2017
DOI: 10.1016/j.comnet.2017.04.019
|View full text |Cite
|
Sign up to set email alerts
|

A novel packet salvaging model to improve the security of opportunistic routing protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2018
2018
2025
2025

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 20 publications
0
6
0
Order By: Relevance
“…Although these works are on the basis of opportunistic routing, they mostly address the issues of QoS, load balance or energy efficiency. In terms of security, Salehi and Boukerche [23] address black hole attacks on opportunistic routing in the wireless mesh networks, where nodes deliberately drop the data packet that they are supposed to transmit. To defend against such attacks, they make use of Markov chain to establish a packet salvaging model for the opportunistic routing.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Although these works are on the basis of opportunistic routing, they mostly address the issues of QoS, load balance or energy efficiency. In terms of security, Salehi and Boukerche [23] address black hole attacks on opportunistic routing in the wireless mesh networks, where nodes deliberately drop the data packet that they are supposed to transmit. To defend against such attacks, they make use of Markov chain to establish a packet salvaging model for the opportunistic routing.…”
Section: Related Workmentioning
confidence: 99%
“…If someone reports the DoS attackers to the CA or any trusted legal authority, they will seek to repudiate data packets that have been created by them. In this work, we do not consider the location spoofing attacks and black hole attacks, which can be addressed by the existing security schemes [23], [25]. The issues of eavesdropping and data privacy are out of the scope of this paper.…”
Section: ) Dos Attacks Resistantmentioning
confidence: 99%
“…The paper combines the two to fully utilise the broadcast characteristics of wireless transmission, but does not consider energy efficiency issues. Literature [12] proposes a packet recovery model that allows opportunistic routing protocols to defend against malicious nodes by preserving a certain percentage of discarded or manipulated packets. The proposed method designed using discrete time Markov Chain (DTMC) and is applicable to wireless mesh networks, but energy factors are not considered.…”
Section: Related Workmentioning
confidence: 99%
“…Opportunistic routing [ 59 ] is based on the following method to reduce the delay on the basis of ensuring the reliability of data transmission. First, the sender determines a candidate set, which comes from the Forwarding Nodes Set (FNS).…”
Section: Related Workmentioning
confidence: 99%
“…Because data will be retransmitted only if multiple candidate nodes do not receive it and the probability that multiple candidate nodes do not receive data is low, the probability of retransmission is minimal. In other words, it can effectively reduce delay [ 59 ].…”
Section: Related Workmentioning
confidence: 99%