Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Towards a novel trust-based opportunistic routing protocol for wireless networks
Salehi M., Boukerche A., Darehshoorzadeh A., Mammeri A. Wireless Networks22 (3):927-943,2016.Type:Article
Date Reviewed: Jul 12 2016

Routing in an ad hoc wireless network is a very important topic, especially considering the presence of malicious nodes. The authors propose a novel trust-based opportunistic routing protocol. A simulation is implemented and three metrics (RTOR, TORDP, and GEOTOR) are evaluated when considering next hop selection. The evaluation shows that all three proposed metrics performed better than the baseline for hop count, end-to-end delay, and packet delivery rate.

The paper is easy to read and the proposed protocol is simple. The three metrics are straightforward to understand. However, some parts of the paper are lacking in details. The attacker’s role is to act as a black hole and drop packets. This is too simplistic of an adversary model. A real attacker would try to collude--“bad mouth”--honest nodes to trick other nodes into giving them a low trust value, and change behavior so that their trust level does not fall too low. On a related note, the simulation performed is too simple. Varying the delivery probability is more realistic. In addition, a more detailed description of the watchdog mechanism is needed. The authors claim it is a “well-known approach” without giving any reference. There are also some grammatical mistakes throughout the paper.

Overall, the paper is easy to read and tackles an important topic, but lacks details on the trust-based protocol, realistic simulations, and attacker model.

Reviewer:  Eric Chan-Tin Review #: CR144573 (1610-0760)
Bookmark and Share
 
Network Protocols (C.2.2 )
 
 
Wireless Communication (C.2.1 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Network Protocols": Date
An implementation of an automated protocol synthesizer (APS) and its application to the X.21 protocol
Ramamoorthy C. (ed), Dong S., Usuda Y. IEEE Transactions on Software Engineering SE-11(9): 886-908, 1985. Type: Article
Apr 1 1986
From state machines to temporal logic: specification methods for protocol standards
Schwartz R., Melliar-Smith P.  The analysis of concurrent systems (, Cambridge,651985. Type: Proceedings
Aug 1 1986
Reaching approximate agreement in the presence of faults
Dolev D., Lynch N., Pinter S., Stark E., Weihl W. Journal of the ACM 33(3): 499-516, 1986. Type: Article
Aug 1 1988
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy