Limits...
Using Trust to Establish a Secure Routing Model in Cognitive Radio Network.

Zhang G, Chen Z, Tian L, Zhang D - PLoS ONE (2015)

Bottom Line: At the same time, according to the trust classification, different responses are made specific to their service requests.By adopting stricter punishment on malicious behaviors from non-trusted nodes, the cooperation of nodes in routing can be stimulated.Simulation results and analysis indicate that this model has good performance in network throughput and end-to-end delay under the selective forwarding attack.

View Article: PubMed Central - PubMed

Affiliation: State Key Lab of Integrated Service Networks, Xidian University, Xi'an, Shannxi, China; College of Information Science and Engineering, Hebei University of Science and Technology, Shijiazhuang, Hebei, China.

ABSTRACT
Specific to the selective forwarding attack on routing in cognitive radio network, this paper proposes a trust-based secure routing model. Through monitoring nodes' forwarding behaviors, trusts of nodes are constructed to identify malicious nodes. In consideration of that routing selection-based model must be closely collaborative with spectrum allocation, a route request piggybacking available spectrum opportunities is sent to non-malicious nodes. In the routing decision phase, nodes' trusts are used to construct available path trusts and delay measurement is combined for making routing decisions. At the same time, according to the trust classification, different responses are made specific to their service requests. By adopting stricter punishment on malicious behaviors from non-trusted nodes, the cooperation of nodes in routing can be stimulated. Simulation results and analysis indicate that this model has good performance in network throughput and end-to-end delay under the selective forwarding attack.

No MeSH data available.


Network throughput.
© Copyright Policy
Related In: Results  -  Collection

License
getmorefigures.php?uid=PMC4589414&req=5

pone.0139326.g004: Network throughput.

Mentions: It can be seen from Fig 4 that the introduction of trust mechanism enables the network throughput of TSRM to be better than those of DORP and AODV. Firstly, AODV does not consider the influence of the dynamic changes of nodes’ SOPs in CRNs on route. Routes are established according to on-demand distance vector algorithm. When data packets are forwarded, links usually break because there is no the same available channel between neighboring nodes. Based on AODV, DORP is improved and cross-layer design combines routing selection and spectrum allocation. However, under the selective forwarding attack, data packets passing malicious nodes are discarded in the forwarding route. In TSRM, the trust evaluation of neighboring nodes is established according to nodes' historical forwarding behaviors. In the route discovery and route decision, trust decreases the participation probability of malicious nodes in routing forward and improves the stability of links and implements reward and punishment mechanism to stimulate the cooperation of nodes. With the increasing proportion of malicious nodes, network throughput of DORP and AODV respectively decrease to 15% and 5%. The whole network basically is in an invalid state. Trust-based TSRM can effectively defend the influence of selective forwarding attack and the network throughput slowly decreases, maintaining above 50% all the time.


Using Trust to Establish a Secure Routing Model in Cognitive Radio Network.

Zhang G, Chen Z, Tian L, Zhang D - PLoS ONE (2015)

Network throughput.
© Copyright Policy
Related In: Results  -  Collection

License
Show All Figures
getmorefigures.php?uid=PMC4589414&req=5

pone.0139326.g004: Network throughput.
Mentions: It can be seen from Fig 4 that the introduction of trust mechanism enables the network throughput of TSRM to be better than those of DORP and AODV. Firstly, AODV does not consider the influence of the dynamic changes of nodes’ SOPs in CRNs on route. Routes are established according to on-demand distance vector algorithm. When data packets are forwarded, links usually break because there is no the same available channel between neighboring nodes. Based on AODV, DORP is improved and cross-layer design combines routing selection and spectrum allocation. However, under the selective forwarding attack, data packets passing malicious nodes are discarded in the forwarding route. In TSRM, the trust evaluation of neighboring nodes is established according to nodes' historical forwarding behaviors. In the route discovery and route decision, trust decreases the participation probability of malicious nodes in routing forward and improves the stability of links and implements reward and punishment mechanism to stimulate the cooperation of nodes. With the increasing proportion of malicious nodes, network throughput of DORP and AODV respectively decrease to 15% and 5%. The whole network basically is in an invalid state. Trust-based TSRM can effectively defend the influence of selective forwarding attack and the network throughput slowly decreases, maintaining above 50% all the time.

Bottom Line: At the same time, according to the trust classification, different responses are made specific to their service requests.By adopting stricter punishment on malicious behaviors from non-trusted nodes, the cooperation of nodes in routing can be stimulated.Simulation results and analysis indicate that this model has good performance in network throughput and end-to-end delay under the selective forwarding attack.

View Article: PubMed Central - PubMed

Affiliation: State Key Lab of Integrated Service Networks, Xidian University, Xi'an, Shannxi, China; College of Information Science and Engineering, Hebei University of Science and Technology, Shijiazhuang, Hebei, China.

ABSTRACT
Specific to the selective forwarding attack on routing in cognitive radio network, this paper proposes a trust-based secure routing model. Through monitoring nodes' forwarding behaviors, trusts of nodes are constructed to identify malicious nodes. In consideration of that routing selection-based model must be closely collaborative with spectrum allocation, a route request piggybacking available spectrum opportunities is sent to non-malicious nodes. In the routing decision phase, nodes' trusts are used to construct available path trusts and delay measurement is combined for making routing decisions. At the same time, according to the trust classification, different responses are made specific to their service requests. By adopting stricter punishment on malicious behaviors from non-trusted nodes, the cooperation of nodes in routing can be stimulated. Simulation results and analysis indicate that this model has good performance in network throughput and end-to-end delay under the selective forwarding attack.

No MeSH data available.