Abstract
Opportunistic forwarding mechanism in delay tolerant networks (DTN) makes the network exposed to vulnerabilities. Providing security to existing routing protocols available for delay tolerant network becomes very difficult due to unavailability of sufficient contacts. It is necessary to design a secure routing protocol to overcome these issues. Energy is one of the crucial parameters in data forwarding and incentives should be offered to vehicular DTN nodes on the basis of energy spent for a particular message. This paper presents the secure routing mechanism which is based on the trust value of the vehicular DTN nodes. Incentive scheme is based on energy spent by the vehicular DTN node for forwarding data successfully. Routing is based on the trust value of the vehicular DTN nodes and incentive will be offered on successful delivery of the message. A source node offers the payment for successful delivery based on the time in which the message is delivered. The trust authority evaluates the credit and trust value for the participating vehicular DTN nodes based on energy and efforts put in successful delivery of the message.
Similar content being viewed by others
References
Fall K (2003) A delay-tolerant network architecture for challenged internets. In: Proceedings of SIGCOMM 2003, ACM, New York, NY, USA, pp 27–34
Zhang L, Song J, Pan J (2016) A privacy-preserving and secure framework for opportunistic routing in DTNs. IEEE Trans Veh Technol 65(9):7684–7697
Li Q, Cao G (2012) Mitigating routing misbehavior in disruption tolerant networks. IEEE Trans Inf Forensics Secur 7(2):664–675
Kulkarni L, Ukey N, Bakal J, Chavan N (2017) A survey on energy-efficient techniques to reduce energy consumption in delay tolerant networks. In: Vishwakarma HR, Shyam Akashe (eds) Computing and network sustainability, vol 12. Springer, Singapore, pp 83–91
Eshghi S, Khouzani MHR, Sarkar S, Shroff NB, Venkatesh SS (2015) Optimal energy-aware epidemic routing in DTNs. IEEE Trans Autom Control 60(6):1554–1569
Zhu H, Du S, Gao Z, Dong M, Cao Z (2014) A probabilistic misbehavior detection scheme toward efficient trust establishment in delay-tolerant networks. IEEE Trans Parallel Distrib Syst 25(1):22–32
Kulkarni L, Mukhopadhyay D, Bakal J (2016) Analyzing security schemes in delay tolerant networks. In: Proceedings of the international conference on data engineering and communication technology. Springer, Singapore, vol 1, issue 468, pp 613–620
Shikfa A (2011) Security challenges in opportunistic communication. In: IEEE GCC conference and exhibition (GCC), Dubai, pp 425–428
Saha S, Nandi S, Verma R (2018) Design of efficient lightweight strategies to combat DoS attack in delay tolerant network routing. J Mob Commun Comput Inf Wirel Netw 24(1):173–194
Chen H, Lou W, Wang Z, Wang Q (2016) A secure credit-based incentive mechanism for message forwarding in noncooperative DTNs. IEEE Trans Veh Technol 65(8):6377–6388
Bo Yu, Cheng-Zhong X, Xiao B (2013) Detecting sybil attacks in VANETs. J Parallel Distrib Comput 73(6):746–756
Pham TND, Yeo CK (2016) Detecting colluding blackhole and greyhole attacks in delay tolerant networks. IEEE Trans Mob Comput 15(5):1116–1129
Ren Y, Chuah MC, Yang J, Chen Y (2010) Detecting wormhole attacks in delay-tolerant networks [Security and privacy in emerging wireless networks]. IEEE Wirel Commun 17(5):36–42
Ker A, Ott J, Teemu K (2009) The ONE simulator for DTN protocol evaluation. In: Proceedings of the 2nd international conference on simulation tools and techniques ICST, Rome, Italy, ISBN 978-963-9799-45-5
Bulut E, Szymanski BK (2011) On secure multi-copy based routing in compromised delay tolerant networks. In: Proceedings of 20th international conference on computer communications and networks (ICCCN), Maui, HI, pp 1–7
Khalid W, Ullah Z, Ahmed N, Cao Y, Khalid M, Arshad M, Cruickshank H (2018) A taxonomy on misbehaving nodes in delay tolerant networks. J Comput Secur 77:442–471
Conti M, Di Pietro R, Mancini L, Mei A (2011) Distributed detection of clone attacks in wireless sensor networks. IEEE Trans Dependable Secure Comput 8(5):685–698
Chen I, Bao F, Chang M, Cho J (2014) Dynamic trust management for delay tolerant networks and its application to secure routing. IEEE Trans Parallel Distrib Syst 25(5):1200–1210
Tamez EB, Woungang I, Lilien L, Denko MK (2009) Trust management in opportunistic networks: a semantic web approach. In: IEEE conference on world congress on privacy, security, trust and the management of e-business, Saint John, NB, pp 235–238
Ayday E, Fekri F (2012) Iterative trust and reputation management using belief propagation. IEEE Trans Depend Secure Comput 9(3):375–386
Trifunovic S, Legendre F, Anastasiades C (2010) Social trust in opportunistic networks. In: INFOCOM IEEE conference on computer communications workshops, San Diego, CA, pp 1–6
Asuquo P, Cruickshank H, Ogah CPA, Lei A, Sun Z (2018) A distributed trust management scheme for data forwarding in satellite DTN emergency communications. IEEE J Sel Areas Commun 36(2):246–256
Chen T, Zhu L, Wu F, Zhong S (2011) Stimulating cooperation in vehicular ad hoc networks: a coalitional game theoretical approach. IEEE Trans Veh Technol 60(2):566–579
Zhu H, Lin X, Lu R, Fan Y, Shen X (2009) SMART: a secure multilayer credit-based incentive scheme for delay-tolerant networks. IEEE Trans Veh Technol 58(8):4628–4639
Lu R, Lin X, Zhu H, Shen X, Preiss B (2010) Pi: a practical incentive protocol for delay tolerant networks. IEEE Trans Wirel Commun 9(4):1483–1493
Zhou J, Dong X, Cao Z, Vasilakos AV (2015) Secure and privacy preserving protocol for cloud-based vehicular DTNs. IEEE Trans Inf Forensics Secur 10(6):1299–1314
Zhou H, Chen J, Fan J, Du Y, Das SK (2013) ConSub: incentive-based content subscribing in selfish opportunistic mobile networks. IEEE J Sel Areas Commun 31(9):669–679
Cai Y, Fan Y, Wen D (2016) An incentive-compatible routing protocol for two-hop delay-tolerant networks. IEEE Trans Veh Technol 65(1):266–277
Li Q, Gao W, Zhu S, Cao G (2013) To lie or to comply: defending against flood attacks in disruption tolerant networks. IEEE Trans Depend Secure Comput 10(3):168–182
Pham TND, Yeo CK, Yanai N, Fujiwara T (2017) Detecting flooding attack and accommodating burst traffic in delay-tolerant networks. IEEE Trans Veh Technol 67(1):795–808
Wei L, Cao Z, Zhu H (2011) MobiGame: a user-centric reputation based incentive protocol for delay/disruption tolerant networks. In: 2011 IEEE global telecommunications conference—GLOBECOM 2011, Kathmandu, pp 1–5
Ma Y, Jamalipour A (2010) Opportunistic node authentication in intermittently connected mobile ad hoc networks. In: 16th Asia-Pacific conference on communications (APCC), Auckland, pp. 453–457
Lv X, Mu Y, Li H (2015) Loss-tolerant bundle fragment authentication for space-based DTNs. IEEE Trans Depend Secure Comput 12(6):615–625
Bhutta MNM, Cruickshank H, Sun Z (2017) Public-key infrastructure validation and revocation mechanism suitable for delay/disruption tolerant networks. IET Inf Secur 11(1):16–22
Li Z, Liu Y, Zhu H, Sun L (2015) Coff: contact-duration-aware cellular traffic offloading over delay tolerant networks. IEEE Trans Veh Technol 64(11):5257–5268
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Kulkarni, L., Bakal, J. & Shrawankar, U. Energy based incentive scheme for secure opportunistic routing in vehicular delay tolerant networks. Computing 102, 201–219 (2020). https://doi.org/10.1007/s00607-019-00735-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00607-019-00735-2