Skip to main content
Log in

Trust-based security routing mechanism in mobile social networks

  • Advances in Parallel and Distributed Computing for Neural Computing
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

Malicious and selfish behaviors represent a serious security threat against routing in mobile social networks (MSN). Due to MSN’s unique network characteristics, such as sociability, mobility and diversity, it is a challenge to design a misbehavior detection scheme in MSN. To improve the security in MSN routing, a trust-based security routing mechanism is presented in this paper, i.e., a malicious behavior detection mechanism with identity verification scheme. The main idea is to introduce the behavior trust and the identity trust to guide the routing. Firstly, we judge a node’s behavior based on both comprehensive trust and social relationship strength. And then, we forward messages according to the different measurement within and outside the friend groups. We also propose a distributed key management scheme which can issue, verify or revoke certificates based on the evaluation of the social relationship strength. We further improve the efficiency of the proposed mechanism by verifying the identity trust of the node. The simulation results indicate that the proposed routing mechanism can lower the impact of malicious behavior of nodes effectively and it has greater security performance than some classical routing algorithms do.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Persia F, Daniela D (2017) A survey of online social networks: challenges and opportunities. In: IEEE international conference on information reuse and integration, pp 614–620. https://doi.org/10.1109/iri.2017.74

  2. Hu X, Chu THS, Leung VCM, Ngai CH, Kruchten P, Chan HCB (2015) A survey on mobile social networks: applications, platforms, system architectures, and future research directions. IEEE Commun Surv Tutor 17(3):1557–1581. https://doi.org/10.1109/COMST.2014.2371813

    Article  Google Scholar 

  3. Lakshmi VRV, Gireesh KT (2017) Mobile social networks: architecture, privacy, security issues and solutions. J Commun. 12(9):524–531. https://doi.org/10.12720/jcm.12.9.524-531

    Article  Google Scholar 

  4. Qiu T, Chen B, Sangaiah AK, Ma J, Huang R (2017) A survey of mobile social networks: applications, social characteristics, and challenges. IEEE Syst J. https://doi.org/10.1109/jsyst.2017.2764479

    Article  Google Scholar 

  5. Kawecki M, Schoeneich RO (2016) Mobility-based routing algorithm in delay tolerant networks. Eurasip J Wirel Commun Netw 2016(1):1–9. https://doi.org/10.1186/s13638-016-0578-4

    Article  Google Scholar 

  6. Penurkar MR, Deshpande UA (2016) Max-Util: a utility-based routing algorithm for a vehicular delay tolerant network using historical information. In: Proceedings of 3rd international conference on advanced computing, networking and informatics, Springer, India, pp 587–598. https://doi.org/10.1007/978-81-322-2529-4_61

  7. Liang H, Chen Z, Wu J, Guan P (2017) ETSW: an encounter history tree based routing protocol in opportunistic networks. In: National conference of theoretical computer science, Springer, Singapore, pp 46–59. https://doi.org/10.1007/978-981-10-6893-5_4

  8. Mei A, Morabito G, Santi P, Stefa J (2015) Social-aware stateless routing in pocket switched networks. IEEE Trans Parallel Distrib Syst 26(1):252–261. https://doi.org/10.1109/TPDS.2014.2307857

    Article  Google Scholar 

  9. Kim SK, Lee J, Yang SB (2016) A social overlay-based forwarding scheme for mobile social networks. Wirel Netw 22(7):2439–2451. https://doi.org/10.1007/s11276-015-1162-2

    Article  Google Scholar 

  10. Halikul L, Mohamad A (2018) EpSoc: social-based epidemic-based routing protocol in opportunistic mobile social network. In: Mobile Information Systems, pp 1–8. https://doi.org/10.1155/2018/6462826

  11. Kim S, Gerla M (2016) Socio-geo: social network routing protocol in delay tolerant networks. In: International conference on computing, pp 1–6. https://doi.org/10.1109/iccnc.2016.7923427

  12. Lv J, Wang X, Huang M, Shi J, Li K, Li J (2017) RISC: iCN routing mechanism incorporating SDN and community division. Comput Netw 123:88–103. https://doi.org/10.1016/j.comnet.2017.05.010

    Article  Google Scholar 

  13. Lu F, Li J, Zhang X, Jiang S, Wang F (2017) Weighted community graph–based social routing in delay-tolerant networks. Int J Distrib Sens Netw 13(12):1–18. https://doi.org/10.1177/1550147717749729

    Article  Google Scholar 

  14. Jing T, Liu Y, Huo Y, Wen Y (2017) Home-based multi-copy routing in mobile social networks. In: International conference on mobile ad-hoc and sensor networks, pp 284–289. https://doi.org/10.1109/msn.2016.052

  15. Guo H, Wang X, Cheng H, Huang M (2016) A routing defense mechanism using evolutionary game theory for delay tolerant networks. Appl Soft Comput 38:469–476. https://doi.org/10.1016/j.asoc.2015.10.019

    Article  Google Scholar 

  16. Guan J, Wei Z, You I (2018) GRBC-based network security functions placement scheme in SDS for 5G security. J Netw Comput Appl 114:48–56. https://doi.org/10.1016/j.jnca.2018.03.013

    Article  Google Scholar 

  17. Kim SK, Yoon JH, Lee J, Jang GY, Yang SB (2015) A cooperative forwarding scheme for social preference-based selfishness in mobile social networks. Wirel Netw 22(2):1–16. https://doi.org/10.1007/s11276-015-0984-2

    Article  Google Scholar 

  18. Yao L, Man Y, Huang Z, Deng J, Wang X (2016) Secure routing based on social similarity in opportunistic networks. IEEE Trans Wirel Commun 15(1):594–605. https://doi.org/10.1109/TWC.2015.2476466

    Article  Google Scholar 

  19. Guo H, Wang X, Cheng H, Huang M (2017) A location aided controlled spraying routing algorithm for delay tolerant networks. Ad Hoc Netw 66:16–25. https://doi.org/10.1016/j.adhoc.2017.08.005

    Article  Google Scholar 

  20. Memarmoshrefi P, Seibel R, Hogrefe D (2016) Autonomous ant-based public key authentication mechanism for mobile ad hoc networks. Mobile Netw Appl 21(1):149–160. https://doi.org/10.1007/s11036-016-0703-y

    Article  Google Scholar 

  21. Feng W, Yan Z, Xie H (2017) Anonymous authentication on trust in pervasive social networking based on group signature. IEEE Access 5:6236–6246. https://doi.org/10.1109/ACCESS.2017.2679980

    Article  Google Scholar 

  22. Wang R, Wang X, Hao F, Zhang L, Liu S, Wang L et al (2018) Social identity–aware opportunistic routing in mobile social networks. Trans Emerg Telecommun Technol 8:1–17. https://doi.org/10.1002/ett.3297

    Article  Google Scholar 

  23. Axel N, Leandro N, Cerdà-Alabern L (2018) Enabling individually entrusted routing security for open and decentralized community networks. Ad Hoc Netw 79:20–42. https://doi.org/10.1016/j.adhoc.2018.06.014

    Article  Google Scholar 

  24. Sánchez-Carmona A, Robles S, Borrego C (2016) PrivHab + : a secure geographic routing protocol for DTN. Comput Commun 78:56–73. https://doi.org/10.1016/j.comcom.2015.10.002

    Article  Google Scholar 

  25. Chen J, Li K, Bilal K et al (2018) A bi-layered parallel training architecture for large-scale convolutional neural networks. In: IEEE transactions on parallel and distributed systems, pp 1–12. https://doi.org/10.1109/tpds.2018.2877359

  26. Chen Y, Li K, Yang W et al (2018) Performance-aware model for sparse matrix-matrix multiplication on the Sunway TaihuLight Supercomputer. In: IEEE transactions on parallel and distributed systems, pp 1–15. https://doi.org/10.1109/tpds.2018.2871189

  27. Chen J, Li K, Tang Z et al (2017) A parallel random forest algorithm for big data in a spark cloud computing environment. IEEE Trans Parallel Distrib Syst 28(4):919–933. https://doi.org/10.1109/TPDS.2016.2603511

    Article  Google Scholar 

  28. Chen J, Li K, Bilal K et al (2018) Parallel protein community detection in large-scale PPI networks based on multi-source learning. In: IEEE/ACM transactions on computational biology and bioinformatics, pp 1–12. https://doi.org/10.1109/tcbb.2018.2868088

  29. Qiu T, Chen N, Li K et al (2017) Heterogeneous ad hoc networks: architectures, advances and challenges. Ad Hoc Netw 55:143–152. https://doi.org/10.1016/j.adhoc.2016.11.001

    Article  Google Scholar 

  30. Shi J, Wang X, Huang M, Li K, Das SK (2017) Social-based routing scheme for fixed-line VANET. Comput Netw Int J Comput Telecommun Netw 113:230–243. https://doi.org/10.1016/j.comnet.2016.12.016

    Article  Google Scholar 

  31. Batabyal S, Bhaumik P (2015) Analysing social behaviour and message dissemination in human based delay tolerant network. Wirel Netw 21(2):513–529. https://doi.org/10.1007/s11276-014-0790-2

    Article  Google Scholar 

  32. Moreira W, Mendes P, Sargento S (2012) Opportunistic routing based on daily routines. In: World of wireless, mobile and multimedia networks, pp 1–6. https://doi.org/10.1109/wowmom.2012.6263749

  33. Xu Q, Su Z, Zhang K, Ren P, Shen XS (2017) Epidemic information dissemination in mobile social networks with opportunistic links. IEEE Trans Emerg Top Comput 3(3):399–409. https://doi.org/10.1109/TETC.2015.2414792

    Article  Google Scholar 

  34. Bigwood G, Henderson T (2012) IRONMAN: using social networks to add incentives and reputation to opportunistic networks. In: IEEE third international conference on privacy, security, risk and trust, pp 65–72. https://doi.org/10.1109/passat/socialcom.2011.60

  35. Yang S, Wang X, Zhang S, Huang M (2018) Trust-based security routing mechanism in mobile social networks. In: 14th international conference on natural computation, fuzzy systems and knowledge discovery (ICNC-FSKD 2018), pp 1–6

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China under Grant No. 61872073 and Grant No. 61572123; the Major International (Regional) Joint Research Project of NSFC under Grant No. 71620107003; the MoE and China Mobile Joint Research Fund under Grant No. MCM20160201; the Program for Liaoning Innovative Research Team in University under Grant No. LT2016007. A preliminary version of this paper appeared in ICNC-FSKD 2018 [35].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xingwei Wang.

Ethics declarations

Conflict of interest

The authors declare that there is no conflict of interests regarding the publication of this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yang, S., Wang, X., Zhang, S. et al. Trust-based security routing mechanism in mobile social networks. Neural Comput & Applic 32, 5609–5620 (2020). https://doi.org/10.1007/s00521-019-04167-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-019-04167-z

Keywords

Navigation