Limits...
Using Trust to Establish a Secure Routing Model in Cognitive Radio Network.

Zhang G, Chen Z, Tian L, Zhang D - PLoS ONE (2015)

Bottom Line: At the same time, according to the trust classification, different responses are made specific to their service requests.By adopting stricter punishment on malicious behaviors from non-trusted nodes, the cooperation of nodes in routing can be stimulated.Simulation results and analysis indicate that this model has good performance in network throughput and end-to-end delay under the selective forwarding attack.

View Article: PubMed Central - PubMed

Affiliation: State Key Lab of Integrated Service Networks, Xidian University, Xi'an, Shannxi, China; College of Information Science and Engineering, Hebei University of Science and Technology, Shijiazhuang, Hebei, China.

ABSTRACT
Specific to the selective forwarding attack on routing in cognitive radio network, this paper proposes a trust-based secure routing model. Through monitoring nodes' forwarding behaviors, trusts of nodes are constructed to identify malicious nodes. In consideration of that routing selection-based model must be closely collaborative with spectrum allocation, a route request piggybacking available spectrum opportunities is sent to non-malicious nodes. In the routing decision phase, nodes' trusts are used to construct available path trusts and delay measurement is combined for making routing decisions. At the same time, according to the trust classification, different responses are made specific to their service requests. By adopting stricter punishment on malicious behaviors from non-trusted nodes, the cooperation of nodes in routing can be stimulated. Simulation results and analysis indicate that this model has good performance in network throughput and end-to-end delay under the selective forwarding attack.

No MeSH data available.


End-to-end delay.
© Copyright Policy
Related In: Results  -  Collection

License
getmorefigures.php?uid=PMC4589414&req=5

pone.0139326.g005: End-to-end delay.

Mentions: In AODV, the determination of data forwarding route is based on the measurement of distance. DORP selects channels according to the minimum principle of path accumulating delay. Behaviors that malicious nodes refuse to forward or directly discard data packets always lead to failed forwarding of data packets under two schemes. The repeated failed reforwarding may further trigger the routing reconstruction process. Shown as Fig 5, when the proportion of malicious nodes in the network increases, the mean delay of data packets from source nodes to destination nodes is far higher than that of TRSM. Especially, the link interrupt caused by the dynamic changes of node SOPs in AODV aggravates the generation of reforwarding. When the proportion of malicious nodes is above 35%, end-to-end delay is beyond the normal condition of network tolerance. In TRSM, routes established on the basis of path trust and accumulating delay are relatively stable and maintain low end-to-end delay.


Using Trust to Establish a Secure Routing Model in Cognitive Radio Network.

Zhang G, Chen Z, Tian L, Zhang D - PLoS ONE (2015)

End-to-end delay.
© Copyright Policy
Related In: Results  -  Collection

License
Show All Figures
getmorefigures.php?uid=PMC4589414&req=5

pone.0139326.g005: End-to-end delay.
Mentions: In AODV, the determination of data forwarding route is based on the measurement of distance. DORP selects channels according to the minimum principle of path accumulating delay. Behaviors that malicious nodes refuse to forward or directly discard data packets always lead to failed forwarding of data packets under two schemes. The repeated failed reforwarding may further trigger the routing reconstruction process. Shown as Fig 5, when the proportion of malicious nodes in the network increases, the mean delay of data packets from source nodes to destination nodes is far higher than that of TRSM. Especially, the link interrupt caused by the dynamic changes of node SOPs in AODV aggravates the generation of reforwarding. When the proportion of malicious nodes is above 35%, end-to-end delay is beyond the normal condition of network tolerance. In TRSM, routes established on the basis of path trust and accumulating delay are relatively stable and maintain low end-to-end delay.

Bottom Line: At the same time, according to the trust classification, different responses are made specific to their service requests.By adopting stricter punishment on malicious behaviors from non-trusted nodes, the cooperation of nodes in routing can be stimulated.Simulation results and analysis indicate that this model has good performance in network throughput and end-to-end delay under the selective forwarding attack.

View Article: PubMed Central - PubMed

Affiliation: State Key Lab of Integrated Service Networks, Xidian University, Xi'an, Shannxi, China; College of Information Science and Engineering, Hebei University of Science and Technology, Shijiazhuang, Hebei, China.

ABSTRACT
Specific to the selective forwarding attack on routing in cognitive radio network, this paper proposes a trust-based secure routing model. Through monitoring nodes' forwarding behaviors, trusts of nodes are constructed to identify malicious nodes. In consideration of that routing selection-based model must be closely collaborative with spectrum allocation, a route request piggybacking available spectrum opportunities is sent to non-malicious nodes. In the routing decision phase, nodes' trusts are used to construct available path trusts and delay measurement is combined for making routing decisions. At the same time, according to the trust classification, different responses are made specific to their service requests. By adopting stricter punishment on malicious behaviors from non-trusted nodes, the cooperation of nodes in routing can be stimulated. Simulation results and analysis indicate that this model has good performance in network throughput and end-to-end delay under the selective forwarding attack.

No MeSH data available.