Abstract
Opportunistic Delay Tolerant Networks also referred to as Opportunistic Networks (OppNets) are composed of wireless hosts opportunistically communicating with each other. These networks are designed to operate without the guaranteed existence of a path between the sender and the receiver. Inadequate data security in OppNets has been seriously detrimental to its adoption. This paper explores a secure and decentralized approach that uses the Proof-of-Work (PoW) consensus mechanism and propose a blockchain-based secure routing protocol (called BDRP). In this work, we design an integrated routing protocol that uses Proof-of-Work (PoW) for routing and demonstrates how immutability can be applied to the OppNet paradigm. Blockchain promises transparent, distributed, and tamper-resistant ledger and secure systems that may provide secure routing solutions for OppNets. We aim to study how effectively can Proof-of-Work (PoW) scale-up in OppNets as a consensus mechanism is the most resource and time-intensive component of a blockchain. The work even displays the ways this routing method prevents against attacks such as eavesdropping, masquerading, wormhole, blackhole, and fabrication. The simulation results, along with the theoretical justification, show how the proposed BDRP fares among the existing security policies are used in opportunistic networks.
Similar content being viewed by others
References
Dhurandher SK, Kumar A, Obaidat MS (2018) Cryptography-based misbehavior detection and trust control mechanism for opportunistic network systems. IEEE Syst J 12(4):3191–3202. https://doi.org/10.1109/JSYST.2017.2720757
Fall K (2003) A delay-tolerant network architecture for challenged internets. In: Proceedings of the 2003 conference on applications, technologies, architectures, and protocols for computer communications, Karlsruhe, Germany. https://doi.org/10.1145/863955.863960
Ghaffari A (2020) Hybrid opportunistic and position-based routing protocol in vehicular ad hoc networks. J Ambient Intell Hum Comput 11:1593–1603. https://doi.org/10.1007/s12652-019-01316-z
Graffi K, Mukherjee P, Menges B, Hartung D, Kovacevic A, Steinmetz R (2009) Practical security in P2P-based social networks. In: Proceedings of IEEE 34th conference on local computer networks, Zurich, Switzerland. https://doi.org/10.1109/LCN.2009.5355085
Gupta S, Dhurandher SK, Woungang I, Kumar A, Obaidat MS (2013) Trust-based security protocol against Blackhole attacks in Opportunistic Networks. In: proceedings of 2013 IEEE 9th international conference on wireless and mobile computing, net-working and communications (WiMob), Lyon, France. https://doi.org/10.1109/WiMOB.2013.6673436
Jeon JH, Kim K-H, Kim J-H (2018) blockchain based data security enhanced IoT server platform. In: 2018 International conference on information networking (ICOIN), Kualalumpur, Malasiya. https://doi.org/10.1109/ICOIN.2018.8343262
Jesus EF, Chicarino VRL, de Albuquerque CVN, de Antnio A, Rocha A (2018) A survey of how to use blockchain to secure internet of things and the stalker attack. Secur Commun Netw 9675050:1–27. https://doi.org/10.1155/2018/9675050
Kandhoul N, Dhurandher SK (2019) An asymmetric RSA based security approach for opportunistic IoT. In: International conference on wireless, intelligent and distributed environment for communication (WIDECOM 2019), Milan, Italy. https://doi.org/10.1007/978-3-030-11437-4_5
Kernen A, Ott J, Krkkinen T (2009) The ONE simulator for DTN protocol evaluation. In: Proceedings of the 2nd international conference on simulation tools and techniques, Rome, Italy. https://doi.org/10.4108/ICST.SIMUTOOLS2009.5674
Krikidis I (2010) Opportunistic relay selection for cooperative networks with secrecy constraints. IET Commun 4(15):1787–1791. https://doi.org/10.1049/iet-com.2009.0634
Li Q, Zhu S, Cao G (2010) Routing in socially selfish delay tolerant networks. In: Proceedings of IEEE INFOCOM, San Diego, CA, USA. https://doi.org/10.1109/INFCOM.2010.5462138
Ramezan G, Cyril L (2018) A blockchain-based contractual routing protocol for the internet of things using smart contracts. Wirel Commun Mob Comput 4029591:1–14. https://doi.org/10.1155/2018/4029591
Ren Y, Chuah Mooi C, Chen JYY (2010) Detecting blackhole attacks in disruption-tolerant networks through packet exchange recording. In: Proceedings of IEEE international symposium world of wireless mobile and multimedia networks (WoWMoM), Montrreal, QC, Canada. https://doi.org/10.1109/WOWMOM.2010.5534944
Reyna A, Martn C, Chen J, Soler E, Daz M (2018) On blockchain and its integration with IoT Challenges and opportunities. Fut Gen Comput Syst 88:173–190. https://doi.org/10.1016/j.future.2018.05.046
Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126. https://doi.org/10.1145/359340.359342
Sharma DK, Dhurandher SK, Woungang I, Arora J, Gupta H (2016) History-based secure routing protocol to detect black hole and grey hole attacks in opportunistic networks. Recent Adv Commun Netw Technol (Formerly Recent Patents on Telecommunication) 5(2):73–89. https://www.ingentaconnect.com/content/ben/rptelec/2016/00000005/00000002/art00004#Supp
Sherchan W, Nepal S, Laurance C (2013) A survey of trust in social networks. J ACM Comput Surv (CSUR) 45(4):1–33. https://doi.org/10.1145/2501654.2501661
Wei L, Cao Z, Zhu H (2011) MobiGame: a user-centric reputation based incentive protocol for delay/disruption tolerant networks. In: proceedings of IEEE Global Telecommunications Conference (GLOBECOM), Kathmandu, Nepal. https://doi.org/10.1109/WiMOB.2013.6673436
Wu J, Chen Z, Zhao M (2020) An efficient data packet iteration and transmission algorithm in opportunistic social networks. J Ambient Intell Hum Comput 11:3141–3153. https://doi.org/10.1007/s12652-019-01480-2
Yang W, Wan Y, Wang Q (2017) Enhanced secure time synchronisation protocol for IEEE 802.15.4 e-based industrial Internet of Things. IET Inf Secur 11(6):369–376. https://doi.org/10.1049/iet-ifs.2016.0232
Yang Z, Yang K, Lei L, Zheng K, Leung VCM (2019) Blockchain-based decentralized trust management in vehicular networks. IEEE Int Things J 6(2):1495–1505. https://doi.org/10.1109/JIOT.2018.2836144
Zhaojun L, Liu W, Wang Q, Gang Q, Liu Z (2018) A privacy-preserving trust model based on blockchain for vanets. IEEE Access 6:45655–45664. https://doi.org/10.1109/ACCESS.2018.2864189
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Dhurandher, S.K., Singh, J., Nicopolitidis, P. et al. A blockchain-based secure routing protocol for opportunistic networks. J Ambient Intell Human Comput 13, 2191–2203 (2022). https://doi.org/10.1007/s12652-021-02981-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-021-02981-9