Professional Documents
Culture Documents
Abstract- Recently, the increase of different services makes the provide better QoS in OR in face of the uncertainty of
design of routing protocols more difficult in mobile ad hoc forwarding paths. However, the environment in the face of
networks (MANETs), e.g., how to guarantee the QoS of different malicious nodes is not very practical.
types of traffics flows in MANETs with resource constrained and Recently, some studies have been presented for OR from a
malicious nodes. Opportunistic routing (OR) can make full use of security perspective. Zhang et al. [4] proposed a privacy
the broadcast characteristics of wireless channels to improve the
preserving and secure framework for OR in DTNs,
performance of MANETs. In this paper, we propose a traffic-
differentiated secure opportunistic routing from a game theoretic considering confidentiality, authentication and key
perspective, DSOR. In the proposed scheme, we use a novel management. Lyu et al. [5] presented a secure and scalable
method to calculate trust value, considering node’s forwarding geographic OR for WSNs from a received signal strength
capability and the status of different types of flows. According to perspective, exploiting a location verification algorithm and
the resource status of the network, we propose a service price and avoiding location spoofing attack scheme based on received
resource price for the auction model, which is used to select signal strength. As we know that the trust mechanism can be
optimal candidate forwarding sets. At the same time, the optimal used to solve the problem of malicious nodes in MANETs.
bid price has been proved and a novel flow priority decision for Consider the uncertainty of trust value caused by the problem
transmission is presented, which is based on waiting time and
of link quality and malicious behaviors, Wang et al. [6]
requested time. The simulation results show that the network
lifetime, packet delivery rate and delay of the DSOR are better proposed a trusted minimum cost opportunistic routing
than existing works. (MCOR) for ad hoc networks which selects the highest
priority and trusted candidate set to forward data. Salehi et. al.
Keywords - MANETs; secure opportunistic routing; trust; [7] proposed to combine trust mechanism with opportunity
traffic-differentiated
routing, in which the trust value is taken into account in
making the selection of candidate node sets, effectively
I. INTRODUCTION
reducing the influence of malicious nodes on network
With the development of communication technology, the performance. Considering the subjectivity of the trust
content is increasingly rich in mobile ad hoc networks mechanism, in [8], they further introduced the concept of
(MANETs). Diverse network contents also indicate the recommendation trust is introduced, which can solve the
existence of multiple service flows in the network, such as collusion attack well.
video flow, voice flow, etc. Therefore, how to ensure that QoS However, these works did not consider the diversity of
of different service flows in MANETs is a hot issue at present, attacks and candidate selection under different types of flows.
especially in the case of malicious nodes in MANETs. In this In our recent work [9], we proposed a trust aware OR for
case, a suitable routing scheme plays a crucial role in network cognitive radio IoT under different types of flows environment.
performance improvement. It uses a heuristic algorithm for candidate selection which will
Considering the broadcast characteristics of the wireless degrade routing performance due to the selection of improper
network, Biswas et al. [1] firstly proposed the concept of candidate.
opportunistic routing (OR), in which, the node broadcasts the In view of the above problems, we propose a game
packet to its neighbors, and then its neighbors will have the theoretic based secure opportunity routing protocol for traffic-
chance to receive/hear it, hence, they can cooperate in packet differentiated MANETs denoted DSOR. The main
forwarding. Taking the advantage of the broadcast nature of contributions of this paper are as follows:
the wireless medium, OR can enhance the routing performance 1) We design a novel trust mechanism for different
in wireless networks. types of flows, which exploits node’s forwarding
In different types of flows environments, How et al. [2] capability and the status of different types of flows.
proposed a cross layer service differentiation OR for cognitive It is more efficient to characterize multiple types of
radio networks, which uses minimum required data rate for flow-oriented trust mechanism.
candidate selection. Qin et. al. [3] presented a novel 2) We present an auction based OR protocol, which uses
opportunistic routing scheme which considers admission energy and bandwidth for defining network resource
control of nodes for the different types of flows, which can price, trust and ETX (expected transmission count)
k,(((
Authorized licensed use limited to: Corporacion Universitaria de la Costa. Downloaded on July 18,2022 at 21:23:31 UTC from IEEE Xplore. Restrictions apply.
,(((6\PSRVLXPRQ&RPSXWHUVDQG&RPPXQLFDWLRQV,6&&
calculation under multi-type flows, combining our previous where s is the number of h’s one-hop neighbor nodes, g is h’s
¦ fl is the number of total flows
s
work on trust mechanisms [9], the calculation of trust value one-hop neighbor. g =1 h, g
based on differentiated services is presented.
forwarded by node h. ¦ fl is the number of k-type flows
s k
A) Direct trust value calculation g =1 h, g
The number of traffic flows and the number of packets of forwarded by node h.
each traffic type are two important factors that affect the trust Then, the indirect trust of node i to node j for k-type flows
value in a multi-service environment. Combining our previous can be expressed:
work [9], in this part, we calculate our trust value by the
¦
n
Td ik, h * Td hk, j * whk
number of current flow forwarding ratio and the number of Tri ,k j = h =1 (6)
¦
n
packets forwarding ratio of the current forwarding flow type. h =1
Td ik, h * whk
Next, we use k to indicate the type of traffic in a network. Hence, the trust of node i to node j can be expressed as
Suppose node i acts as a sending node and node j acts as a follows:
neighbor node of node i. fnik, j indicates the number of packets Ti , j = ¦ T d ik, j + β ¦ T ri ,k j (7)
k k
of the k-type traffic flow that is forwarded by j when it is the
where 0 < α , β ≤ 1 and α + β = 1 .
next hop of node i. fn _ ri k, j represents the proportion of the
number of packets forwarded by fnik, j at node i, which can be 2. Candidate selection based on auction model
In the proposed scheme, we use the price mechanism to
expressed : select the next hop candidate node. Considering the resource
fnik, j status and the trust status of the nodes in the MANETs, and
fn _ ri k, j = (1)
¦
n
fnik, h taking the state of the links quality into account, we divide the
h =1
prices into two categories: resource prices and service prices.
where n represents the number of i’s one-hop neighbor nodes,
According to the economy theory, the state of resources is
j and h are i’s one-hop neighbor.
inversely proportional to price. Taking the node energy as an
In addition, we use fl _ ri k, j to represent the proportion of example, when the remaining energy of the node is sufficient,
the number of k-type flows sent by node i and through node j the price is low, and vice versa. In addition, considering the
to forward them, which can be expressed as follows: node’s own capabilities, the node with the lower ETX value
flik, j has large service ability, and the large node charges a smaller
fl _ ri ,k j = (2)
price for greater profit. The combination of the two type of
¦
n
h =1
flik, h
prices can ensure the balance of resource allocation in the
where flik, j represents the number of the k-type traffic flows network and ensure the optimal state when the data are
that is forwarded by i’s one-hop neighbor j . transmitted.
Combining Equation 1 with Equation 2, we can calculate When the node begins to forward data, the price is firstly
the direct trust value. determined, and the price is divided into the resource price and
the service price. The resource price is composed of the energy
Authorized licensed use limited to: Corporacion Universitaria de la Costa. Downloaded on July 18,2022 at 21:23:31 UTC from IEEE Xplore. Restrictions apply.
,(((6\PSRVLXPRQ&RPSXWHUVDQG&RPPXQLFDWLRQV,6&&
Authorized licensed use limited to: Corporacion Universitaria de la Costa. Downloaded on July 18,2022 at 21:23:31 UTC from IEEE Xplore. Restrictions apply.
,(((6\PSRVLXPRQ&RPSXWHUVDQG&RPPXQLFDWLRQV,6&&
state. In short, all nodes using this strategy can achieve their optimal solution can be addressed by Theorem 1. Each trusted
maximum expected return. node bids according to the optimal solution for maximizing its
U i = max ª¬( bi − vi ) × Pro {bi < b j } ( j = 1, …, n1 )˗j ≠ i º¼ own profit. According to the level of the bidding price of the
(15) node, we can get the optimal set. The candidate selection
{
+ ( bi − vi ) × Pro bi ( ∃b j < bi ) } algorithm for any node c (except for destination node) is listed
in Algorithm 1, where N i is the set of i’s next hop nodes,
where U i is the expected return of the node. Equation 15
NTi is the set of i’s next hop trusted nodes, CFSi is the
indicates that for any node that using as its bid price can
reach its maximum expected return. forwarding candidate set of node i , and mapPi is a collection
ª º of key-value pairs of node j, denoted ( j , v j ) .
« n
»
U i = max «( bi − vi ) × ∏Pro {bi < b j } »
« j =1
» Algorithm 1: Candidate selection algorithm based on auction
¬ j≠i ¼
1: input: ETX iD , Tth , E Nj , BNj , k
ª º (16)
« n 2
1 » 2: Auctioneer: broadcast RTS to N i
= max «( bi − vi ) × ∏ ³ dx »
« j =1 bi − di 2 » 3: for all nodes j ∈ N i for k-type flow do
¬ j ≠ i li ¼
n 4: if Ti , j ≥ Tth then
× [( n − 1) × (bi − vi )] × ∏[2l j − ( bi − d j )]}
1
= max{
( n − 1) × 2 × ∏ j =1l j
n −1 n
j =1 5: NTi ← j
j ≠i j≠i
6: end if
Since bi is the minimum value of the quote, 2l j − ( bi − d j ) , 7: end for
8: Bidder : for all nodes j ∈ NTi for k-type flow do
and ( n − 1) × (bi − vi ) , according to the principle of summing
9: if ETX jD ≤ ETX iD & & E Nj ≤ ERj & & BNj ≤ BRj then
the maximum value, we can deduce the expression 17.
10: calculate its cost according to (8) - (14)
2l j − ( bi − d j ) = ( n − 1) × ( bi − vi ) (17) 11: calculate its bidding price according to (22)
12: sending v j to node i
If the U i has a maximum value, then the best bidding
13: end if
strategy is 14: end for
2 × l j + d j (n − 1) × vi 15: Auctioneer: for received v j do
bi = + (18)
n n 16: mapPj ← ( j , v j )
Since we have 17: end for
bi = li * vi + d i (19) 18: sort mapPj according v j
Hence, we can obtain 19: for all nodes j ∈ NTi do
n −1 CFSi ← CFSi * j th node key j
°°li = n
20:
(20) 21: end for
®
° d = 2l j + d j 22: output: CFSi
°̄ i n
5. Flow priority policy
Because of the symmetry of the quotation strategy, we
Firstly, we assign different types of flows with initial
have d i = d j , that is priority according to the delay requirements. At the same
n −1 time, in order to ensure the QoS of low priority traffic flows,
°° li = n we propose the concept of sending right. Taking three types of
® (21)
flows as an example, the initial priority is 3, 2, and 1, and the
°d = 2
°̄ i n sending right is set to 3, 2, and 1. It will calculate flow priority
Adding it into formula (18), we have when a node has multiple flows at the same time. There are
n −1 2
multiple cases here. Firstly, there is a flow being forwarded by
bi* = vi + (22) the node. The FIFO policy would be selected. After the flow is
n n
finished, the new flow can continue to be sent, that is, the
4. Candidate selection algorithm priority is the highest. A node with a high sending right of the
Before determining the set of candidate nodes, we should unsent flow in the node buffer can be directly sent. The
filter the malicious nodes. For filtering the malicious nodes, remaining traffic flows are calculated according to the formula
we set the trust threshold Tth . The node is considered as a 23. As the waiting time increases, the sending right of the
trusted node, whose trust value is larger than Tth . Moreover, lowest traffic flow reaches 3, and the access of the new flow is
stopped until the lowest priority flow starts to be sent, and the
in order to guarantee the QoS for different types of flows, our new flow is accessed.
proposed scheme design the cost based on differentiation
W aiting time
strategy. Auction based candidate selection algorithm, as Sending right = + Pr iority (23)
Re quensted time
shown in Algorithm 1, has been presented, in which the
Authorized licensed use limited to: Corporacion Universitaria de la Costa. Downloaded on July 18,2022 at 21:23:31 UTC from IEEE Xplore. Restrictions apply.
,(((6\PSRVLXPRQ&RPSXWHUVDQG&RPPXQLFDWLRQV,6&&
III PERFORMANCE EVALUATION malicious nodes. In addition, our proposed scheme is better
than MCOR due to exploit a novel trust scheme for different
In this section, we evaluate the performance of DSOR
types of flows.
protocol by simulation under different percentage of
misbehaving nodes using the Opportunistic Network
Environment simulator ONE simulator [10]. In this simulation,
we compare the following two protocols MCOR [6] and ExOR
[1] in terms of end to end delay, packet delivery rate and
network lifetime. The simulation consists of 100 nodes that are
randomly distributed in an area of 1000 by 1000 meters. The
main parameters are shown in Table1. In addition, we have
defined three types of traffic flows: class 1, class 2 and class 3.
The related setting parameters are shown in Table 2.
A) Simulation setting
Table 1. The main parameters setting.
Parameter value
Movement module Random way point
Simulation time 43200s Fig. 1. End to end delay v.s. percentage of misbehaving nodes.
Number of nodes 50~100
Size of packet 1500bytes
Simulation area 1000m*1000m
Initial trust value 0.8
Trust threshold 0.6
σ 0.5
ω 0.5
α 0.5
β 0.5
Trust Update interval 20s
Initial Energy value 300eu
Energy consumption receiving per 0.12e-5eu
bytes
Energy consumption forwarding per 0.242-5eu
bytes
Bandwidth 2Mbs Fig. 2. End to end delay v.s. percentage of misbehaving nodes.
(3 types of flows in three OR protocols)
Table 2. The parameters for 3 classes of flows. Packet delivery rate: In this part, we study the impact of
Class Priority CWmin CWmax Delay bound malicious nodes on packet delivery rate. As shown in Fig. 3,
Class1 3 3 7 100ms with the number of malicious nodes increasing, the total
Class2 2 7 15 200ms packet delivery rate decreases. As can been see from Fig. 4,
Class3 1 15 1023 300ms
the packet delivery rate of each type of flow is decreasing,
B) Attack model with the increasing number of malicious nodes. Besides, the
In the simulation, two types of attacks are considered: type of flow with higher priority has a better packet delivery
Black hole attack, and specific flow-based attack. Black hole rate. Without taking any measure to deal with misbehaving
attack model is Denial of Service attack model (DoS). Black nodes, ExOR shows the worst performance. Due to the novel
hole attacks increase packet loss rate, increase retransmission trust mechanism based on differentiation strategy, each type of
times, and reduce network lifetime. The second attack model flow using our proposed scheme has a higher packet delivery
is to discard the packets of a specific type of traffic flow. As rate than using MCOR, under the same conditions.
we know that the forwarding behavior of nodes to other flows
is likely to obtain a high trust value. This kind of malicious
node is difficult to identify.
C) Simulation results and analysis
End to end Delay: We study the influence of the
percentage of malicious nodes on end-to-end delay in both Fig.
1 and Fig. 2. As observed, with the number of malicious nodes
increasing, the average end-to-end delay increases. Similarly,
the average end to end delay of each type of flows also
increases with the increasing number of malicious nodes. It is
obvious that the delay of flow with higher priority is smaller
than that with lower priority. Besides, ExOR has a worse
performance than the other two routing schemes. The reason is Fig. 3. Packet delivery rate v.s. percentage of misbehaving nodes.
that ExOR did not take any security measures against the
Authorized licensed use limited to: Corporacion Universitaria de la Costa. Downloaded on July 18,2022 at 21:23:31 UTC from IEEE Xplore. Restrictions apply.
,(((6\PSRVLXPRQ&RPSXWHUVDQG&RPPXQLFDWLRQV,6&&
IV CONCLUSION
In this paper, we provide a traffic-differentiated secure
opportunistic routing, in MANETs with resource constrained
and malicious nodes, DSOR. In DSOR, a novel trust
calculation scheme is proposed, which jointly considering
node’s forwarding capability and the status of different types
of flows. We propose a multiple-type of flows oriented
forwarding candidate selection from a game theoretic
perspective, and a novel flow priority decision scheme for
transmission. Finally, the extensive simulation results exhibit
that the proposed secure OR performs better than ExOR and
MCOR.
Fig. 4. Packet delivery rate v.s. percentage of misbehaving nodes (3 types of
flows in three OR protocols). ACKNOWLEDGMENT
This work was supported by the National Natural Science
Foundation of China (Grant Nos. 61802221, 61802220,
61602125) and the Natural Science Foundation of Guangxi
Province under grants 2016GXNSFBA380010,
2016GXNSFBA380153 and 2017GXNSFAA198192,
Innovation Project of GUET Graduate Education under grant
2017YJCX57, and the Innovation Project of Guangxi
Graduate Education under grant YCSW2019141. We would
like to acknowledge the reviewers whose comments and
suggestions significantly improved this paper.
REFERENCES
[1] S. Biswas and R. Morris, “ExOR: Opportunistic multi-hop routing for
Fig. 5. Network life v.s. percentage of misbehaving nodes.
wireless networks,” in Proc. ACM SIGCOMM 2005, 35: 133-144.
Network lifetime: In Fig. 5, we study the impact of
[2] K. How, M. Ma, Yang Qin, “Routing and QoS provisioning in cognitive
malicious nodes on network lifetime. As the number of radio networks,” Computer Networks 55(1): 330-342, 2011.
malicious nodes increases, network lifetime decreases. The [3] Y. Qin, L. Li, X. Zhong, et al., “Opportunistic routing with admission
reason is that the malicious nodes cause many retransmissions, control in wireless ad hoc networks,”Computer Communications 55:32-
wasting more energy. Besides, because of our novel trust 40, 2015.
method, our proposed scheme is better than the other two [4] L. Zhang, J. Song, J. Pan, “A privacy-preserving and secure framework
for opportunistic routing in DTNs,” IEEE Transactions on Vehicular
routing scheme. Fig. 6 shows the influence of the number of Technology 65(9):7684-7697, 2016.
nodes on network lifetime. As can be seen from Fig. 6, our [5] C. Lyu, D. Gu, X. Zhang, et. al., “SGOR: Secure and scalable
proposed scheme shows better performance than ExOR and geographic opportunistic routing with received signal strength in
MCOR. The reason is that our candidate selection algorithm WSNs,” Computer Communications 59:37-51, 2015.
based on auction mechanism, selecting optimal candidate for [6] B. Wang, C. Huang, L. Li, et al., “Trust-based minimum cost
forwarding. opportunistic routing for ad hoc networks,”Journal of Systems and
Software 84(12):2107-2122, 2011.
[7] M. Salehi, A. Boukerche, A. Darehshoorzadeh, et al., “Towards a novel
trust-based opportunistic routing protocol for wireless networks,”
Wireless Networks 22(3):927-943, 2016.
[8] M. Salehi, A. Boukerche, “A novel packet salvaging model to improve
the security of opportunistic routing protocols,” Computer Networks
122: 163-178, 2017.
[9] X. Zhong, R. Lu, L. Li, et. al., “ETOR: Energy and trust aware
opportunistic routing in cognitive radio social internet of things,” in Proc.
of IEEE GLOBECOM 2017:1-6.
[10] A. Keranen, “The opportunistic network environment simulator,” Dept.
Commun. Netw., Helsinki Univ. Technol., Espoo, Finland, Special
Assignment Rep., May 2008.
Authorized licensed use limited to: Corporacion Universitaria de la Costa. Downloaded on July 18,2022 at 21:23:31 UTC from IEEE Xplore. Restrictions apply.