Trust-based security routing mechanism in mobile social networks

Malicious and selfish behaviors represent a serious security threat against routing in mobile social networks (MSN). Due to MSN’s unique network characteristics, such as sociability, mobility and diversity, it is a challenge to design a misbehavior detection scheme in MSN. To improve the security in...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:Neural computing & applications Ročník 32; číslo 10; s. 5609 - 5620
Hlavní autori: Yang, Shuang, Wang, Xingwei, Zhang, Shuang, Yi, Bo, Huang, Min
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: London Springer London 01.05.2020
Springer Nature B.V
Predmet:
ISSN:0941-0643, 1433-3058
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract Malicious and selfish behaviors represent a serious security threat against routing in mobile social networks (MSN). Due to MSN’s unique network characteristics, such as sociability, mobility and diversity, it is a challenge to design a misbehavior detection scheme in MSN. To improve the security in MSN routing, a trust-based security routing mechanism is presented in this paper, i.e., a malicious behavior detection mechanism with identity verification scheme. The main idea is to introduce the behavior trust and the identity trust to guide the routing. Firstly, we judge a node’s behavior based on both comprehensive trust and social relationship strength. And then, we forward messages according to the different measurement within and outside the friend groups. We also propose a distributed key management scheme which can issue, verify or revoke certificates based on the evaluation of the social relationship strength. We further improve the efficiency of the proposed mechanism by verifying the identity trust of the node. The simulation results indicate that the proposed routing mechanism can lower the impact of malicious behavior of nodes effectively and it has greater security performance than some classical routing algorithms do.
AbstractList Malicious and selfish behaviors represent a serious security threat against routing in mobile social networks (MSN). Due to MSN’s unique network characteristics, such as sociability, mobility and diversity, it is a challenge to design a misbehavior detection scheme in MSN. To improve the security in MSN routing, a trust-based security routing mechanism is presented in this paper, i.e., a malicious behavior detection mechanism with identity verification scheme. The main idea is to introduce the behavior trust and the identity trust to guide the routing. Firstly, we judge a node’s behavior based on both comprehensive trust and social relationship strength. And then, we forward messages according to the different measurement within and outside the friend groups. We also propose a distributed key management scheme which can issue, verify or revoke certificates based on the evaluation of the social relationship strength. We further improve the efficiency of the proposed mechanism by verifying the identity trust of the node. The simulation results indicate that the proposed routing mechanism can lower the impact of malicious behavior of nodes effectively and it has greater security performance than some classical routing algorithms do.
Author Yang, Shuang
Zhang, Shuang
Wang, Xingwei
Yi, Bo
Huang, Min
Author_xml – sequence: 1
  givenname: Shuang
  surname: Yang
  fullname: Yang, Shuang
  organization: College of Computer Science and Engineering, Northeastern University
– sequence: 2
  givenname: Xingwei
  surname: Wang
  fullname: Wang, Xingwei
  email: wangxw@mail.neu.edu.cn
  organization: State Key Laboratory of Synthetical Automation for Process Industries, Northeastern University
– sequence: 3
  givenname: Shuang
  surname: Zhang
  fullname: Zhang, Shuang
  organization: College of Software, Northeastern University
– sequence: 4
  givenname: Bo
  surname: Yi
  fullname: Yi, Bo
  organization: College of Computer Science and Engineering, Northeastern University
– sequence: 5
  givenname: Min
  surname: Huang
  fullname: Huang, Min
  organization: College of Information Science and Engineering, Northeastern University
BookMark eNp9kN9LwzAQx4NMcJv-Az4VfK5emjRt35ThLxj4Mp9Dml1nZpvMJEW2v95qBcGHPR3HfT93x2dGJtZZJOSSwjUFKG4CQJ7RFGiVAqeiSA8nZEo5YymDvJyQKVR8GAvOzsgshC0AcFHmU3K78n2Iaa0CrpOAuvcm7hPv-mjsJulQvylrQpcYm3SuNi0mwWmj2sRi_HT-PZyT00a1AS9-65y8PtyvFk_p8uXxeXG3TDWjVUzzWnNRVSVyFBVmqFm9hgwVXeuCKQU4tAXkBZZcsQyFEg2vG1rVIJhosprNydW4d-fdR48hyq3rvR1OyoxVIi_KnPMhVY4p7V0IHhupTVTROBu9Mq2kIL99ydGXHHzJH1_yMKDZP3TnTaf8_jjERigMYbtB__fVEeoL-SaA9g
CitedBy_id crossref_primary_10_1007_s00521_022_07656_w
crossref_primary_10_3390_fi16020048
crossref_primary_10_1109_TNSE_2021_3139005
crossref_primary_10_1109_JSYST_2021_3071470
Cites_doi 10.1109/tcbb.2018.2868088
10.1109/TETC.2015.2414792
10.1016/j.comcom.2015.10.002
10.1002/ett.3297
10.1109/wowmom.2012.6263749
10.1007/978-981-10-6893-5_4
10.1109/FSKD.2018.8687173
10.12720/jcm.12.9.524-531
10.1109/ACCESS.2017.2679980
10.1016/j.adhoc.2016.11.001
10.1007/s11036-016-0703-y
10.1016/j.asoc.2015.10.019
10.1007/s11276-015-0984-2
10.1109/tpds.2018.2877359
10.1016/j.comnet.2017.05.010
10.1109/msn.2016.052
10.1016/j.adhoc.2017.08.005
10.1186/s13638-016-0578-4
10.1109/passat/socialcom.2011.60
10.1109/TWC.2015.2476466
10.1109/TPDS.2016.2603511
10.1016/j.jnca.2018.03.013
10.1007/978-81-322-2529-4_61
10.1155/2018/6462826
10.1016/j.comnet.2016.12.016
10.1007/s11276-014-0790-2
10.1177/1550147717749729
10.1109/jsyst.2017.2764479
10.1109/TPDS.2014.2307857
10.1109/tpds.2018.2871189
10.1109/iri.2017.74
10.1109/iccnc.2016.7923427
10.1016/j.adhoc.2018.06.014
10.1109/COMST.2014.2371813
10.1007/s11276-015-1162-2
ContentType Journal Article
Copyright Springer-Verlag London Ltd., part of Springer Nature 2019
Springer-Verlag London Ltd., part of Springer Nature 2019.
Copyright_xml – notice: Springer-Verlag London Ltd., part of Springer Nature 2019
– notice: Springer-Verlag London Ltd., part of Springer Nature 2019.
DBID AAYXX
CITATION
8FE
8FG
AFKRA
ARAPS
BENPR
BGLVJ
CCPQU
DWQXO
HCIFZ
P5Z
P62
PHGZM
PHGZT
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
DOI 10.1007/s00521-019-04167-z
DatabaseName CrossRef
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central UK/Ireland
Advanced Technologies & Computer Science Collection
ProQuest Central
Technology collection
ProQuest One Community College
ProQuest Central
SciTech Premium Collection
ProQuest advanced technologies & aerospace journals
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Databases
ProQuest One Academic (New)
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central China
DatabaseTitle CrossRef
Advanced Technologies & Aerospace Collection
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest One Academic Eastern Edition
SciTech Premium Collection
ProQuest One Community College
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Central China
ProQuest Central
Advanced Technologies & Aerospace Database
ProQuest One Applied & Life Sciences
ProQuest One Academic UKI Edition
ProQuest Central Korea
ProQuest Central (New)
ProQuest One Academic
ProQuest One Academic (New)
DatabaseTitleList
Advanced Technologies & Aerospace Collection
Database_xml – sequence: 1
  dbid: P5Z
  name: ProQuest advanced technologies & aerospace journals
  url: https://search.proquest.com/hightechjournals
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1433-3058
EndPage 5620
ExternalDocumentID 10_1007_s00521_019_04167_z
GrantInformation_xml – fundername: Major International (Regional) Joint Research Project of NSFC
  grantid: 71620107003
– fundername: National Natural Science Foundation of China
  grantid: 61572123
  funderid: http://dx.doi.org/10.13039/501100001809
– fundername: the Program for Liaoning Innovative Research Term in University
  grantid: LT2016007
– fundername: China National Funds for Distinguished Young Scientists
  grantid: 71325002
  funderid: http://dx.doi.org/10.13039/501100005153
– fundername: the MoE and China Mobile Joint Research Fund
  grantid: MCM20160201
GroupedDBID -4Z
-59
-5G
-BR
-EM
-Y2
-~C
.4S
.86
.DC
.VR
06D
0R~
0VY
123
1N0
1SB
2.D
203
28-
29N
2J2
2JN
2JY
2KG
2LR
2P1
2VQ
2~H
30V
4.4
406
408
409
40D
40E
53G
5QI
5VS
67Z
6NX
8FE
8FG
8TC
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AAOBN
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDBF
ABDZT
ABECU
ABFTD
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABLJU
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACHSB
ACHXU
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACSNA
ACUHS
ACZOJ
ADHHG
ADHIR
ADIMF
ADINQ
ADKNI
ADKPE
ADMLS
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFIE
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFEXP
AFGCZ
AFKRA
AFLOW
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARAPS
ARCSS
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
B-.
B0M
BA0
BBWZM
BDATZ
BENPR
BGLVJ
BGNMA
BSONS
CAG
CCPQU
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DU5
EAD
EAP
EBLON
EBS
ECS
EDO
EIOEI
EJD
EMI
EMK
EPL
ESBYG
EST
ESX
F5P
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNWQR
GQ6
GQ7
GQ8
GXS
H13
HCIFZ
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I-F
I09
IHE
IJ-
IKXTQ
ITM
IWAJR
IXC
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
KDC
KOV
KOW
LAS
LLZTM
M4Y
MA-
N2Q
N9A
NB0
NDZJH
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
OAM
P19
P2P
P62
P9O
PF0
PT4
PT5
QOK
QOS
R4E
R89
R9I
RHV
RIG
RNI
RNS
ROL
RPX
RSV
RZK
S16
S1Z
S26
S27
S28
S3B
SAP
SCJ
SCLPG
SCO
SDH
SDM
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TSG
TSK
TSV
TUC
TUS
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK8
YLTOR
Z45
Z5O
Z7R
Z7S
Z7V
Z7W
Z7X
Z7Y
Z7Z
Z81
Z83
Z86
Z88
Z8M
Z8N
Z8P
Z8Q
Z8R
Z8S
Z8T
Z8U
Z8W
Z92
ZMTXR
~8M
~EX
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ABRTQ
ACSTC
ADHKG
ADKFA
AEZWR
AFDZB
AFFHD
AFHIU
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
PHGZM
PHGZT
PQGLB
DWQXO
PKEHL
PQEST
PQQKQ
PQUKI
PRINS
ID FETCH-LOGICAL-c319t-5bc46998e4e69e2ec3bd02ea1dc73aa0ebd07057e84a32e6a6f4bf19b0636f2b3
IEDL.DBID P5Z
ISICitedReferencesCount 5
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000529745200026&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0941-0643
IngestDate Tue Nov 04 23:05:45 EST 2025
Sat Nov 29 02:59:12 EST 2025
Tue Nov 18 21:25:46 EST 2025
Fri Feb 21 02:35:54 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 10
Keywords Network security
Mobile social network
Routing mechanism
Trust value
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c319t-5bc46998e4e69e2ec3bd02ea1dc73aa0ebd07057e84a32e6a6f4bf19b0636f2b3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 2396578544
PQPubID 2043988
PageCount 12
ParticipantIDs proquest_journals_2396578544
crossref_citationtrail_10_1007_s00521_019_04167_z
crossref_primary_10_1007_s00521_019_04167_z
springer_journals_10_1007_s00521_019_04167_z
PublicationCentury 2000
PublicationDate 20200500
2020-5-00
20200501
PublicationDateYYYYMMDD 2020-05-01
PublicationDate_xml – month: 5
  year: 2020
  text: 20200500
PublicationDecade 2020
PublicationPlace London
PublicationPlace_xml – name: London
– name: Heidelberg
PublicationTitle Neural computing & applications
PublicationTitleAbbrev Neural Comput & Applic
PublicationYear 2020
Publisher Springer London
Springer Nature B.V
Publisher_xml – name: Springer London
– name: Springer Nature B.V
References QiuTChenBSangaiahAKMaJHuangRA survey of mobile social networks: applications, social characteristics, and challengesIEEE Syst J201710.1109/jsyst.2017.2764479
WangRWangXHaoFZhangLLiuSWangLSocial identity–aware opportunistic routing in mobile social networksTrans Emerg Telecommun Technol2018811710.1002/ett.3297
LakshmiVRVGireeshKTMobile social networks: architecture, privacy, security issues and solutionsJ Commun.201712952453110.12720/jcm.12.9.524-531
QiuTChenNLiKHeterogeneous ad hoc networks: architectures, advances and challengesAd Hoc Netw20175514315210.1016/j.adhoc.2016.11.001
ShiJWangXHuangMLiKDasSKSocial-based routing scheme for fixed-line VANETComput Netw Int J Comput Telecommun Netw201711323024310.1016/j.comnet.2016.12.016
GuanJWeiZYouIGRBC-based network security functions placement scheme in SDS for 5G securityJ Netw Comput Appl2018114485610.1016/j.jnca.2018.03.013
XuQSuZZhangKRenPShenXSEpidemic information dissemination in mobile social networks with opportunistic linksIEEE Trans Emerg Top Comput20173339940910.1109/TETC.2015.2414792
Yang S, Wang X, Zhang S, Huang M (2018) Trust-based security routing mechanism in mobile social networks. In: 14th international conference on natural computation, fuzzy systems and knowledge discovery (ICNC-FSKD 2018), pp 1–6
ChenJLiKTangZA parallel random forest algorithm for big data in a spark cloud computing environmentIEEE Trans Parallel Distrib Syst201728491993310.1109/TPDS.2016.2603511
Sánchez-CarmonaARoblesSBorregoCPrivHab + : a secure geographic routing protocol for DTNComput Commun201678567310.1016/j.comcom.2015.10.002
KaweckiMSchoeneichROMobility-based routing algorithm in delay tolerant networksEurasip J Wirel Commun Netw2016201611910.1186/s13638-016-0578-4
Liang H, Chen Z, Wu J, Guan P (2017) ETSW: an encounter history tree based routing protocol in opportunistic networks. In: National conference of theoretical computer science, Springer, Singapore, pp 46–59. https://doi.org/10.1007/978-981-10-6893-5_4
Chen Y, Li K, Yang W et al (2018) Performance-aware model for sparse matrix-matrix multiplication on the Sunway TaihuLight Supercomputer. In: IEEE transactions on parallel and distributed systems, pp 1–15. https://doi.org/10.1109/tpds.2018.2871189
KimSKLeeJYangSBA social overlay-based forwarding scheme for mobile social networksWirel Netw20162272439245110.1007/s11276-015-1162-2
BatabyalSBhaumikPAnalysing social behaviour and message dissemination in human based delay tolerant networkWirel Netw201521251352910.1007/s11276-014-0790-2
Chen J, Li K, Bilal K et al (2018) A bi-layered parallel training architecture for large-scale convolutional neural networks. In: IEEE transactions on parallel and distributed systems, pp 1–12. https://doi.org/10.1109/tpds.2018.2877359
KimSKYoonJHLeeJJangGYYangSBA cooperative forwarding scheme for social preference-based selfishness in mobile social networksWirel Netw201522211610.1007/s11276-015-0984-2
HuXChuTHSLeungVCMNgaiCHKruchtenPChanHCBA survey on mobile social networks: applications, platforms, system architectures, and future research directionsIEEE Commun Surv Tutor20151731557158110.1109/COMST.2014.2371813
Bigwood G, Henderson T (2012) IRONMAN: using social networks to add incentives and reputation to opportunistic networks. In: IEEE third international conference on privacy, security, risk and trust, pp 65–72. https://doi.org/10.1109/passat/socialcom.2011.60
LuFLiJZhangXJiangSWangFWeighted community graph–based social routing in delay-tolerant networksInt J Distrib Sens Netw2017131211810.1177/1550147717749729
MemarmoshrefiPSeibelRHogrefeDAutonomous ant-based public key authentication mechanism for mobile ad hoc networksMobile Netw Appl201621114916010.1007/s11036-016-0703-y
MeiAMorabitoGSantiPStefaJSocial-aware stateless routing in pocket switched networksIEEE Trans Parallel Distrib Syst201526125226110.1109/TPDS.2014.2307857
FengWYanZXieHAnonymous authentication on trust in pervasive social networking based on group signatureIEEE Access201756236624610.1109/ACCESS.2017.2679980
Kim S, Gerla M (2016) Socio-geo: social network routing protocol in delay tolerant networks. In: International conference on computing, pp 1–6. https://doi.org/10.1109/iccnc.2016.7923427
Moreira W, Mendes P, Sargento S (2012) Opportunistic routing based on daily routines. In: World of wireless, mobile and multimedia networks, pp 1–6. https://doi.org/10.1109/wowmom.2012.6263749
Halikul L, Mohamad A (2018) EpSoc: social-based epidemic-based routing protocol in opportunistic mobile social network. In: Mobile Information Systems, pp 1–8. https://doi.org/10.1155/2018/6462826
GuoHWangXChengHHuangMA location aided controlled spraying routing algorithm for delay tolerant networksAd Hoc Netw201766162510.1016/j.adhoc.2017.08.005
Penurkar MR, Deshpande UA (2016) Max-Util: a utility-based routing algorithm for a vehicular delay tolerant network using historical information. In: Proceedings of 3rd international conference on advanced computing, networking and informatics, Springer, India, pp 587–598. https://doi.org/10.1007/978-81-322-2529-4_61
GuoHWangXChengHHuangMA routing defense mechanism using evolutionary game theory for delay tolerant networksAppl Soft Comput20163846947610.1016/j.asoc.2015.10.019
LvJWangXHuangMShiJLiKLiJRISC: iCN routing mechanism incorporating SDN and community divisionComput Netw20171238810310.1016/j.comnet.2017.05.010
YaoLManYHuangZDengJWangXSecure routing based on social similarity in opportunistic networksIEEE Trans Wirel Commun201615159460510.1109/TWC.2015.2476466
Persia F, Daniela D (2017) A survey of online social networks: challenges and opportunities. In: IEEE international conference on information reuse and integration, pp 614–620. https://doi.org/10.1109/iri.2017.74
AxelNLeandroNCerdà-AlabernLEnabling individually entrusted routing security for open and decentralized community networksAd Hoc Netw201879204210.1016/j.adhoc.2018.06.014
Jing T, Liu Y, Huo Y, Wen Y (2017) Home-based multi-copy routing in mobile social networks. In: International conference on mobile ad-hoc and sensor networks, pp 284–289. https://doi.org/10.1109/msn.2016.052
Chen J, Li K, Bilal K et al (2018) Parallel protein community detection in large-scale PPI networks based on multi-source learning. In: IEEE/ACM transactions on computational biology and bioinformatics, pp 1–12. https://doi.org/10.1109/tcbb.2018.2868088
4167_CR7
4167_CR6
W Feng (4167_CR21) 2017; 5
4167_CR1
A Sánchez-Carmona (4167_CR24) 2016; 78
J Guan (4167_CR16) 2018; 114
4167_CR26
4167_CR28
4167_CR25
SK Kim (4167_CR9) 2016; 22
SK Kim (4167_CR17) 2015; 22
J Lv (4167_CR12) 2017; 123
L Yao (4167_CR18) 2016; 15
VRV Lakshmi (4167_CR3) 2017; 12
Q Xu (4167_CR33) 2017; 3
P Memarmoshrefi (4167_CR20) 2016; 21
S Batabyal (4167_CR31) 2015; 21
4167_CR10
H Guo (4167_CR19) 2017; 66
4167_CR32
H Guo (4167_CR15) 2016; 38
R Wang (4167_CR22) 2018; 8
A Mei (4167_CR8) 2015; 26
X Hu (4167_CR2) 2015; 17
T Qiu (4167_CR29) 2017; 55
J Chen (4167_CR27) 2017; 28
T Qiu (4167_CR4) 2017
4167_CR34
4167_CR11
4167_CR14
M Kawecki (4167_CR5) 2016; 2016
N Axel (4167_CR23) 2018; 79
J Shi (4167_CR30) 2017; 113
4167_CR35
F Lu (4167_CR13) 2017; 13
References_xml – reference: HuXChuTHSLeungVCMNgaiCHKruchtenPChanHCBA survey on mobile social networks: applications, platforms, system architectures, and future research directionsIEEE Commun Surv Tutor20151731557158110.1109/COMST.2014.2371813
– reference: Jing T, Liu Y, Huo Y, Wen Y (2017) Home-based multi-copy routing in mobile social networks. In: International conference on mobile ad-hoc and sensor networks, pp 284–289. https://doi.org/10.1109/msn.2016.052
– reference: Chen Y, Li K, Yang W et al (2018) Performance-aware model for sparse matrix-matrix multiplication on the Sunway TaihuLight Supercomputer. In: IEEE transactions on parallel and distributed systems, pp 1–15. https://doi.org/10.1109/tpds.2018.2871189
– reference: GuoHWangXChengHHuangMA location aided controlled spraying routing algorithm for delay tolerant networksAd Hoc Netw201766162510.1016/j.adhoc.2017.08.005
– reference: AxelNLeandroNCerdà-AlabernLEnabling individually entrusted routing security for open and decentralized community networksAd Hoc Netw201879204210.1016/j.adhoc.2018.06.014
– reference: Penurkar MR, Deshpande UA (2016) Max-Util: a utility-based routing algorithm for a vehicular delay tolerant network using historical information. In: Proceedings of 3rd international conference on advanced computing, networking and informatics, Springer, India, pp 587–598. https://doi.org/10.1007/978-81-322-2529-4_61
– reference: GuoHWangXChengHHuangMA routing defense mechanism using evolutionary game theory for delay tolerant networksAppl Soft Comput20163846947610.1016/j.asoc.2015.10.019
– reference: Liang H, Chen Z, Wu J, Guan P (2017) ETSW: an encounter history tree based routing protocol in opportunistic networks. In: National conference of theoretical computer science, Springer, Singapore, pp 46–59. https://doi.org/10.1007/978-981-10-6893-5_4
– reference: Persia F, Daniela D (2017) A survey of online social networks: challenges and opportunities. In: IEEE international conference on information reuse and integration, pp 614–620. https://doi.org/10.1109/iri.2017.74
– reference: KimSKLeeJYangSBA social overlay-based forwarding scheme for mobile social networksWirel Netw20162272439245110.1007/s11276-015-1162-2
– reference: FengWYanZXieHAnonymous authentication on trust in pervasive social networking based on group signatureIEEE Access201756236624610.1109/ACCESS.2017.2679980
– reference: LakshmiVRVGireeshKTMobile social networks: architecture, privacy, security issues and solutionsJ Commun.201712952453110.12720/jcm.12.9.524-531
– reference: MeiAMorabitoGSantiPStefaJSocial-aware stateless routing in pocket switched networksIEEE Trans Parallel Distrib Syst201526125226110.1109/TPDS.2014.2307857
– reference: KaweckiMSchoeneichROMobility-based routing algorithm in delay tolerant networksEurasip J Wirel Commun Netw2016201611910.1186/s13638-016-0578-4
– reference: Chen J, Li K, Bilal K et al (2018) Parallel protein community detection in large-scale PPI networks based on multi-source learning. In: IEEE/ACM transactions on computational biology and bioinformatics, pp 1–12. https://doi.org/10.1109/tcbb.2018.2868088
– reference: Bigwood G, Henderson T (2012) IRONMAN: using social networks to add incentives and reputation to opportunistic networks. In: IEEE third international conference on privacy, security, risk and trust, pp 65–72. https://doi.org/10.1109/passat/socialcom.2011.60
– reference: GuanJWeiZYouIGRBC-based network security functions placement scheme in SDS for 5G securityJ Netw Comput Appl2018114485610.1016/j.jnca.2018.03.013
– reference: LuFLiJZhangXJiangSWangFWeighted community graph–based social routing in delay-tolerant networksInt J Distrib Sens Netw2017131211810.1177/1550147717749729
– reference: YaoLManYHuangZDengJWangXSecure routing based on social similarity in opportunistic networksIEEE Trans Wirel Commun201615159460510.1109/TWC.2015.2476466
– reference: Moreira W, Mendes P, Sargento S (2012) Opportunistic routing based on daily routines. In: World of wireless, mobile and multimedia networks, pp 1–6. https://doi.org/10.1109/wowmom.2012.6263749
– reference: ChenJLiKTangZA parallel random forest algorithm for big data in a spark cloud computing environmentIEEE Trans Parallel Distrib Syst201728491993310.1109/TPDS.2016.2603511
– reference: Yang S, Wang X, Zhang S, Huang M (2018) Trust-based security routing mechanism in mobile social networks. In: 14th international conference on natural computation, fuzzy systems and knowledge discovery (ICNC-FSKD 2018), pp 1–6
– reference: Kim S, Gerla M (2016) Socio-geo: social network routing protocol in delay tolerant networks. In: International conference on computing, pp 1–6. https://doi.org/10.1109/iccnc.2016.7923427
– reference: ShiJWangXHuangMLiKDasSKSocial-based routing scheme for fixed-line VANETComput Netw Int J Comput Telecommun Netw201711323024310.1016/j.comnet.2016.12.016
– reference: QiuTChenBSangaiahAKMaJHuangRA survey of mobile social networks: applications, social characteristics, and challengesIEEE Syst J201710.1109/jsyst.2017.2764479
– reference: LvJWangXHuangMShiJLiKLiJRISC: iCN routing mechanism incorporating SDN and community divisionComput Netw20171238810310.1016/j.comnet.2017.05.010
– reference: WangRWangXHaoFZhangLLiuSWangLSocial identity–aware opportunistic routing in mobile social networksTrans Emerg Telecommun Technol2018811710.1002/ett.3297
– reference: QiuTChenNLiKHeterogeneous ad hoc networks: architectures, advances and challengesAd Hoc Netw20175514315210.1016/j.adhoc.2016.11.001
– reference: Sánchez-CarmonaARoblesSBorregoCPrivHab + : a secure geographic routing protocol for DTNComput Commun201678567310.1016/j.comcom.2015.10.002
– reference: XuQSuZZhangKRenPShenXSEpidemic information dissemination in mobile social networks with opportunistic linksIEEE Trans Emerg Top Comput20173339940910.1109/TETC.2015.2414792
– reference: BatabyalSBhaumikPAnalysing social behaviour and message dissemination in human based delay tolerant networkWirel Netw201521251352910.1007/s11276-014-0790-2
– reference: KimSKYoonJHLeeJJangGYYangSBA cooperative forwarding scheme for social preference-based selfishness in mobile social networksWirel Netw201522211610.1007/s11276-015-0984-2
– reference: MemarmoshrefiPSeibelRHogrefeDAutonomous ant-based public key authentication mechanism for mobile ad hoc networksMobile Netw Appl201621114916010.1007/s11036-016-0703-y
– reference: Chen J, Li K, Bilal K et al (2018) A bi-layered parallel training architecture for large-scale convolutional neural networks. In: IEEE transactions on parallel and distributed systems, pp 1–12. https://doi.org/10.1109/tpds.2018.2877359
– reference: Halikul L, Mohamad A (2018) EpSoc: social-based epidemic-based routing protocol in opportunistic mobile social network. In: Mobile Information Systems, pp 1–8. https://doi.org/10.1155/2018/6462826
– ident: 4167_CR28
  doi: 10.1109/tcbb.2018.2868088
– volume: 3
  start-page: 399
  issue: 3
  year: 2017
  ident: 4167_CR33
  publication-title: IEEE Trans Emerg Top Comput
  doi: 10.1109/TETC.2015.2414792
– volume: 78
  start-page: 56
  year: 2016
  ident: 4167_CR24
  publication-title: Comput Commun
  doi: 10.1016/j.comcom.2015.10.002
– volume: 8
  start-page: 1
  year: 2018
  ident: 4167_CR22
  publication-title: Trans Emerg Telecommun Technol
  doi: 10.1002/ett.3297
– ident: 4167_CR32
  doi: 10.1109/wowmom.2012.6263749
– ident: 4167_CR7
  doi: 10.1007/978-981-10-6893-5_4
– ident: 4167_CR35
  doi: 10.1109/FSKD.2018.8687173
– volume: 12
  start-page: 524
  issue: 9
  year: 2017
  ident: 4167_CR3
  publication-title: J Commun.
  doi: 10.12720/jcm.12.9.524-531
– volume: 5
  start-page: 6236
  year: 2017
  ident: 4167_CR21
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2017.2679980
– volume: 55
  start-page: 143
  year: 2017
  ident: 4167_CR29
  publication-title: Ad Hoc Netw
  doi: 10.1016/j.adhoc.2016.11.001
– volume: 21
  start-page: 149
  issue: 1
  year: 2016
  ident: 4167_CR20
  publication-title: Mobile Netw Appl
  doi: 10.1007/s11036-016-0703-y
– volume: 38
  start-page: 469
  year: 2016
  ident: 4167_CR15
  publication-title: Appl Soft Comput
  doi: 10.1016/j.asoc.2015.10.019
– volume: 22
  start-page: 1
  issue: 2
  year: 2015
  ident: 4167_CR17
  publication-title: Wirel Netw
  doi: 10.1007/s11276-015-0984-2
– ident: 4167_CR25
  doi: 10.1109/tpds.2018.2877359
– volume: 123
  start-page: 88
  year: 2017
  ident: 4167_CR12
  publication-title: Comput Netw
  doi: 10.1016/j.comnet.2017.05.010
– ident: 4167_CR14
  doi: 10.1109/msn.2016.052
– volume: 66
  start-page: 16
  year: 2017
  ident: 4167_CR19
  publication-title: Ad Hoc Netw
  doi: 10.1016/j.adhoc.2017.08.005
– volume: 2016
  start-page: 1
  issue: 1
  year: 2016
  ident: 4167_CR5
  publication-title: Eurasip J Wirel Commun Netw
  doi: 10.1186/s13638-016-0578-4
– ident: 4167_CR34
  doi: 10.1109/passat/socialcom.2011.60
– volume: 15
  start-page: 594
  issue: 1
  year: 2016
  ident: 4167_CR18
  publication-title: IEEE Trans Wirel Commun
  doi: 10.1109/TWC.2015.2476466
– volume: 28
  start-page: 919
  issue: 4
  year: 2017
  ident: 4167_CR27
  publication-title: IEEE Trans Parallel Distrib Syst
  doi: 10.1109/TPDS.2016.2603511
– volume: 114
  start-page: 48
  year: 2018
  ident: 4167_CR16
  publication-title: J Netw Comput Appl
  doi: 10.1016/j.jnca.2018.03.013
– ident: 4167_CR6
  doi: 10.1007/978-81-322-2529-4_61
– ident: 4167_CR10
  doi: 10.1155/2018/6462826
– volume: 113
  start-page: 230
  year: 2017
  ident: 4167_CR30
  publication-title: Comput Netw Int J Comput Telecommun Netw
  doi: 10.1016/j.comnet.2016.12.016
– volume: 21
  start-page: 513
  issue: 2
  year: 2015
  ident: 4167_CR31
  publication-title: Wirel Netw
  doi: 10.1007/s11276-014-0790-2
– volume: 13
  start-page: 1
  issue: 12
  year: 2017
  ident: 4167_CR13
  publication-title: Int J Distrib Sens Netw
  doi: 10.1177/1550147717749729
– year: 2017
  ident: 4167_CR4
  publication-title: IEEE Syst J
  doi: 10.1109/jsyst.2017.2764479
– volume: 26
  start-page: 252
  issue: 1
  year: 2015
  ident: 4167_CR8
  publication-title: IEEE Trans Parallel Distrib Syst
  doi: 10.1109/TPDS.2014.2307857
– ident: 4167_CR26
  doi: 10.1109/tpds.2018.2871189
– ident: 4167_CR1
  doi: 10.1109/iri.2017.74
– ident: 4167_CR11
  doi: 10.1109/iccnc.2016.7923427
– volume: 79
  start-page: 20
  year: 2018
  ident: 4167_CR23
  publication-title: Ad Hoc Netw
  doi: 10.1016/j.adhoc.2018.06.014
– volume: 17
  start-page: 1557
  issue: 3
  year: 2015
  ident: 4167_CR2
  publication-title: IEEE Commun Surv Tutor
  doi: 10.1109/COMST.2014.2371813
– volume: 22
  start-page: 2439
  issue: 7
  year: 2016
  ident: 4167_CR9
  publication-title: Wirel Netw
  doi: 10.1007/s11276-015-1162-2
SSID ssj0004685
Score 2.239782
Snippet Malicious and selfish behaviors represent a serious security threat against routing in mobile social networks (MSN). Due to MSN’s unique network...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 5609
SubjectTerms Advances in Parallel and Distributed Computing for Neural Computing
Algorithms
Artificial Intelligence
Computational Biology/Bioinformatics
Computational Science and Engineering
Computer Science
Computer simulation
Data Mining and Knowledge Discovery
Image Processing and Computer Vision
Probability and Statistics in Computer Science
Security
Social networks
Trustworthiness
Wireless networks
SummonAdditionalLinks – databaseName: SpringerLINK Contemporary 1997-Present
  dbid: RSV
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NS8MwFA86PXhxfuJ0Sg7eNNAmWdLeFFE8DcEpu5U0fYGB62TdPOyvN0nTTUUFPZamobzvl7z3fgidR9oGARIkEQWjhEsliBJgiGE0tqbBipEyHmxC9vvJcJg-hKawqql2b64kvaVeNru5E0yX-rrDfDete7GONnpu2ozL0R-fP3RDeiBOm7e4mh7OQqvM93t8dkerGPPLtaj3Nnft__3nDtoO0SW-rsVhF61BuYfaDXIDDoq8j64GrtWCOBdW4CpA2OHpZO6KoPEYXDvwqBrjUYnHk9waDlyfreOyrhqvDtDT3e3g5p4ELAWirZLNSC_XNhFOE-AgUqCgWV5EFFRcaMmUisA-Sss2SLhiFIQShucmTnMbwghDc3aIWuWkhCOEjejFUmqdFBx4kUKuNWVcmUhRoSBOOihuSJrpMGjc4V28ZMsRyZ5EmSVR5kmULTroYvnNaz1m49fV3YZTWVC5KqMsFW5yD-cddNlwZvX6592O_7b8BG1Rl3P7oscuas2mczhFm_ptNqqmZ14U3wE3mdmk
  priority: 102
  providerName: Springer Nature
Title Trust-based security routing mechanism in mobile social networks
URI https://link.springer.com/article/10.1007/s00521-019-04167-z
https://www.proquest.com/docview/2396578544
Volume 32
WOSCitedRecordID wos000529745200026&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVPQU
  databaseName: ProQuest advanced technologies & aerospace journals
  customDbUrl:
  eissn: 1433-3058
  dateEnd: 20241213
  omitProxy: false
  ssIdentifier: ssj0004685
  issn: 0941-0643
  databaseCode: P5Z
  dateStart: 20120101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/hightechjournals
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 1433-3058
  dateEnd: 20241213
  omitProxy: false
  ssIdentifier: ssj0004685
  issn: 0941-0643
  databaseCode: BENPR
  dateStart: 20120101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVAVX
  databaseName: SpringerLink
  customDbUrl:
  eissn: 1433-3058
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0004685
  issn: 0941-0643
  databaseCode: RSV
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV07b9swED6kcYcuefSBunEMDtkaohZJU9LUPOAgk2E4TmB0ESjqBBio5cRyOuTXl0dTdlogWbIIECQRAj_yeO8P4KRnnRIQY8x1IQVXsdHcaCx5KUXkRINbRqb0ZBPxcJhMp-koONzqkFbZyEQvqIuFJR_5DyFTTY1ZlPp5_8CJNYqiq4FC4x20qEsCUTeM-r-e1UV6Sk5nwVB2j5KhaMaXzpE_lAxpCg1Q7--nfw-mrbb5X4DUnztX-2_94wPYCxonO18vkUPYweoj7DdsDixs7k9wNqHyC07HWsHqQGvHlotHSoxmc6QS4Vk9Z7OKzRe5EyZs7W9n1TqTvP4Mt1eDyeU1D_wK3LqNt-L93DrjOE1QoU5RoJV50RNoosLG0pgeutvYQYmJMlKgNrpUeRmluVNrdCly-QV2q0WFX4GVuh_FsbVJoVAVKebWCqlM2TNCG4ySNkTN5GY2NB8nDozf2aZtsgckc4BkHpDsqQ3fN9_cr1tvvPp2p0EhC9uwzrYQtOG0wXH7-OXRvr0-2hF8EGR3-8THDuyulo94DO_tn9WsXnahdTEYjsZdvxjddXxz9xejIuXM
linkProvider ProQuest
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1LT9wwEB5RqFQuhbYgtqXgQ3uiFontdZIDgoqHQNAVh0VCXILjTKSV2CzdLEXwo_ob8TgJWyqVG4ceo8SWnPk84_E8PoAvgXWHgAgjrnMpuIqM5kZjwQspQqcaHIxM4ckmol4vPj9PTmfgd1sLQ2mVrU70ijofWboj3xQy0dSYRant65-cWKMoutpSaNSwOMa7W-eyVVtHe06-X4U42O_vHvKGVYBbB7cJ72bWuYRJjAp1ggKtzPJAoAlzG0ljAnSPkVsAxspIgdroQmVFmGTOmOtCZNLN-wrmlBIBMSacdi_-qMP0FKDOY6JsIiWbIh1fqkf3r-S4UyiCeo3fPzWE09PtXwFZb-cOFv63P7QIb5sTNfteb4F3MIPle1ho2SpYo7w-wE6fyks4me2cVQ1tHxuPbijxmw2RSqAH1ZANSjYcZU5ZsjqewMo6U75agrMXWccyzJajEleAFbobRpG1ca5Q5Qlm1gqpTBEYoQ2GcQfCVpipbZqrE8fHVfrYFtoDIHUASD0A0vsObDyOua5bizz79Wor9bRRM1U6FXkHvrW4mb7-92wfn59tHd4c9n-cpCdHveNPMC_ojsEnea7C7GR8g5_htf01GVTjNb8BGFy-NJ4eAEx7Qew
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LS8NAEB58IV6sT6xW3YM3DTa7201yU9SiKKVold7CZjMLBZuWJnrw17ubR62igngM2SxhHjuPnW8G4KipjBPgoeeImFGHe1I4UqB2NKOuORqMGEmdD5vwOh2_3w-6Myj-vNq9upIsMA22S1OSnY5jfToFvtlspg2DbWLfdu5-m4dFbiIZW9R1__A0g4zMh3KaGMbW93BWwma-3-OzafrwN79ckeaWp137_z-vwWrpdZLzQkzWYQ6TDahVEx1IqeCbcNazEAzHmraYpOVoOzIZvdjiaDJECxMepEMySMhwFJkDhRQ5d5IU1eTpFjy2r3oX1045Y8FRRvkypxUpEyAHPnIUAVJULIqbFKUbK49J2UTz6Bl2os8loyik0DzSbhAZ10ZoGrFtWEhGCe4A0aLlep5SfsyRxwFGSlHGpW5KKiS6fh3ciryhKhuQ2zkYz-G0dXJOotCQKMxJFL7V4Xj6zbhov_Hr6kbFtbBUxTSkLBC2ow_ndTipuPTx-ufddv-2_BCWu5ft8O6mc7sHK9SG5XldZAMWsskL7sOSes0G6eQgl9B3Uz_lbA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Trust-based+security+routing+mechanism+in+mobile+social+networks&rft.jtitle=Neural+computing+%26+applications&rft.au=Yang%2C+Shuang&rft.au=Wang%2C+Xingwei&rft.au=Zhang%2C+Shuang&rft.au=Yi%2C+Bo&rft.date=2020-05-01&rft.pub=Springer+Nature+B.V&rft.issn=0941-0643&rft.eissn=1433-3058&rft.volume=32&rft.issue=10&rft.spage=5609&rft.epage=5620&rft_id=info:doi/10.1007%2Fs00521-019-04167-z
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0941-0643&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0941-0643&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0941-0643&client=summon