A Survey of the Ultimate Security Solution in Opportunistic Network: Trust Management

Basira Yahaya*, Mohammed Bashir Muazu**, Emmanuel Adewale Adedokun***, Ime J. Umoh****
*-**** Department of Computer Engineering, Ahmadu Bello University, Zaria, Nigeria.
Periodicity:March - May'2019
DOI : https://doi.org/10.26634/jit.8.2.15716

Abstract

Opportunistic network (oppnets) is a promising paradigm, which allows communication to be set up between nodes even without infrastructure in a delay tolerant fashion. It has even become more pertinent with the proliferation of varieties of autonomous mobile devices. However, malicious devices pose potential security threats (packet dropping, eavesdropping, Denial of Service (DoS) attack, black hole attack, Identification (ID) spoofing, etc.) to the performance of oppnets, due to the inherent characteristics of such networks like ever changing network topology and lack of a definite communication path between nodes amongst others. Recent focus on mitigation mechanisms for security threats in oppnets is on trust management since various mechanisms have been used, but the trust-based methods appeared to meet up with the security requirement of the opportunistic network better. However, no work strictly present trust management extensively. This paper presents trust management together with trust related issues in oppnet (trust-based security threats, trust mechanism, and the trust management scheme as oppnet security solution). It is aimed at providing the reader a clear understanding of trust management (preferred solution) within a single literature.

Keywords

Opportunistic Networks, Security, Trust Management, Privacy, Security Threats.

How to Cite this Article?

Yahaya, B., Muazu, M. B., Adedokun, E. A., Umoh, I. J.(2019).A Survey of the Ultimate Security Solution in Opportunistic Network: Trust Management, i-manager's Journal on Information Technology, 8(2), 40-47. https://doi.org/10.26634/jit.8.2.15716

References

[1]. Alajeely, M., Doss, R., & Ahmad, A. A. (2016). Security and trust in opportunistic networks–a survey. IETE Technical Review, 33(3), 256-268.
[2]. Balaganesh, M., & Nalini, N. (2014). A survey of trust based automatic routing in delay tolerant networks. International Journal of Advanced Information Science and Technology. 3, 51-54.
[3]. Barai, S., & Bhaumik, P. (2016). A taxonomy of recent security concerns in opportunistic networks. International Journal for Scientific Research & Development, 1, 34-46.
[4]. Chang, M., Chen, R., Bao, F., & Cho, J. H. (2011). Trust-threshold based routing in delay tolerant networks. In IFIP International Conference on Trust Management (pp. 265-276). Springer, Berlin, Heidelberg.
[5]. Chen, R., Bao, F., Chang, M., & Cho, J. H. (2014). Dynamic trust management for delay tolerant networks and its application to secure routing. IEEE Transactions on Parallel and Distributed Systems, 25(5), 1200-1210.
[6]. Goyal, M., & Chaudhary, M. (2013). Ensuring privacy in opportunistic network. IOSR Journal Computer Engineering, 13(2), 74-82.
[7]. Gupta, S., Dhurandher, S. K., Woungang, I., Kumar, A., & Obaidat, M. S. (2013). Trust-based security protocol against blackhole attacks in opportunistic networks. In Wireless and Mobile Computing, Networking and Communications (WiMob), 2013 IEEE 9th International Conference on (pp. 724-729). IEEE.
[8]. Indikar, N. J & Kattimani L. S. (2015). Dynamic trust and security management protocol for delay tolerant networks using information centric-Networks Architecture. International Journal of Engineering And Computer Science, 4(6), 12698-12704.
[9]. Kaur, E. U., & Kaur, E. H. (2009). Routing techniques for opportunistic networks and security issues. In National Conference on Computing, Communication and Control (CCC) (Vol. 9, No. 2009, pp. 155-161).
[10]. Khot, A., & Mogal, V. (2017). Trust preservation in opportunistic networks. International Journal of Innovative Research in Computer and Communication Engineering, 5, 2489-2494.
[11]. Kungwani, B., & Dudhe, P. (2016). Trust based privacy preserving Friend recommendation in social network web. International Journal of Research in Science & Engineering, 2(5), 38-43.
[12]. Padhi, S., Tiwary, M., Priyadarshini, R., Panigrahi, C. R., & Misra, R. (2016). SecOMN: Improved security approach for Opportunistic Mobile Networks using cyber foraging. In Recent Advances in Information Technology (RAIT), 2016 3rd International Conference on (pp. 415- 421).
[13]. Poonguzharselvi, B., & Vetriselvi, V. (2012). Trust framework for data forwarding in opportunistic networks using mobile traces. International Journal of Wireless & Mobile Networks, 4(6), 115.
[14]. Shikfa, A. (2010). Security issues in opportunistic networks. In Proceedings of the Second International Workshop on Mobile Opportunistic Networking (pp. 215- 216). ACM.
[15]. Singh, R., & Chawla, M. (2014). An efficient trust management technique for delay tolerant network. International Journal of Computer Applications, 98(21) 8- 12.
[16]. Trifunovic, S., & Legendre, F. (2009). Trust in opportunistic networks. Computer Engineering and Network Laboratory, ETH Zurich, Switzerland.
[17]. Verma, A., & Srivastava, D. (2012). Integrated routing protocol for opportunistic networks. arXiv preprint arXiv:1204.1658.
[18]. Wu, Y., Zhao, Y., Riguidel, M., Wang, G., & Yi, P. (2015). Security and trust management in opportunistic networks: A survey. Security and Communication Networks, 8(9), 1812-1827.
[19]. Xi, C., Liang, S., Feng, M. A. J., & Zhuo, M. A. (2015). A trust management scheme based on behavior feed back for opportunistic networks. China Communications, 12(4), 117-129.
[20]. Yao, L., Man, Y., Huang, Z., Deng, J., & Wang, X. (2016). Secure routing based on social similarity in opportunistic networks. IEEE Transactions on Wireless Communications, 15(1), 594-605.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.