert Tappan Morris,et al.  a high-throughput path metric for multi-hop wireless routing , 2003, MobiCom '03.

[8]  L MarkBrian,et al.  Hermes: A quantitative trust establishment framework for reliable data packet delivery in MANETs , 2007 .

[9]  Lili Qiu,et al.  Simple opportunistic routing protocol for wireless mesh networks , 2006, 2006 2nd IEEE Workshop on Wireless Mesh Networks.

[10]  Chris McDonald,et al.  Establishing Trust In Pure Ad-hoc Networks , 2004, ACSC.

[11]  John S. Baras,et al.  Ant-based adaptive trust evidence distribution in MANET , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..

[12]  Licia Capra,et al.  Engineering human trust in mobile system collaborations , 2004, SIGSOFT '04/FSE-12.

[13]  Brian L. Mark,et al.  Robust cooperative trust establishment for MANETs , 2006, SASN '06.

[14]  Srihari Nelakuditi,et al.  On the Efficacy of Opportunistic Routing , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[15]  Jan M. Rabaey,et al.  When does opportunistic routing make sense? , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.

[16]  John S. Baras,et al.  On Trust Establishment in Mobile Ad-Hoc Networks , 2002, Security Protocols Workshop.