Abstract
Malicious and selfish behaviors represent a serious security threat against routing in mobile social networks (MSN). Due to MSN’s unique network characteristics, such as sociability, mobility and diversity, it is a challenge to design a misbehavior detection scheme in MSN. To improve the security in MSN routing, a trust-based security routing mechanism is presented in this paper, i.e., a malicious behavior detection mechanism with identity verification scheme. The main idea is to introduce the behavior trust and the identity trust to guide the routing. Firstly, we judge a node’s behavior based on both comprehensive trust and social relationship strength. And then, we forward messages according to the different measurement within and outside the friend groups. We also propose a distributed key management scheme which can issue, verify or revoke certificates based on the evaluation of the social relationship strength. We further improve the efficiency of the proposed mechanism by verifying the identity trust of the node. The simulation results indicate that the proposed routing mechanism can lower the impact of malicious behavior of nodes effectively and it has greater security performance than some classical routing algorithms do.
Similar content being viewed by others
References
Persia F, Daniela D (2017) A survey of online social networks: challenges and opportunities. In: IEEE international conference on information reuse and integration, pp 614–620. https://doi.org/10.1109/iri.2017.74
Hu X, Chu THS, Leung VCM, Ngai CH, Kruchten P, Chan HCB (2015) A survey on mobile social networks: applications, platforms, system architectures, and future research directions. IEEE Commun Surv Tutor 17(3):1557–1581. https://doi.org/10.1109/COMST.2014.2371813
Lakshmi VRV, Gireesh KT (2017) Mobile social networks: architecture, privacy, security issues and solutions. J Commun. 12(9):524–531. https://doi.org/10.12720/jcm.12.9.524-531
Qiu T, Chen B, Sangaiah AK, Ma J, Huang R (2017) A survey of mobile social networks: applications, social characteristics, and challenges. IEEE Syst J. https://doi.org/10.1109/jsyst.2017.2764479
Kawecki M, Schoeneich RO (2016) Mobility-based routing algorithm in delay tolerant networks. Eurasip J Wirel Commun Netw 2016(1):1–9. https://doi.org/10.1186/s13638-016-0578-4
Penurkar MR, Deshpande UA (2016) Max-Util: a utility-based routing algorithm for a vehicular delay tolerant network using historical information. In: Proceedings of 3rd international conference on advanced computing, networking and informatics, Springer, India, pp 587–598. https://doi.org/10.1007/978-81-322-2529-4_61
Liang H, Chen Z, Wu J, Guan P (2017) ETSW: an encounter history tree based routing protocol in opportunistic networks. In: National conference of theoretical computer science, Springer, Singapore, pp 46–59. https://doi.org/10.1007/978-981-10-6893-5_4
Mei A, Morabito G, Santi P, Stefa J (2015) Social-aware stateless routing in pocket switched networks. IEEE Trans Parallel Distrib Syst 26(1):252–261. https://doi.org/10.1109/TPDS.2014.2307857
Kim SK, Lee J, Yang SB (2016) A social overlay-based forwarding scheme for mobile social networks. Wirel Netw 22(7):2439–2451. https://doi.org/10.1007/s11276-015-1162-2
Halikul L, Mohamad A (2018) EpSoc: social-based epidemic-based routing protocol in opportunistic mobile social network. In: Mobile Information Systems, pp 1–8. https://doi.org/10.1155/2018/6462826
Kim S, Gerla M (2016) Socio-geo: social network routing protocol in delay tolerant networks. In: International conference on computing, pp 1–6. https://doi.org/10.1109/iccnc.2016.7923427
Lv J, Wang X, Huang M, Shi J, Li K, Li J (2017) RISC: iCN routing mechanism incorporating SDN and community division. Comput Netw 123:88–103. https://doi.org/10.1016/j.comnet.2017.05.010
Lu F, Li J, Zhang X, Jiang S, Wang F (2017) Weighted community graph–based social routing in delay-tolerant networks. Int J Distrib Sens Netw 13(12):1–18. https://doi.org/10.1177/1550147717749729
Jing T, Liu Y, Huo Y, Wen Y (2017) Home-based multi-copy routing in mobile social networks. In: International conference on mobile ad-hoc and sensor networks, pp 284–289. https://doi.org/10.1109/msn.2016.052
Guo H, Wang X, Cheng H, Huang M (2016) A routing defense mechanism using evolutionary game theory for delay tolerant networks. Appl Soft Comput 38:469–476. https://doi.org/10.1016/j.asoc.2015.10.019
Guan J, Wei Z, You I (2018) GRBC-based network security functions placement scheme in SDS for 5G security. J Netw Comput Appl 114:48–56. https://doi.org/10.1016/j.jnca.2018.03.013
Kim SK, Yoon JH, Lee J, Jang GY, Yang SB (2015) A cooperative forwarding scheme for social preference-based selfishness in mobile social networks. Wirel Netw 22(2):1–16. https://doi.org/10.1007/s11276-015-0984-2
Yao L, Man Y, Huang Z, Deng J, Wang X (2016) Secure routing based on social similarity in opportunistic networks. IEEE Trans Wirel Commun 15(1):594–605. https://doi.org/10.1109/TWC.2015.2476466
Guo H, Wang X, Cheng H, Huang M (2017) A location aided controlled spraying routing algorithm for delay tolerant networks. Ad Hoc Netw 66:16–25. https://doi.org/10.1016/j.adhoc.2017.08.005
Memarmoshrefi P, Seibel R, Hogrefe D (2016) Autonomous ant-based public key authentication mechanism for mobile ad hoc networks. Mobile Netw Appl 21(1):149–160. https://doi.org/10.1007/s11036-016-0703-y
Feng W, Yan Z, Xie H (2017) Anonymous authentication on trust in pervasive social networking based on group signature. IEEE Access 5:6236–6246. https://doi.org/10.1109/ACCESS.2017.2679980
Wang R, Wang X, Hao F, Zhang L, Liu S, Wang L et al (2018) Social identity–aware opportunistic routing in mobile social networks. Trans Emerg Telecommun Technol 8:1–17. https://doi.org/10.1002/ett.3297
Axel N, Leandro N, Cerdà-Alabern L (2018) Enabling individually entrusted routing security for open and decentralized community networks. Ad Hoc Netw 79:20–42. https://doi.org/10.1016/j.adhoc.2018.06.014
Sánchez-Carmona A, Robles S, Borrego C (2016) PrivHab + : a secure geographic routing protocol for DTN. Comput Commun 78:56–73. https://doi.org/10.1016/j.comcom.2015.10.002
Chen J, Li K, Bilal K et al (2018) A bi-layered parallel training architecture for large-scale convolutional neural networks. In: IEEE transactions on parallel and distributed systems, pp 1–12. https://doi.org/10.1109/tpds.2018.2877359
Chen Y, Li K, Yang W et al (2018) Performance-aware model for sparse matrix-matrix multiplication on the Sunway TaihuLight Supercomputer. In: IEEE transactions on parallel and distributed systems, pp 1–15. https://doi.org/10.1109/tpds.2018.2871189
Chen J, Li K, Tang Z et al (2017) A parallel random forest algorithm for big data in a spark cloud computing environment. IEEE Trans Parallel Distrib Syst 28(4):919–933. https://doi.org/10.1109/TPDS.2016.2603511
Chen J, Li K, Bilal K et al (2018) Parallel protein community detection in large-scale PPI networks based on multi-source learning. In: IEEE/ACM transactions on computational biology and bioinformatics, pp 1–12. https://doi.org/10.1109/tcbb.2018.2868088
Qiu T, Chen N, Li K et al (2017) Heterogeneous ad hoc networks: architectures, advances and challenges. Ad Hoc Netw 55:143–152. https://doi.org/10.1016/j.adhoc.2016.11.001
Shi J, Wang X, Huang M, Li K, Das SK (2017) Social-based routing scheme for fixed-line VANET. Comput Netw Int J Comput Telecommun Netw 113:230–243. https://doi.org/10.1016/j.comnet.2016.12.016
Batabyal S, Bhaumik P (2015) Analysing social behaviour and message dissemination in human based delay tolerant network. Wirel Netw 21(2):513–529. https://doi.org/10.1007/s11276-014-0790-2
Moreira W, Mendes P, Sargento S (2012) Opportunistic routing based on daily routines. In: World of wireless, mobile and multimedia networks, pp 1–6. https://doi.org/10.1109/wowmom.2012.6263749
Xu Q, Su Z, Zhang K, Ren P, Shen XS (2017) Epidemic information dissemination in mobile social networks with opportunistic links. IEEE Trans Emerg Top Comput 3(3):399–409. https://doi.org/10.1109/TETC.2015.2414792
Bigwood G, Henderson T (2012) IRONMAN: using social networks to add incentives and reputation to opportunistic networks. In: IEEE third international conference on privacy, security, risk and trust, pp 65–72. https://doi.org/10.1109/passat/socialcom.2011.60
Yang S, Wang X, Zhang S, Huang M (2018) Trust-based security routing mechanism in mobile social networks. In: 14th international conference on natural computation, fuzzy systems and knowledge discovery (ICNC-FSKD 2018), pp 1–6
Acknowledgements
This work is supported by the National Natural Science Foundation of China under Grant No. 61872073 and Grant No. 61572123; the Major International (Regional) Joint Research Project of NSFC under Grant No. 71620107003; the MoE and China Mobile Joint Research Fund under Grant No. MCM20160201; the Program for Liaoning Innovative Research Team in University under Grant No. LT2016007. A preliminary version of this paper appeared in ICNC-FSKD 2018 [35].
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that there is no conflict of interests regarding the publication of this paper.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Yang, S., Wang, X., Zhang, S. et al. Trust-based security routing mechanism in mobile social networks. Neural Comput & Applic 32, 5609–5620 (2020). https://doi.org/10.1007/s00521-019-04167-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00521-019-04167-z