Skip to main content

Advertisement

Log in

Energy based incentive scheme for secure opportunistic routing in vehicular delay tolerant networks

  • Published:
Computing Aims and scope Submit manuscript

Abstract

Opportunistic forwarding mechanism in delay tolerant networks (DTN) makes the network exposed to vulnerabilities. Providing security to existing routing protocols available for delay tolerant network becomes very difficult due to unavailability of sufficient contacts. It is necessary to design a secure routing protocol to overcome these issues. Energy is one of the crucial parameters in data forwarding and incentives should be offered to vehicular DTN nodes on the basis of energy spent for a particular message. This paper presents the secure routing mechanism which is based on the trust value of the vehicular DTN nodes. Incentive scheme is based on energy spent by the vehicular DTN node for forwarding data successfully. Routing is based on the trust value of the vehicular DTN nodes and incentive will be offered on successful delivery of the message. A source node offers the payment for successful delivery based on the time in which the message is delivered. The trust authority evaluates the credit and trust value for the participating vehicular DTN nodes based on energy and efforts put in successful delivery of the message.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Fall K (2003) A delay-tolerant network architecture for challenged internets. In: Proceedings of SIGCOMM 2003, ACM, New York, NY, USA, pp 27–34

  2. Zhang L, Song J, Pan J (2016) A privacy-preserving and secure framework for opportunistic routing in DTNs. IEEE Trans Veh Technol 65(9):7684–7697

    Article  Google Scholar 

  3. Li Q, Cao G (2012) Mitigating routing misbehavior in disruption tolerant networks. IEEE Trans Inf Forensics Secur 7(2):664–675

    Article  MathSciNet  Google Scholar 

  4. Kulkarni L, Ukey N, Bakal J, Chavan N (2017) A survey on energy-efficient techniques to reduce energy consumption in delay tolerant networks. In: Vishwakarma HR, Shyam Akashe (eds) Computing and network sustainability, vol 12. Springer, Singapore, pp 83–91

    Chapter  Google Scholar 

  5. Eshghi S, Khouzani MHR, Sarkar S, Shroff NB, Venkatesh SS (2015) Optimal energy-aware epidemic routing in DTNs. IEEE Trans Autom Control 60(6):1554–1569

    Article  MathSciNet  Google Scholar 

  6. Zhu H, Du S, Gao Z, Dong M, Cao Z (2014) A probabilistic misbehavior detection scheme toward efficient trust establishment in delay-tolerant networks. IEEE Trans Parallel Distrib Syst 25(1):22–32

    Article  Google Scholar 

  7. Kulkarni L, Mukhopadhyay D, Bakal J (2016) Analyzing security schemes in delay tolerant networks. In: Proceedings of the international conference on data engineering and communication technology. Springer, Singapore, vol 1, issue 468, pp 613–620

  8. Shikfa A (2011) Security challenges in opportunistic communication. In: IEEE GCC conference and exhibition (GCC), Dubai, pp 425–428

  9. Saha S, Nandi S, Verma R (2018) Design of efficient lightweight strategies to combat DoS attack in delay tolerant network routing. J Mob Commun Comput Inf Wirel Netw 24(1):173–194

    Google Scholar 

  10. Chen H, Lou W, Wang Z, Wang Q (2016) A secure credit-based incentive mechanism for message forwarding in noncooperative DTNs. IEEE Trans Veh Technol 65(8):6377–6388

    Article  Google Scholar 

  11. Bo Yu, Cheng-Zhong X, Xiao B (2013) Detecting sybil attacks in VANETs. J Parallel Distrib Comput 73(6):746–756

    Article  Google Scholar 

  12. Pham TND, Yeo CK (2016) Detecting colluding blackhole and greyhole attacks in delay tolerant networks. IEEE Trans Mob Comput 15(5):1116–1129

    Article  Google Scholar 

  13. Ren Y, Chuah MC, Yang J, Chen Y (2010) Detecting wormhole attacks in delay-tolerant networks [Security and privacy in emerging wireless networks]. IEEE Wirel Commun 17(5):36–42

    Article  Google Scholar 

  14. Ker A, Ott J, Teemu K (2009) The ONE simulator for DTN protocol evaluation. In: Proceedings of the 2nd international conference on simulation tools and techniques ICST, Rome, Italy, ISBN 978-963-9799-45-5

  15. Bulut E, Szymanski BK (2011) On secure multi-copy based routing in compromised delay tolerant networks. In: Proceedings of 20th international conference on computer communications and networks (ICCCN), Maui, HI, pp 1–7

  16. Khalid W, Ullah Z, Ahmed N, Cao Y, Khalid M, Arshad M, Cruickshank H (2018) A taxonomy on misbehaving nodes in delay tolerant networks. J Comput Secur 77:442–471

    Article  Google Scholar 

  17. Conti M, Di Pietro R, Mancini L, Mei A (2011) Distributed detection of clone attacks in wireless sensor networks. IEEE Trans Dependable Secure Comput 8(5):685–698

    Article  Google Scholar 

  18. Chen I, Bao F, Chang M, Cho J (2014) Dynamic trust management for delay tolerant networks and its application to secure routing. IEEE Trans Parallel Distrib Syst 25(5):1200–1210

    Article  Google Scholar 

  19. Tamez EB, Woungang I, Lilien L, Denko MK (2009) Trust management in opportunistic networks: a semantic web approach. In: IEEE conference on world congress on privacy, security, trust and the management of e-business, Saint John, NB, pp 235–238

  20. Ayday E, Fekri F (2012) Iterative trust and reputation management using belief propagation. IEEE Trans Depend Secure Comput 9(3):375–386

    Article  Google Scholar 

  21. Trifunovic S, Legendre F, Anastasiades C (2010) Social trust in opportunistic networks. In: INFOCOM IEEE conference on computer communications workshops, San Diego, CA, pp 1–6

  22. Asuquo P, Cruickshank H, Ogah CPA, Lei A, Sun Z (2018) A distributed trust management scheme for data forwarding in satellite DTN emergency communications. IEEE J Sel Areas Commun 36(2):246–256

    Article  Google Scholar 

  23. Chen T, Zhu L, Wu F, Zhong S (2011) Stimulating cooperation in vehicular ad hoc networks: a coalitional game theoretical approach. IEEE Trans Veh Technol 60(2):566–579

    Article  Google Scholar 

  24. Zhu H, Lin X, Lu R, Fan Y, Shen X (2009) SMART: a secure multilayer credit-based incentive scheme for delay-tolerant networks. IEEE Trans Veh Technol 58(8):4628–4639

    Article  Google Scholar 

  25. Lu R, Lin X, Zhu H, Shen X, Preiss B (2010) Pi: a practical incentive protocol for delay tolerant networks. IEEE Trans Wirel Commun 9(4):1483–1493

    Article  Google Scholar 

  26. Zhou J, Dong X, Cao Z, Vasilakos AV (2015) Secure and privacy preserving protocol for cloud-based vehicular DTNs. IEEE Trans Inf Forensics Secur 10(6):1299–1314

    Article  Google Scholar 

  27. Zhou H, Chen J, Fan J, Du Y, Das SK (2013) ConSub: incentive-based content subscribing in selfish opportunistic mobile networks. IEEE J Sel Areas Commun 31(9):669–679

    Article  Google Scholar 

  28. Cai Y, Fan Y, Wen D (2016) An incentive-compatible routing protocol for two-hop delay-tolerant networks. IEEE Trans Veh Technol 65(1):266–277

    Article  Google Scholar 

  29. Li Q, Gao W, Zhu S, Cao G (2013) To lie or to comply: defending against flood attacks in disruption tolerant networks. IEEE Trans Depend Secure Comput 10(3):168–182

    Article  Google Scholar 

  30. Pham TND, Yeo CK, Yanai N, Fujiwara T (2017) Detecting flooding attack and accommodating burst traffic in delay-tolerant networks. IEEE Trans Veh Technol 67(1):795–808

    Article  Google Scholar 

  31. Wei L, Cao Z, Zhu H (2011) MobiGame: a user-centric reputation based incentive protocol for delay/disruption tolerant networks. In: 2011 IEEE global telecommunications conference—GLOBECOM 2011, Kathmandu, pp 1–5

  32. Ma Y, Jamalipour A (2010) Opportunistic node authentication in intermittently connected mobile ad hoc networks. In: 16th Asia-Pacific conference on communications (APCC), Auckland, pp. 453–457

  33. Lv X, Mu Y, Li H (2015) Loss-tolerant bundle fragment authentication for space-based DTNs. IEEE Trans Depend Secure Comput 12(6):615–625

    Article  Google Scholar 

  34. Bhutta MNM, Cruickshank H, Sun Z (2017) Public-key infrastructure validation and revocation mechanism suitable for delay/disruption tolerant networks. IET Inf Secur 11(1):16–22

    Article  Google Scholar 

  35. Li Z, Liu Y, Zhu H, Sun L (2015) Coff: contact-duration-aware cellular traffic offloading over delay tolerant networks. IEEE Trans Veh Technol 64(11):5257–5268

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lalit Kulkarni.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kulkarni, L., Bakal, J. & Shrawankar, U. Energy based incentive scheme for secure opportunistic routing in vehicular delay tolerant networks. Computing 102, 201–219 (2020). https://doi.org/10.1007/s00607-019-00735-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00607-019-00735-2

Keywords

Mathematices Subject Classification

Navigation