360Accesses
6Citations
Abstract
Addressing communication reliability and security has always been of significant importance in wireless networks. Opportunistic routing (OR) protocols comprise a promising area of research that aims to improve the reliability of communications, particularly in lossy networks. The main concept behind OR protocols is to utilize the broadcast nature of the wireless medium and determine a group of neighboring node candidates, known ascandidate set, to collaboratively forward packets towards the destination using acandidate coordination approach. However, similar to traditional routing protocols, OR protocols operate poorly in the presence of malicious nodes and attackers. Therefore, researchers have designed and developed a number of security enhancements, considering the specific characteristics of such protocols. In this paper, following a brief overview on OR protocols, we examine, classify, and compare the different categories of security approaches proposed for OR protocols. More precisely, we divide security-related OR protocols into three categories, including trust-based approaches, game-theory-oriented solutions, and other related protocols. Furthermore, the most significant algorithms of each category are investigated as case studies. Finally, a comparison of different protocols is presented considering the main features, advantages, and shortcomings of each protocol.
This is a preview of subscription content,log in via an institution to check access.
Access this article
Subscribe and save
- Get 10 units per month
- Download Article/Chapter or eBook
- 1 Unit = 1 Article or 1 Chapter
- Cancel anytime
Buy Now
Price includes VAT (Japan)
Instant access to the full article PDF.


Similar content being viewed by others
References
Agrawal, S., Jain, S., & Sharma, S. (2011). A survey of routing attacks and security measures in mobile ad-hoc networks. arXiv preprintarXiv:1105.5623.
Bhalaji, N., & Shanmugam, A. (2009). Reliable routing against selective packet drop attack in DSR based MANET.Journal of Software,4(6), 536–543.
Biswas, S., & Morris, R. (2004). Opportunistic routing in multi-hop wireless networks.ACM SIGCOMM Computer Communication Review,34(1), 69–74.
Bo, W., Chuanhe, H., Layuan, L., & Wenzhong, Y. (2011). Trust-based minimum cost opportunistic routing for ad hoc networks.Journal of Systems and Software,84(12), 2107–2122.
Boukerche, A., & Darehshoorzadeh, A. (2014). Opportunistic routing in wireless networks: Models, algorithms, and classifications.ACM Computing Surveys (CSUR),47(2), 22.
Boukerche, A., Turgut, B., Aydin, N., Ahmad, M. Z., Bölöni, L., & Turgut, D. (2011). Routing protocols in ad hoc networks: A survey.Computer Networks,55(13), 3032–3080.
Chachulski, S., Jennings, S., Katti, S., & Katabi, D. (2007). Trading structure for randomness in wireless opportunistic routing.ACM SIGCOMM Computer Communication Review,37, 169.
Charilas, D. E., & Panagopoulos, A. D. (2010). A survey on game theory applications in wireless networks.Computer Networks,54(18), 3421–3430.
Chen, T., & Zhong, S. (2014). An enforceable scheme for packet forwarding cooperation in network-coding wireless networks with opportunistic routing.IEEE Transactions on Vehicular Technology,63(9), 4476–4491.
Cho, J. H., Swami, A., & Chen, R. (2011). A survey on trust management for mobile ad hoc networks.IEEE Communications Surveys and Tutorials,13(4), 562–583.
Darehshoorzadeh, A., & Cerda-Alabern, L. (2012). Distance progress based opportunistic routing for wireless mesh networks. InWireless Communications and Mobile Computing Conference (IWCMC), 2012 8th International (pp. 179–184). IEEE
Han, G., Jiang, J., Shu, L., Niu, J., & Chao, H. C. (2014). Management and applications of trust in wireless sensor networks: A survey.Journal of Computer and System Sciences,80(3), 602–617.
Hsu, C. J., Liu, H. I., & Seah, W. K. (2011). Opportunistic routing—A review and the challenges ahead.Computer Networks,55(15), 3592–3603.
Ji, S., Chen, T., & Zhong, S. (2015). Wormhole attack detection algorithms in wireless network coding systems.IEEE Transactions on Mobile Computing,14(3), 660–674.
Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures.Ad hoc Networks,1(2), 293–315.
Laufer, R., Dubois-Ferriere, H., & Kleinrock, L. (2009). Multirate anypath routing in wireless mesh networks. InINFOCOM 2009, IEEE (pp. 37–45). IEEE.
Laufer, R., Dubois-Ferrière, H., & Kleinrock, L. (2012). Polynomial-time algorithms for multirate anypath routing in wireless multihop networks.IEEE/ACM Transactions on Networking,20(3), 742–755.
Le, T., & Liu, Y. (2010). Opportunistic overlay multicast in wireless networks. InGlobal Telecommunications Conference (GLOBECOM 2010), 2010 IEEE (pp. 1–5). IEEE.
Li, Y., Chen, W., & Zhang, Z. L. (2009). Optimal forwarder list selection in opportunistic routing. InMobile Adhoc and Sensor Systems, 2009. MASS’09. IEEE 6th International Conference on (pp. 670–675). IEEE.
Lin, Y., Li, B., & Liang, B. (2008). CodeOR: Opportunistic routing in wireless mesh networks with segmented network coding. InNetwork Protocols, 2008. ICNP 2008. IEEE International Conference on (pp. 13–22). IEEE.
Lyu, C., Gu, D., Zhang, X., Sun, S., Zhang, Y., & Pande, A. (2015). SGOR: Secure and scalable geographic opportunistic routing with received signal strength in WSNs.Computer Communications,59, 37–51.
Rozner, E., Seshadri, J., Mehta, Y., & Qiu, L. (2009). SOAR: Simple opportunistic adaptive routing protocol for wireless mesh networks.IEEE Transactions on Mobile Computing,8(12), 1622–1635.
Salehi, M., & Boukerche, A. (2014). Trust-aware opportunistic routing protocol for wireless networks. InProceedings of the 10th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Q2SWinet ’14 (pp. 79–86). New York, NY: ACM. doi:10.1145/2642687.2642692.
Salehi, M., & Boukerche, A. (2016). PASOR: A packet salvaging model for opportunistic routing protocols. InAccepted in IEEE International Conference on Mobile Ad hoc and Sensor Systems (MASS), 2016 13th International Conference on (pp. 1–8). IEEE.
Salehi, M., Boukerche, A., & Darehshoorzadeh, A. (2016). Modeling and performance evaluation of security attacks on opportunistic routing protocols for multihop wireless networks.Ad Hoc Networks. doi:10.1016/j.adhoc.2016.07.004.
Salehi, M., & Samavati, H. (2012). Dsr vs olsr: Simulation based comparison of ad hoc reactive and proactive algorithms under the effect of new routing attacks. InNext Generation Mobile Applications, Services and Technologies (NGMAST), 2012 6th International Conference on (pp. 100–105). IEEE
Shah, N., & Huang, D. (2010). A-weor: Communication privacy protection for wireless mesh networks using encoded opportunistic routing. InINFOCOM IEEE Conference on Computer Communications Workshops, 2010 (pp. 1–6). IEEE.
Shi, H. Y., Wang, W. L., Kwok, N. M., & Chen, S. Y. (2012). Game theory for wireless sensor networks: A survey.Sensors,12(7), 9055–9097.
WenZhong, Y., ChuanHe, H., Bo, W., ZhenYu, Z., & Tong, W. (2010). A reliable multicast for MANETs based on opportunistic routing and network coding. InWireless Communications, Networking and Information Security (WCNIS), 2010 IEEE International Conference on (pp. 540–545). IEEE.
Wu, B., Chen, J., Wu, J., & Cardei, M. (2007). A survey of attacks and countermeasures in mobile ad hoc networks. In Y. Xiao, X. S. Shen, & D. Z. Du (Eds.),Wireless network security (pp. 103–135). Boston: Springer.
Wu, F., Gong, K., Zhang, T., Chen, G., & Qiao, C. (2015). COMO: A game-theoretic approach for joint multirate opportunistic routing and forwarding in non-cooperative wireless networks.IEEE Transactions on Wireless Communications,14(2), 948–959.
Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for internet of things.Journal of Network and Computer Applications,42, 120–134.
Yan, Z., Zhang, P., & Virtanen, T. (2003). Trust evaluation based security solution in ad hoc networks. InProceedings of the Seventh Nordic Workshop on Secure IT Systems (Vol. 14).
Yang, S., Zhong, F., Yeo, C. K., Lee, B. S., & Boleng, J. (2009). Position based opportunistic routing for robust data delivery in MANETs. InGlobal Telecommunications Conference, 2009. GLOBECOM 2009. IEEE (pp. 1–6). IEEE.
Yu, H., Shen, Z., Miao, C., Leung, C., & Niyato, D. (2010). A survey of trust and reputation management systems in wireless communications.Proceedings of the IEEE,98(10), 1755–1772.
Zhang, J. (2011). A survey on trust management for vanets. InAdvanced Information Networking and Applications (AINA), 2011 IEEE International Conference on (pp. 105–112). IEEE.
Zhang, K., Wang, R., & Qian, D. (2010). Aim: An auction incentive mechanism in wireless networks with opportunistic routing. InComputational Science and Engineering (CSE), 2010 IEEE 13th International Conference on (pp. 28–33). IEEE.
Acknowledgements
This work was partially supported by Canada Research Chair Programs, DIVA Strategic Research Network, and Natural Sciences and Engineering Research Council of Canada (NSERC).
Author information
Authors and Affiliations
School of Electrical Engineering and Computer Science, University of Ottawa, Ottawa, Canada
Mahmood Salehi & Azzedine Boukerche
- Mahmood Salehi
You can also search for this author inPubMed Google Scholar
- Azzedine Boukerche
You can also search for this author inPubMed Google Scholar
Corresponding author
Correspondence toMahmood Salehi.
Rights and permissions
About this article
Cite this article
Salehi, M., Boukerche, A. Secure opportunistic routing protocols: methods, models, and classification.Wireless Netw25, 559–571 (2019). https://doi.org/10.1007/s11276-017-1575-1
Published:
Issue Date:
Share this article
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative