Opportunistic networks are new wireless ad hoc networks that can solve the problem of intermittent connections and long delays in wireless networks,and have a wide application prospect.This technology solves the problem of intermittent connection and long delay in wireless networks,and has a very broad application prospect.The opportunistic networks use the "storage-carry-forward" transmission method to communicate and the message transmission in the network depends on cooperative forwarding between nodes.However,due to the openness and flexibility of the opportunistic networks,there may be some nodes that do not participate in network collaboration.These nodes are able to intercept and discard messages on the network.Nodes collude with each other in order to hide malicious behavior.The non-cooperative behavior of nodes causes a dramatic drop in network performance.Designing a secure route against malicious attacks is very important.This paper introduces the basic concept,structure,application and ONE simulation platform of the opportunistic networks.The security routes for non-collusion attacks and collusion attacks in the opportunistic networks are summarized,and the performance of various strategies is analyzed.Aiming at the lack of effective detection and defense schemes for non-conspiracy gray hole attacks in existing opportunistic network routing protocols,a secure routing based on node encounter records is proposed.In this protocol,the node encounter records are used to quantify the trust value,and at the same time,the malicious behavior is detected.The forwarding capability of the integrated node,blacklist,and the trust value are forwarded.The simulation results show that the protocol can effectively identify malicious nodes,suppress gray hole attacks and ensure network security.Aiming at the problem that malicious nodes in the opportunistic networks cooperate to hide malicious behavior,a secure route for collusion attacks is proposed.Analyze the characteristics of malicious node collusion behavior and design a collusion detection mechanism.In the case of eliminating collusion node interference,the encounter behavior is analyzed using the encounter record.The weighted average method is used to synthesize the direct trust value and the indirect trust value,comprehensively evaluate the trust degree to the node,and maintain the node blacklist.The node forwarding capability and the blacklist are combined to make routing decisions,and the malicious nodes in the network are shielded.The simulation results show that the protocol can effectively resist collusion attacks and guarantee the performance of the opportunistic network. |