Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (11)

Search Parameters:
Keywords = opportunistic routing security

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
22 pages, 3660 KiB  
Article
Context-Aware Trust Prediction for Optimal Routing in Opportunistic IoT Systems
by Abdulkadir Abdulahi Hasan, Xianwen Fang, Sohaib Latif and Adeel Iqbal
Sensors 2025, 25(12), 3672; https://doi.org/10.3390/s25123672 - 12 Jun 2025
Viewed by 540
Abstract
The Social Opportunistic Internet of Things (SO-IoT) is a rapidly emerging paradigm that enables mobile, ad-hoc device communication based on both physical and social interactions. In such networks, routing decisions heavily depend on the selection of intermediate nodes to ensure secure and efficient [...] Read more.
The Social Opportunistic Internet of Things (SO-IoT) is a rapidly emerging paradigm that enables mobile, ad-hoc device communication based on both physical and social interactions. In such networks, routing decisions heavily depend on the selection of intermediate nodes to ensure secure and efficient data dissemination. Traditional approaches relying solely on reliability or social interest fail to capture the multifaceted trustworthiness of nodes in dynamic SO-IoT environments. This paper proposes a trust-based route optimization framework that integrates social interest and behavioral reliability using Bayesian inference and Jeffrey’s conditioning. A composite trust level is computed for each intermediate node to determine its suitability for data forwarding. To validate the framework, we conduct a two-phase simulation-based analysis: a scenario-driven evaluation that demonstrates the model’s behavior in controlled settings, and a large-scale NS-3-based simulation comparing our method with benchmark routing schemes, including random, greedy, and AI-based protocols. Results confirm that our proposed model achieves up to an 88.9% delivery ratio with minimal energy consumption and the highest trust accuracy (86.5%), demonstrating its robustness and scalability in real-world-inspired IoT environments. Full article
(This article belongs to the Special Issue Data Engineering in the Internet of Things—Second Edition)
Show Figures

Figure 1

20 pages, 1355 KiB  
Article
Context-Aware Trust and Reputation Routing Protocol for Opportunistic IoT Networks
by Jagdeep Singh, Sanjay Kumar Dhurandher, Isaac Woungang and Han-Chieh Chao
Sensors 2024, 24(23), 7650; https://doi.org/10.3390/s24237650 - 29 Nov 2024
Cited by 5 | Viewed by 1575
Abstract
In opportunistic IoT (OppIoT) networks, non-cooperative nodes present a significant challenge to the data forwarding process, leading to increased packet loss and communication delays. This paper proposes a novel Context-Aware Trust and Reputation Routing (CATR) protocol for opportunistic IoT networks, which leverages the [...] Read more.
In opportunistic IoT (OppIoT) networks, non-cooperative nodes present a significant challenge to the data forwarding process, leading to increased packet loss and communication delays. This paper proposes a novel Context-Aware Trust and Reputation Routing (CATR) protocol for opportunistic IoT networks, which leverages the probability density function of the beta distribution and some contextual factors, to dynamically compute the trust and reputation values of nodes, leading to efficient data dissemination, where malicious nodes are effectively identified and bypassed during that process. Simulation experiments using the ONE simulator show that CATR is superior to the Epidemic protocol, the so-called beta-based trust and reputation evaluation system (denoted BTRES), and the secure and privacy-preserving structure in opportunistic networks (denoted PPHB+), achieving an improvement of 22%, 15%, and 9% in terms of average latency, number of messages dropped, and average hop count, respectively, under varying number of nodes, buffer size, time to live, and message generation interval. Full article
Show Figures

Figure 1

22 pages, 1246 KiB  
Article
SROR: A Secure and Reliable Opportunistic Routing for VANETs
by Huibin Xu and Ying Wang
Vehicles 2024, 6(4), 1730-1751; https://doi.org/10.3390/vehicles6040084 - 30 Sep 2024
Viewed by 1616
Abstract
In Vehicular Ad Hoc Networks (VANETs), high mobility of vehicles issues a huge challenge to the reliability and security of transmitting packets. Therefore, a Secure and Reliable Opportunistic Routing (SROR) is proposed in this paper. During construction of Candidate Forwarding Nodes (CFNs) set, [...] Read more.
In Vehicular Ad Hoc Networks (VANETs), high mobility of vehicles issues a huge challenge to the reliability and security of transmitting packets. Therefore, a Secure and Reliable Opportunistic Routing (SROR) is proposed in this paper. During construction of Candidate Forwarding Nodes (CFNs) set, the relative velocity, connectivity probability, and packet forwarding ratio are taken into consideration. The aim of SROR is to maximally improve the packet delivery ratio as well as reduce the end-to-end delay. The selection of a relay node from CFNs is formalized as a Markov Decision Process (MDP) optimization. The SROR algorithm extracts useful knowledge from historical behavior of nodes by interacting with the environment. This useful knowledge are utilized to select the relay node as well as to prevent the malicious nodes from forwarding packets. In addition, the influence of different learning rate and exploratory factor policy on rewards of agents are analyzed. The experimental results show that the performance of SROR outperforms the benchmarks in terms of the packet delivery ratio, end-to-end delay, and attack success ratio. As vehicle density ranges from 10 to 50 and percentage of malicious vehicles is fixed at 10%, the average of packet delivery ratio, end-to-end delay, and attack success ratio are 0.82, 0.26s, and 0.37, respectively, outperforming benchmark protocols. Full article
Show Figures

Figure 1

22 pages, 9131 KiB  
Article
Research on Secure Community Opportunity Network Based on Trust Model
by Bing Su and Jiwu Liang
Future Internet 2024, 16(4), 121; https://doi.org/10.3390/fi16040121 - 1 Apr 2024
Cited by 2 | Viewed by 1575
Abstract
With the innovation of wireless communication technology and the surge of data in mobile networks, traditional routing strategies need to be improved. Given the shortcomings of existing opportunistic routing strategies in transmission performance and security, this paper proposes a community opportunistic routing decision-making [...] Read more.
With the innovation of wireless communication technology and the surge of data in mobile networks, traditional routing strategies need to be improved. Given the shortcomings of existing opportunistic routing strategies in transmission performance and security, this paper proposes a community opportunistic routing decision-making method based on the trust model. This algorithm calculates the node’s trust value through the node’s historical forwarding behavior and then calculates the node’s trust value based on the trust model. Thresholds and trust attenuation divide dynamic security communities. For message forwarding, nodes in the security community are prioritized as next-hop relay nodes, thus ensuring that message delivery is always in a safe and reliable environment. On this basis, better relay nodes are further selected for message forwarding based on the node centrality, remaining cache space, and remaining energy, effectively improving the message forwarding efficiency. Through node trust value and community cooperation, safe and efficient data transmission is achieved, thereby improving the transmission performance and security of the network. Through comparison of simulation and opportunistic network routing algorithms, compared with traditional methods, this strategy has the highest transmission success rate of 81% with slightly increased routing overhead, and this algorithm has the lowest average transmission delay. Full article
Show Figures

Figure 1

24 pages, 8449 KiB  
Article
A Secure Opportunistic Network with Efficient Routing for Enhanced Efficiency and Sustainability
by Ayman Khalil and Besma Zeddini
Future Internet 2024, 16(2), 56; https://doi.org/10.3390/fi16020056 - 8 Feb 2024
Cited by 5 | Viewed by 2310
Abstract
The intersection of cybersecurity and opportunistic networks has ushered in a new era of innovation in the realm of wireless communications. In an increasingly interconnected world, where seamless data exchange is pivotal for both individual users and organizations, the need for efficient, reliable, [...] Read more.
The intersection of cybersecurity and opportunistic networks has ushered in a new era of innovation in the realm of wireless communications. In an increasingly interconnected world, where seamless data exchange is pivotal for both individual users and organizations, the need for efficient, reliable, and sustainable networking solutions has never been more pressing. Opportunistic networks, characterized by intermittent connectivity and dynamic network conditions, present unique challenges that necessitate innovative approaches for optimal performance and sustainability. This paper introduces a groundbreaking paradigm that integrates the principles of cybersecurity with opportunistic networks. At its core, this study presents a novel routing protocol meticulously designed to significantly outperform existing solutions concerning key metrics such as delivery probability, overhead ratio, and communication delay. Leveraging cybersecurity’s inherent strengths, our protocol not only fortifies the network’s security posture but also provides a foundation for enhancing efficiency and sustainability in opportunistic networks. The overarching goal of this paper is to address the inherent limitations of conventional opportunistic network protocols. By proposing an innovative routing protocol, we aim to optimize data delivery, minimize overhead, and reduce communication latency. These objectives are crucial for ensuring seamless and timely information exchange, especially in scenarios where traditional networking infrastructures fall short. By large-scale simulations, the new model proves its effectiveness in the different scenarios, especially in terms of message delivery probability, while ensuring reasonable overhead and latency. Full article
Show Figures

Figure 1

18 pages, 2628 KiB  
Article
An Optimized, Dynamic, and Efficient Load-Balancing Framework for Resource Management in the Internet of Things (IoT) Environment
by Mohammed Shuaib, Surbhi Bhatia, Shadab Alam, Raj Kumar Masih, Nayef Alqahtani, Shakila Basheer and Mohammad Shabbir Alam
Electronics 2023, 12(5), 1104; https://doi.org/10.3390/electronics12051104 - 23 Feb 2023
Cited by 59 | Viewed by 4565
Abstract
Major problems and issues in Internet of Things (IoT) systems include load balancing, lowering operational expenses, and power usage. IoT devices typically run on batteries because they lack direct access to a power source. Geographical conditions that make it difficult to access the [...] Read more.
Major problems and issues in Internet of Things (IoT) systems include load balancing, lowering operational expenses, and power usage. IoT devices typically run on batteries because they lack direct access to a power source. Geographical conditions that make it difficult to access the electrical network are a common cause. Finding ways to ensure that IoT devices consume the least amount of energy possible is essential. When the network is experiencing high traffic, locating and interacting with the next hop is critical. Finding the best route to load balance by switching to a less crowded channel is hence crucial in network congestion. Due to the restrictions indicated above, this study analyzes three significant issues—load balancing, energy utilization, and computation cost—and offers a solution. To address these resource allocation issues in the IoT, we suggest a reliable method in this study termed Dynamic Energy-Efficient Load Balancing (DEELB). We conducted several experiments, such as bandwidth analysis, in which the DEELB method used 990.65 kbps of bandwidth for 50 operations, while other existing techniques, such as EEFO (Energy-Efficient Opportunistic), DEERA (Dynamic Energy-Efficient Resource Allocation), ELBS (Efficient Load-Balancing Security), and DEBTS (Delay Energy Balanced Task Scheduling), used 1700.91 kbps, 1500.82 kbps, 1300.65 kbps, and 1200.15 kbps of bandwidth, respectively. The experiment’s numerical analysis showed that our method was superior to other ways in terms of effectiveness and efficiency. Full article
(This article belongs to the Section Computer Science & Engineering)
Show Figures

Figure 1

21 pages, 4876 KiB  
Article
DOIDS: An Intrusion Detection Scheme Based on DBSCAN for Opportunistic Routing in Underwater Wireless Sensor Networks
by Rui Zhang, Jing Zhang, Qiqi Wang and Hehe Zhang
Sensors 2023, 23(4), 2096; https://doi.org/10.3390/s23042096 - 13 Feb 2023
Cited by 23 | Viewed by 2844
Abstract
In Underwater Wireless Sensor Networks (UWSNs), data should be transmitted to data centers reliably and efficiently. However, due to the harsh channel conditions, reliable data transmission is a challenge for large-scale UWSNs. Thus, opportunistic routing (OR) protocols with high reliability, strong robustness, low [...] Read more.
In Underwater Wireless Sensor Networks (UWSNs), data should be transmitted to data centers reliably and efficiently. However, due to the harsh channel conditions, reliable data transmission is a challenge for large-scale UWSNs. Thus, opportunistic routing (OR) protocols with high reliability, strong robustness, low end-to-end delay, and high energy efficiency are widely applied. However, OR in UWSNs is vulnerable to routing attacks. For example, sinkhole attack nodes can attract traffic from surrounding nodes by forging information such as the distance to the sink node. In order to reduce the negative impact of malicious nodes on data transmission, we propose an intrusion detection scheme (IDS) based on the Density-Based Spatial Clustering of Applications with Noise (DBSCAN) clustering algorithm for OR (DOIDS) in this paper. DOIDS is based on small-sample IDS and is suitable for UWSNs with sparse node deployment. In DOIDS, the local monitoring mechanism is adopted. Every node in the network running DOIDS can select the trusted next hop. Firstly, according to the behavior characteristics of common routing attack nodes and unreliable underwater acoustic channel characteristics, DOIDS selected the energy consumption, forwarding, and link quality information of candidate nodes as the detection feature values. Then, the collected feature information is used to detect potential abnormal nodes through the DBSCAN clustering algorithm. Finally, a decision function is defined according to the time decay function to reduce the false detection rate of DOIDS. It makes a final judgment on whether the potential abnormal node is malicious. The simulation results show that the algorithm can effectively improve the detection accuracy rate (3% to 15% for different scenarios) and reduce the false positive rate, respectively. Full article
(This article belongs to the Section Intelligent Sensors)
Show Figures

Figure 1

23 pages, 3561 KiB  
Article
Resistance to Cybersecurity Attacks in a Novel Network for Autonomous Vehicles
by Callum Brocklehurst and Milena Radenkovic
J. Sens. Actuator Netw. 2022, 11(3), 35; https://doi.org/10.3390/jsan11030035 - 13 Jul 2022
Cited by 4 | Viewed by 3284
Abstract
The increased interest in autonomous vehicles has led to the development of novel networking protocols in VANETs In such a widespread safety-critical application, security is paramount to the implementation of the networks. We view new autonomous vehicle edge networks as opportunistic networks that [...] Read more.
The increased interest in autonomous vehicles has led to the development of novel networking protocols in VANETs In such a widespread safety-critical application, security is paramount to the implementation of the networks. We view new autonomous vehicle edge networks as opportunistic networks that bridge the gap between fully distributed vehicular networks based on short-range vehicle-to-vehicle communication and cellular-based infrastructure for centralized solutions. Experiments are conducted using opportunistic networking protocols to provide data to autonomous trams and buses in a smart city. Attacking vehicles enter the city aiming to disrupt the network to cause harm to the general public. In the experiments the number of vehicles and the attack length is altered to investigate the impact on the network and vehicles. Considering different measures of success as well as computation expense, measurements are taken from all nodes in the network across different lengths of attack. The data gathered from each node allow exploration into how different attacks impact metrics including the delivery probability of a message, the time taken to deliver and the computation expense to each node. The novel multidimensional analysis including geospatial elements provides evidence that the state-of-the-art MaxProp algorithm outperforms the benchmark as well as other, more complex routing protocols in most of the categories. Upon the introduction of attacking nodes however, PRoPHET provides the most reliable delivery probability when under attack. Two different attack methods (black and grey holes) are used to disrupt the flow of messages throughout the network and the more basic protocols show that they are less consistent. In some metrics, the PRoPHET algorithm performs better when under attack due to the benefit of reduced network traffic. Full article
Show Figures

Figure 1

36 pages, 588 KiB  
Article
LC-DEX: Lightweight and Efficient Compressed Authentication Based Elliptic Curve Cryptography in Multi-Hop 6LoWPAN Wireless Sensor Networks in HIP-Based Internet of Things
by Balkis Bettoumi and Ridha Bouallegue
Sensors 2021, 21(21), 7348; https://doi.org/10.3390/s21217348 - 4 Nov 2021
Cited by 10 | Viewed by 3089
Abstract
The high level of security requirements and low capabilities of constrained devices that are connected to the Internet of Things (IoT) constitute a new challenge in terms of proposing an authentication solution that deals with the problem of energy constraints. The Host Identity [...] Read more.
The high level of security requirements and low capabilities of constrained devices that are connected to the Internet of Things (IoT) constitute a new challenge in terms of proposing an authentication solution that deals with the problem of energy constraints. The Host Identity Protocol Diet EXchange (HIP DEX) is primarily designed to be suitable for constrained devices and designed to be resistant to Denial of Service (DoS) and man-in-the-middle (MITM) attacks. In this paper, we propose an efficient saving energy solution to secure end-to-end (E2E) communications based on the compression of the IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN) header for HIP DEX packets. We implement our solution in an IoT based-WSN over Constrained Application Protocol (CoAP) in the application layer and Routing Protocol for Low power and lossy networks (RPL) in the routing layer. We also propose a novel distribution model that minimizes the number of signaling messages. Both proposed compression and distribution models for HIP DEX combined with an original implementation of an opportunistic association establishment of the handshake, constitute an efficient security solution for IoT. We called our solution Lightweight Compressed HIP DEX in the IoT (LC-DEX). Full article
(This article belongs to the Special Issue Wireless Sensor Networks in the IoT: New Challenges)
Show Figures

Figure 1

15 pages, 659 KiB  
Article
A Privacy-Preserving Routing Protocol Using Mix Networks in Opportunistic Networks
by Depeng Chen, Carlos Borrego and Guillermo Navarro-Arribas
Electronics 2020, 9(11), 1754; https://doi.org/10.3390/electronics9111754 - 22 Oct 2020
Cited by 4 | Viewed by 3133
Abstract
This paper focuses on the problem of providing anonymous communications in opportunistic networks. To that end, we propose an approach using Mix networks that enables a relatively simple solution. Opportunistic networks present some constraints that make the deployment of typical network anonymity solutions [...] Read more.
This paper focuses on the problem of providing anonymous communications in opportunistic networks. To that end, we propose an approach using Mix networks that enables a relatively simple solution. Opportunistic networks present some constraints that make the deployment of typical network anonymity solutions difficult or infeasible. We show, utilizing simulations on the basis of real mobility traces, that the proposed solution is feasible for some scenarios by introducing a tolerable penalty in terms of message delay and delivery. To investigate the impact of routing strategies, we offer two different methods to select Mix nodes. From the experiment results, we show the trade-off between network performance and security. Full article
(This article belongs to the Section Networks)
Show Figures

Figure 1

16 pages, 3806 KiB  
Article
Adaptive Routing Optimization Algorithm in Community-Oriented Opportunistic Networks for Mobile Health
by Weimin Chen, Zhigang Chen and Fang Cui
Sensors 2019, 19(8), 1876; https://doi.org/10.3390/s19081876 - 19 Apr 2019
Cited by 4 | Viewed by 2783
Abstract
The appearance of a large number of mobile intelligent devices boosts the fast rise of mobile health (mHealth) application. However, due to the sensitivity and complexity of medical data, an efficient and secure mobile communication mode is a very difficult and challenging task [...] Read more.
The appearance of a large number of mobile intelligent devices boosts the fast rise of mobile health (mHealth) application. However, due to the sensitivity and complexity of medical data, an efficient and secure mobile communication mode is a very difficult and challenging task in mHealth. The Opportunistic Networks (OppNets) is self-organizing and can expand the communication capacity by the movement of nodes, so it has a good prospect in the application of mHealth. Unfortunately, due to the shortage of stable and reliable end-to-end links, the routing protocol in OppNets has usually lower performance and is unsafe. To address these issues, we propose an adaptive routing optimization algorithm in OppNets for mHealth. This routing scheme firstly analyzes the relationship between nodes and defines the average message forwarding delay as a new metric to selectively forward messages, and then designs a local community detection algorithm based on the metric to adapt to the characteristics of OppNets, and finally resorts to some super-nodes to ferry messages between different communication domains. The simulation results demonstrate the efficiency and effectiveness of the proposed scheme. It increases the delivery ratio by about 30%, decreases delay by about 35%, and decreases the number of forwarding by about 5%, by comparing it with several existing routing schemes. We believe that the relationship between nodes, community, and message ferrying will play an important role in routing of OppNets for mHealth. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

Back to TopTop