Trust-based security routing mechanism in mobile social networks
Malicious and selfish behaviors represent a serious security threat against routing in mobile social networks (MSN). Due to MSN’s unique network characteristics, such as sociability, mobility and diversity, it is a challenge to design a misbehavior detection scheme in MSN. To improve the security in...
Uložené v:
| Vydané v: | Neural computing & applications Ročník 32; číslo 10; s. 5609 - 5620 |
|---|---|
| Hlavní autori: | , , , , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
London
Springer London
01.05.2020
Springer Nature B.V |
| Predmet: | |
| ISSN: | 0941-0643, 1433-3058 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | Malicious and selfish behaviors represent a serious security threat against routing in mobile social networks (MSN). Due to MSN’s unique network characteristics, such as sociability, mobility and diversity, it is a challenge to design a misbehavior detection scheme in MSN. To improve the security in MSN routing, a trust-based security routing mechanism is presented in this paper, i.e., a malicious behavior detection mechanism with identity verification scheme. The main idea is to introduce the behavior trust and the identity trust to guide the routing. Firstly, we judge a node’s behavior based on both comprehensive trust and social relationship strength. And then, we forward messages according to the different measurement within and outside the friend groups. We also propose a distributed key management scheme which can issue, verify or revoke certificates based on the evaluation of the social relationship strength. We further improve the efficiency of the proposed mechanism by verifying the identity trust of the node. The simulation results indicate that the proposed routing mechanism can lower the impact of malicious behavior of nodes effectively and it has greater security performance than some classical routing algorithms do. |
|---|---|
| AbstractList | Malicious and selfish behaviors represent a serious security threat against routing in mobile social networks (MSN). Due to MSN’s unique network characteristics, such as sociability, mobility and diversity, it is a challenge to design a misbehavior detection scheme in MSN. To improve the security in MSN routing, a trust-based security routing mechanism is presented in this paper, i.e., a malicious behavior detection mechanism with identity verification scheme. The main idea is to introduce the behavior trust and the identity trust to guide the routing. Firstly, we judge a node’s behavior based on both comprehensive trust and social relationship strength. And then, we forward messages according to the different measurement within and outside the friend groups. We also propose a distributed key management scheme which can issue, verify or revoke certificates based on the evaluation of the social relationship strength. We further improve the efficiency of the proposed mechanism by verifying the identity trust of the node. The simulation results indicate that the proposed routing mechanism can lower the impact of malicious behavior of nodes effectively and it has greater security performance than some classical routing algorithms do. |
| Author | Yang, Shuang Zhang, Shuang Wang, Xingwei Yi, Bo Huang, Min |
| Author_xml | – sequence: 1 givenname: Shuang surname: Yang fullname: Yang, Shuang organization: College of Computer Science and Engineering, Northeastern University – sequence: 2 givenname: Xingwei surname: Wang fullname: Wang, Xingwei email: wangxw@mail.neu.edu.cn organization: State Key Laboratory of Synthetical Automation for Process Industries, Northeastern University – sequence: 3 givenname: Shuang surname: Zhang fullname: Zhang, Shuang organization: College of Software, Northeastern University – sequence: 4 givenname: Bo surname: Yi fullname: Yi, Bo organization: College of Computer Science and Engineering, Northeastern University – sequence: 5 givenname: Min surname: Huang fullname: Huang, Min organization: College of Information Science and Engineering, Northeastern University |
| BookMark | eNp9kN9LwzAQx4NMcJv-Az4VfK5emjRt35ThLxj4Mp9Dml1nZpvMJEW2v95qBcGHPR3HfT93x2dGJtZZJOSSwjUFKG4CQJ7RFGiVAqeiSA8nZEo5YymDvJyQKVR8GAvOzsgshC0AcFHmU3K78n2Iaa0CrpOAuvcm7hPv-mjsJulQvylrQpcYm3SuNi0mwWmj2sRi_HT-PZyT00a1AS9-65y8PtyvFk_p8uXxeXG3TDWjVUzzWnNRVSVyFBVmqFm9hgwVXeuCKQU4tAXkBZZcsQyFEg2vG1rVIJhosprNydW4d-fdR48hyq3rvR1OyoxVIi_KnPMhVY4p7V0IHhupTVTROBu9Mq2kIL99ydGXHHzJH1_yMKDZP3TnTaf8_jjERigMYbtB__fVEeoL-SaA9g |
| CitedBy_id | crossref_primary_10_1007_s00521_022_07656_w crossref_primary_10_3390_fi16020048 crossref_primary_10_1109_TNSE_2021_3139005 crossref_primary_10_1109_JSYST_2021_3071470 |
| Cites_doi | 10.1109/tcbb.2018.2868088 10.1109/TETC.2015.2414792 10.1016/j.comcom.2015.10.002 10.1002/ett.3297 10.1109/wowmom.2012.6263749 10.1007/978-981-10-6893-5_4 10.1109/FSKD.2018.8687173 10.12720/jcm.12.9.524-531 10.1109/ACCESS.2017.2679980 10.1016/j.adhoc.2016.11.001 10.1007/s11036-016-0703-y 10.1016/j.asoc.2015.10.019 10.1007/s11276-015-0984-2 10.1109/tpds.2018.2877359 10.1016/j.comnet.2017.05.010 10.1109/msn.2016.052 10.1016/j.adhoc.2017.08.005 10.1186/s13638-016-0578-4 10.1109/passat/socialcom.2011.60 10.1109/TWC.2015.2476466 10.1109/TPDS.2016.2603511 10.1016/j.jnca.2018.03.013 10.1007/978-81-322-2529-4_61 10.1155/2018/6462826 10.1016/j.comnet.2016.12.016 10.1007/s11276-014-0790-2 10.1177/1550147717749729 10.1109/jsyst.2017.2764479 10.1109/TPDS.2014.2307857 10.1109/tpds.2018.2871189 10.1109/iri.2017.74 10.1109/iccnc.2016.7923427 10.1016/j.adhoc.2018.06.014 10.1109/COMST.2014.2371813 10.1007/s11276-015-1162-2 |
| ContentType | Journal Article |
| Copyright | Springer-Verlag London Ltd., part of Springer Nature 2019 Springer-Verlag London Ltd., part of Springer Nature 2019. |
| Copyright_xml | – notice: Springer-Verlag London Ltd., part of Springer Nature 2019 – notice: Springer-Verlag London Ltd., part of Springer Nature 2019. |
| DBID | AAYXX CITATION 8FE 8FG AFKRA ARAPS BENPR BGLVJ CCPQU DWQXO HCIFZ P5Z P62 PHGZM PHGZT PKEHL PQEST PQGLB PQQKQ PQUKI PRINS |
| DOI | 10.1007/s00521-019-04167-z |
| DatabaseName | CrossRef ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Technology collection ProQuest One Community College ProQuest Central SciTech Premium Collection ProQuest advanced technologies & aerospace journals ProQuest Advanced Technologies & Aerospace Collection ProQuest Databases ProQuest One Academic (New) ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest Central China |
| DatabaseTitle | CrossRef Advanced Technologies & Aerospace Collection Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest One Academic Eastern Edition SciTech Premium Collection ProQuest One Community College ProQuest Technology Collection ProQuest SciTech Collection ProQuest Central China ProQuest Central Advanced Technologies & Aerospace Database ProQuest One Applied & Life Sciences ProQuest One Academic UKI Edition ProQuest Central Korea ProQuest Central (New) ProQuest One Academic ProQuest One Academic (New) |
| DatabaseTitleList | Advanced Technologies & Aerospace Collection |
| Database_xml | – sequence: 1 dbid: P5Z name: ProQuest advanced technologies & aerospace journals url: https://search.proquest.com/hightechjournals sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1433-3058 |
| EndPage | 5620 |
| ExternalDocumentID | 10_1007_s00521_019_04167_z |
| GrantInformation_xml | – fundername: Major International (Regional) Joint Research Project of NSFC grantid: 71620107003 – fundername: National Natural Science Foundation of China grantid: 61572123 funderid: http://dx.doi.org/10.13039/501100001809 – fundername: the Program for Liaoning Innovative Research Term in University grantid: LT2016007 – fundername: China National Funds for Distinguished Young Scientists grantid: 71325002 funderid: http://dx.doi.org/10.13039/501100005153 – fundername: the MoE and China Mobile Joint Research Fund grantid: MCM20160201 |
| GroupedDBID | -4Z -59 -5G -BR -EM -Y2 -~C .4S .86 .DC .VR 06D 0R~ 0VY 123 1N0 1SB 2.D 203 28- 29N 2J2 2JN 2JY 2KG 2LR 2P1 2VQ 2~H 30V 4.4 406 408 409 40D 40E 53G 5QI 5VS 67Z 6NX 8FE 8FG 8TC 8UJ 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AAOBN AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDBF ABDZT ABECU ABFTD ABFTV ABHLI ABHQN ABJNI ABJOX ABKCH ABKTR ABLJU ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABWNU ABXPI ACAOD ACBXY ACDTI ACGFS ACHSB ACHXU ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACSNA ACUHS ACZOJ ADHHG ADHIR ADIMF ADINQ ADKNI ADKPE ADMLS ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFIE AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFEXP AFGCZ AFKRA AFLOW AFQWF AFWTZ AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARAPS ARCSS ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN B-. B0M BA0 BBWZM BDATZ BENPR BGLVJ BGNMA BSONS CAG CCPQU COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DU5 EAD EAP EBLON EBS ECS EDO EIOEI EJD EMI EMK EPL ESBYG EST ESX F5P FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNWQR GQ6 GQ7 GQ8 GXS H13 HCIFZ HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I-F I09 IHE IJ- IKXTQ ITM IWAJR IXC IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ KDC KOV KOW LAS LLZTM M4Y MA- N2Q N9A NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM P19 P2P P62 P9O PF0 PT4 PT5 QOK QOS R4E R89 R9I RHV RIG RNI RNS ROL RPX RSV RZK S16 S1Z S26 S27 S28 S3B SAP SCJ SCLPG SCO SDH SDM SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TSG TSK TSV TUC TUS U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z45 Z5O Z7R Z7S Z7V Z7W Z7X Z7Y Z7Z Z81 Z83 Z86 Z88 Z8M Z8N Z8P Z8Q Z8R Z8S Z8T Z8U Z8W Z92 ZMTXR ~8M ~EX AAPKM AAYXX ABBRH ABDBE ABFSG ABRTQ ACSTC ADHKG ADKFA AEZWR AFDZB AFFHD AFHIU AFOHR AGQPQ AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION PHGZM PHGZT PQGLB DWQXO PKEHL PQEST PQQKQ PQUKI PRINS |
| ID | FETCH-LOGICAL-c319t-5bc46998e4e69e2ec3bd02ea1dc73aa0ebd07057e84a32e6a6f4bf19b0636f2b3 |
| IEDL.DBID | P5Z |
| ISICitedReferencesCount | 5 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000529745200026&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0941-0643 |
| IngestDate | Tue Nov 04 23:05:45 EST 2025 Sat Nov 29 02:59:12 EST 2025 Tue Nov 18 21:25:46 EST 2025 Fri Feb 21 02:35:54 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 10 |
| Keywords | Network security Mobile social network Routing mechanism Trust value |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c319t-5bc46998e4e69e2ec3bd02ea1dc73aa0ebd07057e84a32e6a6f4bf19b0636f2b3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| PQID | 2396578544 |
| PQPubID | 2043988 |
| PageCount | 12 |
| ParticipantIDs | proquest_journals_2396578544 crossref_citationtrail_10_1007_s00521_019_04167_z crossref_primary_10_1007_s00521_019_04167_z springer_journals_10_1007_s00521_019_04167_z |
| PublicationCentury | 2000 |
| PublicationDate | 20200500 2020-5-00 20200501 |
| PublicationDateYYYYMMDD | 2020-05-01 |
| PublicationDate_xml | – month: 5 year: 2020 text: 20200500 |
| PublicationDecade | 2020 |
| PublicationPlace | London |
| PublicationPlace_xml | – name: London – name: Heidelberg |
| PublicationTitle | Neural computing & applications |
| PublicationTitleAbbrev | Neural Comput & Applic |
| PublicationYear | 2020 |
| Publisher | Springer London Springer Nature B.V |
| Publisher_xml | – name: Springer London – name: Springer Nature B.V |
| References | QiuTChenBSangaiahAKMaJHuangRA survey of mobile social networks: applications, social characteristics, and challengesIEEE Syst J201710.1109/jsyst.2017.2764479 WangRWangXHaoFZhangLLiuSWangLSocial identity–aware opportunistic routing in mobile social networksTrans Emerg Telecommun Technol2018811710.1002/ett.3297 LakshmiVRVGireeshKTMobile social networks: architecture, privacy, security issues and solutionsJ Commun.201712952453110.12720/jcm.12.9.524-531 QiuTChenNLiKHeterogeneous ad hoc networks: architectures, advances and challengesAd Hoc Netw20175514315210.1016/j.adhoc.2016.11.001 ShiJWangXHuangMLiKDasSKSocial-based routing scheme for fixed-line VANETComput Netw Int J Comput Telecommun Netw201711323024310.1016/j.comnet.2016.12.016 GuanJWeiZYouIGRBC-based network security functions placement scheme in SDS for 5G securityJ Netw Comput Appl2018114485610.1016/j.jnca.2018.03.013 XuQSuZZhangKRenPShenXSEpidemic information dissemination in mobile social networks with opportunistic linksIEEE Trans Emerg Top Comput20173339940910.1109/TETC.2015.2414792 Yang S, Wang X, Zhang S, Huang M (2018) Trust-based security routing mechanism in mobile social networks. In: 14th international conference on natural computation, fuzzy systems and knowledge discovery (ICNC-FSKD 2018), pp 1–6 ChenJLiKTangZA parallel random forest algorithm for big data in a spark cloud computing environmentIEEE Trans Parallel Distrib Syst201728491993310.1109/TPDS.2016.2603511 Sánchez-CarmonaARoblesSBorregoCPrivHab + : a secure geographic routing protocol for DTNComput Commun201678567310.1016/j.comcom.2015.10.002 KaweckiMSchoeneichROMobility-based routing algorithm in delay tolerant networksEurasip J Wirel Commun Netw2016201611910.1186/s13638-016-0578-4 Liang H, Chen Z, Wu J, Guan P (2017) ETSW: an encounter history tree based routing protocol in opportunistic networks. In: National conference of theoretical computer science, Springer, Singapore, pp 46–59. https://doi.org/10.1007/978-981-10-6893-5_4 Chen Y, Li K, Yang W et al (2018) Performance-aware model for sparse matrix-matrix multiplication on the Sunway TaihuLight Supercomputer. In: IEEE transactions on parallel and distributed systems, pp 1–15. https://doi.org/10.1109/tpds.2018.2871189 KimSKLeeJYangSBA social overlay-based forwarding scheme for mobile social networksWirel Netw20162272439245110.1007/s11276-015-1162-2 BatabyalSBhaumikPAnalysing social behaviour and message dissemination in human based delay tolerant networkWirel Netw201521251352910.1007/s11276-014-0790-2 Chen J, Li K, Bilal K et al (2018) A bi-layered parallel training architecture for large-scale convolutional neural networks. In: IEEE transactions on parallel and distributed systems, pp 1–12. https://doi.org/10.1109/tpds.2018.2877359 KimSKYoonJHLeeJJangGYYangSBA cooperative forwarding scheme for social preference-based selfishness in mobile social networksWirel Netw201522211610.1007/s11276-015-0984-2 HuXChuTHSLeungVCMNgaiCHKruchtenPChanHCBA survey on mobile social networks: applications, platforms, system architectures, and future research directionsIEEE Commun Surv Tutor20151731557158110.1109/COMST.2014.2371813 Bigwood G, Henderson T (2012) IRONMAN: using social networks to add incentives and reputation to opportunistic networks. In: IEEE third international conference on privacy, security, risk and trust, pp 65–72. https://doi.org/10.1109/passat/socialcom.2011.60 LuFLiJZhangXJiangSWangFWeighted community graph–based social routing in delay-tolerant networksInt J Distrib Sens Netw2017131211810.1177/1550147717749729 MemarmoshrefiPSeibelRHogrefeDAutonomous ant-based public key authentication mechanism for mobile ad hoc networksMobile Netw Appl201621114916010.1007/s11036-016-0703-y MeiAMorabitoGSantiPStefaJSocial-aware stateless routing in pocket switched networksIEEE Trans Parallel Distrib Syst201526125226110.1109/TPDS.2014.2307857 FengWYanZXieHAnonymous authentication on trust in pervasive social networking based on group signatureIEEE Access201756236624610.1109/ACCESS.2017.2679980 Kim S, Gerla M (2016) Socio-geo: social network routing protocol in delay tolerant networks. In: International conference on computing, pp 1–6. https://doi.org/10.1109/iccnc.2016.7923427 Moreira W, Mendes P, Sargento S (2012) Opportunistic routing based on daily routines. In: World of wireless, mobile and multimedia networks, pp 1–6. https://doi.org/10.1109/wowmom.2012.6263749 Halikul L, Mohamad A (2018) EpSoc: social-based epidemic-based routing protocol in opportunistic mobile social network. In: Mobile Information Systems, pp 1–8. https://doi.org/10.1155/2018/6462826 GuoHWangXChengHHuangMA location aided controlled spraying routing algorithm for delay tolerant networksAd Hoc Netw201766162510.1016/j.adhoc.2017.08.005 Penurkar MR, Deshpande UA (2016) Max-Util: a utility-based routing algorithm for a vehicular delay tolerant network using historical information. In: Proceedings of 3rd international conference on advanced computing, networking and informatics, Springer, India, pp 587–598. https://doi.org/10.1007/978-81-322-2529-4_61 GuoHWangXChengHHuangMA routing defense mechanism using evolutionary game theory for delay tolerant networksAppl Soft Comput20163846947610.1016/j.asoc.2015.10.019 LvJWangXHuangMShiJLiKLiJRISC: iCN routing mechanism incorporating SDN and community divisionComput Netw20171238810310.1016/j.comnet.2017.05.010 YaoLManYHuangZDengJWangXSecure routing based on social similarity in opportunistic networksIEEE Trans Wirel Commun201615159460510.1109/TWC.2015.2476466 Persia F, Daniela D (2017) A survey of online social networks: challenges and opportunities. In: IEEE international conference on information reuse and integration, pp 614–620. https://doi.org/10.1109/iri.2017.74 AxelNLeandroNCerdà-AlabernLEnabling individually entrusted routing security for open and decentralized community networksAd Hoc Netw201879204210.1016/j.adhoc.2018.06.014 Jing T, Liu Y, Huo Y, Wen Y (2017) Home-based multi-copy routing in mobile social networks. In: International conference on mobile ad-hoc and sensor networks, pp 284–289. https://doi.org/10.1109/msn.2016.052 Chen J, Li K, Bilal K et al (2018) Parallel protein community detection in large-scale PPI networks based on multi-source learning. In: IEEE/ACM transactions on computational biology and bioinformatics, pp 1–12. https://doi.org/10.1109/tcbb.2018.2868088 4167_CR7 4167_CR6 W Feng (4167_CR21) 2017; 5 4167_CR1 A Sánchez-Carmona (4167_CR24) 2016; 78 J Guan (4167_CR16) 2018; 114 4167_CR26 4167_CR28 4167_CR25 SK Kim (4167_CR9) 2016; 22 SK Kim (4167_CR17) 2015; 22 J Lv (4167_CR12) 2017; 123 L Yao (4167_CR18) 2016; 15 VRV Lakshmi (4167_CR3) 2017; 12 Q Xu (4167_CR33) 2017; 3 P Memarmoshrefi (4167_CR20) 2016; 21 S Batabyal (4167_CR31) 2015; 21 4167_CR10 H Guo (4167_CR19) 2017; 66 4167_CR32 H Guo (4167_CR15) 2016; 38 R Wang (4167_CR22) 2018; 8 A Mei (4167_CR8) 2015; 26 X Hu (4167_CR2) 2015; 17 T Qiu (4167_CR29) 2017; 55 J Chen (4167_CR27) 2017; 28 T Qiu (4167_CR4) 2017 4167_CR34 4167_CR11 4167_CR14 M Kawecki (4167_CR5) 2016; 2016 N Axel (4167_CR23) 2018; 79 J Shi (4167_CR30) 2017; 113 4167_CR35 F Lu (4167_CR13) 2017; 13 |
| References_xml | – reference: HuXChuTHSLeungVCMNgaiCHKruchtenPChanHCBA survey on mobile social networks: applications, platforms, system architectures, and future research directionsIEEE Commun Surv Tutor20151731557158110.1109/COMST.2014.2371813 – reference: Jing T, Liu Y, Huo Y, Wen Y (2017) Home-based multi-copy routing in mobile social networks. In: International conference on mobile ad-hoc and sensor networks, pp 284–289. https://doi.org/10.1109/msn.2016.052 – reference: Chen Y, Li K, Yang W et al (2018) Performance-aware model for sparse matrix-matrix multiplication on the Sunway TaihuLight Supercomputer. In: IEEE transactions on parallel and distributed systems, pp 1–15. https://doi.org/10.1109/tpds.2018.2871189 – reference: GuoHWangXChengHHuangMA location aided controlled spraying routing algorithm for delay tolerant networksAd Hoc Netw201766162510.1016/j.adhoc.2017.08.005 – reference: AxelNLeandroNCerdà-AlabernLEnabling individually entrusted routing security for open and decentralized community networksAd Hoc Netw201879204210.1016/j.adhoc.2018.06.014 – reference: Penurkar MR, Deshpande UA (2016) Max-Util: a utility-based routing algorithm for a vehicular delay tolerant network using historical information. In: Proceedings of 3rd international conference on advanced computing, networking and informatics, Springer, India, pp 587–598. https://doi.org/10.1007/978-81-322-2529-4_61 – reference: GuoHWangXChengHHuangMA routing defense mechanism using evolutionary game theory for delay tolerant networksAppl Soft Comput20163846947610.1016/j.asoc.2015.10.019 – reference: Liang H, Chen Z, Wu J, Guan P (2017) ETSW: an encounter history tree based routing protocol in opportunistic networks. In: National conference of theoretical computer science, Springer, Singapore, pp 46–59. https://doi.org/10.1007/978-981-10-6893-5_4 – reference: Persia F, Daniela D (2017) A survey of online social networks: challenges and opportunities. In: IEEE international conference on information reuse and integration, pp 614–620. https://doi.org/10.1109/iri.2017.74 – reference: KimSKLeeJYangSBA social overlay-based forwarding scheme for mobile social networksWirel Netw20162272439245110.1007/s11276-015-1162-2 – reference: FengWYanZXieHAnonymous authentication on trust in pervasive social networking based on group signatureIEEE Access201756236624610.1109/ACCESS.2017.2679980 – reference: LakshmiVRVGireeshKTMobile social networks: architecture, privacy, security issues and solutionsJ Commun.201712952453110.12720/jcm.12.9.524-531 – reference: MeiAMorabitoGSantiPStefaJSocial-aware stateless routing in pocket switched networksIEEE Trans Parallel Distrib Syst201526125226110.1109/TPDS.2014.2307857 – reference: KaweckiMSchoeneichROMobility-based routing algorithm in delay tolerant networksEurasip J Wirel Commun Netw2016201611910.1186/s13638-016-0578-4 – reference: Chen J, Li K, Bilal K et al (2018) Parallel protein community detection in large-scale PPI networks based on multi-source learning. In: IEEE/ACM transactions on computational biology and bioinformatics, pp 1–12. https://doi.org/10.1109/tcbb.2018.2868088 – reference: Bigwood G, Henderson T (2012) IRONMAN: using social networks to add incentives and reputation to opportunistic networks. In: IEEE third international conference on privacy, security, risk and trust, pp 65–72. https://doi.org/10.1109/passat/socialcom.2011.60 – reference: GuanJWeiZYouIGRBC-based network security functions placement scheme in SDS for 5G securityJ Netw Comput Appl2018114485610.1016/j.jnca.2018.03.013 – reference: LuFLiJZhangXJiangSWangFWeighted community graph–based social routing in delay-tolerant networksInt J Distrib Sens Netw2017131211810.1177/1550147717749729 – reference: YaoLManYHuangZDengJWangXSecure routing based on social similarity in opportunistic networksIEEE Trans Wirel Commun201615159460510.1109/TWC.2015.2476466 – reference: Moreira W, Mendes P, Sargento S (2012) Opportunistic routing based on daily routines. In: World of wireless, mobile and multimedia networks, pp 1–6. https://doi.org/10.1109/wowmom.2012.6263749 – reference: ChenJLiKTangZA parallel random forest algorithm for big data in a spark cloud computing environmentIEEE Trans Parallel Distrib Syst201728491993310.1109/TPDS.2016.2603511 – reference: Yang S, Wang X, Zhang S, Huang M (2018) Trust-based security routing mechanism in mobile social networks. In: 14th international conference on natural computation, fuzzy systems and knowledge discovery (ICNC-FSKD 2018), pp 1–6 – reference: Kim S, Gerla M (2016) Socio-geo: social network routing protocol in delay tolerant networks. In: International conference on computing, pp 1–6. https://doi.org/10.1109/iccnc.2016.7923427 – reference: ShiJWangXHuangMLiKDasSKSocial-based routing scheme for fixed-line VANETComput Netw Int J Comput Telecommun Netw201711323024310.1016/j.comnet.2016.12.016 – reference: QiuTChenBSangaiahAKMaJHuangRA survey of mobile social networks: applications, social characteristics, and challengesIEEE Syst J201710.1109/jsyst.2017.2764479 – reference: LvJWangXHuangMShiJLiKLiJRISC: iCN routing mechanism incorporating SDN and community divisionComput Netw20171238810310.1016/j.comnet.2017.05.010 – reference: WangRWangXHaoFZhangLLiuSWangLSocial identity–aware opportunistic routing in mobile social networksTrans Emerg Telecommun Technol2018811710.1002/ett.3297 – reference: QiuTChenNLiKHeterogeneous ad hoc networks: architectures, advances and challengesAd Hoc Netw20175514315210.1016/j.adhoc.2016.11.001 – reference: Sánchez-CarmonaARoblesSBorregoCPrivHab + : a secure geographic routing protocol for DTNComput Commun201678567310.1016/j.comcom.2015.10.002 – reference: XuQSuZZhangKRenPShenXSEpidemic information dissemination in mobile social networks with opportunistic linksIEEE Trans Emerg Top Comput20173339940910.1109/TETC.2015.2414792 – reference: BatabyalSBhaumikPAnalysing social behaviour and message dissemination in human based delay tolerant networkWirel Netw201521251352910.1007/s11276-014-0790-2 – reference: KimSKYoonJHLeeJJangGYYangSBA cooperative forwarding scheme for social preference-based selfishness in mobile social networksWirel Netw201522211610.1007/s11276-015-0984-2 – reference: MemarmoshrefiPSeibelRHogrefeDAutonomous ant-based public key authentication mechanism for mobile ad hoc networksMobile Netw Appl201621114916010.1007/s11036-016-0703-y – reference: Chen J, Li K, Bilal K et al (2018) A bi-layered parallel training architecture for large-scale convolutional neural networks. In: IEEE transactions on parallel and distributed systems, pp 1–12. https://doi.org/10.1109/tpds.2018.2877359 – reference: Halikul L, Mohamad A (2018) EpSoc: social-based epidemic-based routing protocol in opportunistic mobile social network. In: Mobile Information Systems, pp 1–8. https://doi.org/10.1155/2018/6462826 – ident: 4167_CR28 doi: 10.1109/tcbb.2018.2868088 – volume: 3 start-page: 399 issue: 3 year: 2017 ident: 4167_CR33 publication-title: IEEE Trans Emerg Top Comput doi: 10.1109/TETC.2015.2414792 – volume: 78 start-page: 56 year: 2016 ident: 4167_CR24 publication-title: Comput Commun doi: 10.1016/j.comcom.2015.10.002 – volume: 8 start-page: 1 year: 2018 ident: 4167_CR22 publication-title: Trans Emerg Telecommun Technol doi: 10.1002/ett.3297 – ident: 4167_CR32 doi: 10.1109/wowmom.2012.6263749 – ident: 4167_CR7 doi: 10.1007/978-981-10-6893-5_4 – ident: 4167_CR35 doi: 10.1109/FSKD.2018.8687173 – volume: 12 start-page: 524 issue: 9 year: 2017 ident: 4167_CR3 publication-title: J Commun. doi: 10.12720/jcm.12.9.524-531 – volume: 5 start-page: 6236 year: 2017 ident: 4167_CR21 publication-title: IEEE Access doi: 10.1109/ACCESS.2017.2679980 – volume: 55 start-page: 143 year: 2017 ident: 4167_CR29 publication-title: Ad Hoc Netw doi: 10.1016/j.adhoc.2016.11.001 – volume: 21 start-page: 149 issue: 1 year: 2016 ident: 4167_CR20 publication-title: Mobile Netw Appl doi: 10.1007/s11036-016-0703-y – volume: 38 start-page: 469 year: 2016 ident: 4167_CR15 publication-title: Appl Soft Comput doi: 10.1016/j.asoc.2015.10.019 – volume: 22 start-page: 1 issue: 2 year: 2015 ident: 4167_CR17 publication-title: Wirel Netw doi: 10.1007/s11276-015-0984-2 – ident: 4167_CR25 doi: 10.1109/tpds.2018.2877359 – volume: 123 start-page: 88 year: 2017 ident: 4167_CR12 publication-title: Comput Netw doi: 10.1016/j.comnet.2017.05.010 – ident: 4167_CR14 doi: 10.1109/msn.2016.052 – volume: 66 start-page: 16 year: 2017 ident: 4167_CR19 publication-title: Ad Hoc Netw doi: 10.1016/j.adhoc.2017.08.005 – volume: 2016 start-page: 1 issue: 1 year: 2016 ident: 4167_CR5 publication-title: Eurasip J Wirel Commun Netw doi: 10.1186/s13638-016-0578-4 – ident: 4167_CR34 doi: 10.1109/passat/socialcom.2011.60 – volume: 15 start-page: 594 issue: 1 year: 2016 ident: 4167_CR18 publication-title: IEEE Trans Wirel Commun doi: 10.1109/TWC.2015.2476466 – volume: 28 start-page: 919 issue: 4 year: 2017 ident: 4167_CR27 publication-title: IEEE Trans Parallel Distrib Syst doi: 10.1109/TPDS.2016.2603511 – volume: 114 start-page: 48 year: 2018 ident: 4167_CR16 publication-title: J Netw Comput Appl doi: 10.1016/j.jnca.2018.03.013 – ident: 4167_CR6 doi: 10.1007/978-81-322-2529-4_61 – ident: 4167_CR10 doi: 10.1155/2018/6462826 – volume: 113 start-page: 230 year: 2017 ident: 4167_CR30 publication-title: Comput Netw Int J Comput Telecommun Netw doi: 10.1016/j.comnet.2016.12.016 – volume: 21 start-page: 513 issue: 2 year: 2015 ident: 4167_CR31 publication-title: Wirel Netw doi: 10.1007/s11276-014-0790-2 – volume: 13 start-page: 1 issue: 12 year: 2017 ident: 4167_CR13 publication-title: Int J Distrib Sens Netw doi: 10.1177/1550147717749729 – year: 2017 ident: 4167_CR4 publication-title: IEEE Syst J doi: 10.1109/jsyst.2017.2764479 – volume: 26 start-page: 252 issue: 1 year: 2015 ident: 4167_CR8 publication-title: IEEE Trans Parallel Distrib Syst doi: 10.1109/TPDS.2014.2307857 – ident: 4167_CR26 doi: 10.1109/tpds.2018.2871189 – ident: 4167_CR1 doi: 10.1109/iri.2017.74 – ident: 4167_CR11 doi: 10.1109/iccnc.2016.7923427 – volume: 79 start-page: 20 year: 2018 ident: 4167_CR23 publication-title: Ad Hoc Netw doi: 10.1016/j.adhoc.2018.06.014 – volume: 17 start-page: 1557 issue: 3 year: 2015 ident: 4167_CR2 publication-title: IEEE Commun Surv Tutor doi: 10.1109/COMST.2014.2371813 – volume: 22 start-page: 2439 issue: 7 year: 2016 ident: 4167_CR9 publication-title: Wirel Netw doi: 10.1007/s11276-015-1162-2 |
| SSID | ssj0004685 |
| Score | 2.239782 |
| Snippet | Malicious and selfish behaviors represent a serious security threat against routing in mobile social networks (MSN). Due to MSN’s unique network... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 5609 |
| SubjectTerms | Advances in Parallel and Distributed Computing for Neural Computing Algorithms Artificial Intelligence Computational Biology/Bioinformatics Computational Science and Engineering Computer Science Computer simulation Data Mining and Knowledge Discovery Image Processing and Computer Vision Probability and Statistics in Computer Science Security Social networks Trustworthiness Wireless networks |
| SummonAdditionalLinks | – databaseName: SpringerLINK Contemporary 1997-Present dbid: RSV link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NS8MwFA86PXhxfuJ0Sg7eNNAmWdLeFFE8DcEpu5U0fYGB62TdPOyvN0nTTUUFPZamobzvl7z3fgidR9oGARIkEQWjhEsliBJgiGE0tqbBipEyHmxC9vvJcJg-hKawqql2b64kvaVeNru5E0yX-rrDfDete7GONnpu2ozL0R-fP3RDeiBOm7e4mh7OQqvM93t8dkerGPPLtaj3Nnft__3nDtoO0SW-rsVhF61BuYfaDXIDDoq8j64GrtWCOBdW4CpA2OHpZO6KoPEYXDvwqBrjUYnHk9waDlyfreOyrhqvDtDT3e3g5p4ELAWirZLNSC_XNhFOE-AgUqCgWV5EFFRcaMmUisA-Sss2SLhiFIQShucmTnMbwghDc3aIWuWkhCOEjejFUmqdFBx4kUKuNWVcmUhRoSBOOihuSJrpMGjc4V28ZMsRyZ5EmSVR5kmULTroYvnNaz1m49fV3YZTWVC5KqMsFW5yD-cddNlwZvX6592O_7b8BG1Rl3P7oscuas2mczhFm_ptNqqmZ14U3wE3mdmk priority: 102 providerName: Springer Nature |
| Title | Trust-based security routing mechanism in mobile social networks |
| URI | https://link.springer.com/article/10.1007/s00521-019-04167-z https://www.proquest.com/docview/2396578544 |
| Volume | 32 |
| WOSCitedRecordID | wos000529745200026&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVPQU databaseName: ProQuest advanced technologies & aerospace journals customDbUrl: eissn: 1433-3058 dateEnd: 20241213 omitProxy: false ssIdentifier: ssj0004685 issn: 0941-0643 databaseCode: P5Z dateStart: 20120101 isFulltext: true titleUrlDefault: https://search.proquest.com/hightechjournals providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 1433-3058 dateEnd: 20241213 omitProxy: false ssIdentifier: ssj0004685 issn: 0941-0643 databaseCode: BENPR dateStart: 20120101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVAVX databaseName: SpringerLink customDbUrl: eissn: 1433-3058 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0004685 issn: 0941-0643 databaseCode: RSV dateStart: 19970101 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV07b9swED6kcYcuefSBunEMDtkaohZJU9LUPOAgk2E4TmB0ESjqBBio5cRyOuTXl0dTdlogWbIIECQRAj_yeO8P4KRnnRIQY8x1IQVXsdHcaCx5KUXkRINbRqb0ZBPxcJhMp-koONzqkFbZyEQvqIuFJR_5DyFTTY1ZlPp5_8CJNYqiq4FC4x20qEsCUTeM-r-e1UV6Sk5nwVB2j5KhaMaXzpE_lAxpCg1Q7--nfw-mrbb5X4DUnztX-2_94wPYCxonO18vkUPYweoj7DdsDixs7k9wNqHyC07HWsHqQGvHlotHSoxmc6QS4Vk9Z7OKzRe5EyZs7W9n1TqTvP4Mt1eDyeU1D_wK3LqNt-L93DrjOE1QoU5RoJV50RNoosLG0pgeutvYQYmJMlKgNrpUeRmluVNrdCly-QV2q0WFX4GVuh_FsbVJoVAVKebWCqlM2TNCG4ySNkTN5GY2NB8nDozf2aZtsgckc4BkHpDsqQ3fN9_cr1tvvPp2p0EhC9uwzrYQtOG0wXH7-OXRvr0-2hF8EGR3-8THDuyulo94DO_tn9WsXnahdTEYjsZdvxjddXxz9xejIuXM |
| linkProvider | ProQuest |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1LT9wwEB5RqFQuhbYgtqXgQ3uiFontdZIDgoqHQNAVh0VCXILjTKSV2CzdLEXwo_ob8TgJWyqVG4ceo8SWnPk84_E8PoAvgXWHgAgjrnMpuIqM5kZjwQspQqcaHIxM4ckmol4vPj9PTmfgd1sLQ2mVrU70ijofWboj3xQy0dSYRant65-cWKMoutpSaNSwOMa7W-eyVVtHe06-X4U42O_vHvKGVYBbB7cJ72bWuYRJjAp1ggKtzPJAoAlzG0ljAnSPkVsAxspIgdroQmVFmGTOmOtCZNLN-wrmlBIBMSacdi_-qMP0FKDOY6JsIiWbIh1fqkf3r-S4UyiCeo3fPzWE09PtXwFZb-cOFv63P7QIb5sTNfteb4F3MIPle1ho2SpYo7w-wE6fyks4me2cVQ1tHxuPbijxmw2RSqAH1ZANSjYcZU5ZsjqewMo6U75agrMXWccyzJajEleAFbobRpG1ca5Q5Qlm1gqpTBEYoQ2GcQfCVpipbZqrE8fHVfrYFtoDIHUASD0A0vsObDyOua5bizz79Wor9bRRM1U6FXkHvrW4mb7-92wfn59tHd4c9n-cpCdHveNPMC_ojsEnea7C7GR8g5_htf01GVTjNb8BGFy-NJ4eAEx7Qew |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LS8NAEB58IV6sT6xW3YM3DTa7201yU9SiKKVold7CZjMLBZuWJnrw17ubR62igngM2SxhHjuPnW8G4KipjBPgoeeImFGHe1I4UqB2NKOuORqMGEmdD5vwOh2_3w-6Myj-vNq9upIsMA22S1OSnY5jfToFvtlspg2DbWLfdu5-m4dFbiIZW9R1__A0g4zMh3KaGMbW93BWwma-3-OzafrwN79ckeaWp137_z-vwWrpdZLzQkzWYQ6TDahVEx1IqeCbcNazEAzHmraYpOVoOzIZvdjiaDJECxMepEMySMhwFJkDhRQ5d5IU1eTpFjy2r3oX1045Y8FRRvkypxUpEyAHPnIUAVJULIqbFKUbK49J2UTz6Bl2os8loyik0DzSbhAZ10ZoGrFtWEhGCe4A0aLlep5SfsyRxwFGSlHGpW5KKiS6fh3ciryhKhuQ2zkYz-G0dXJOotCQKMxJFL7V4Xj6zbhov_Hr6kbFtbBUxTSkLBC2ow_ndTipuPTx-ufddv-2_BCWu5ft8O6mc7sHK9SG5XldZAMWsskL7sOSes0G6eQgl9B3Uz_lbA |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Trust-based+security+routing+mechanism+in+mobile+social+networks&rft.jtitle=Neural+computing+%26+applications&rft.au=Yang%2C+Shuang&rft.au=Wang%2C+Xingwei&rft.au=Zhang%2C+Shuang&rft.au=Yi%2C+Bo&rft.date=2020-05-01&rft.pub=Springer+Nature+B.V&rft.issn=0941-0643&rft.eissn=1433-3058&rft.volume=32&rft.issue=10&rft.spage=5609&rft.epage=5620&rft_id=info:doi/10.1007%2Fs00521-019-04167-z |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0941-0643&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0941-0643&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0941-0643&client=summon |