CrowdRouting: Trustworthy and customized cross-domain routing based on crowdsourcing☆

Jialei Zhang , Zheng Yan , Huidong Dong , Peng Zhang

›› 2025, Vol. 11 ›› Issue (3) : 734 -756.

PDF
›› 2025, Vol. 11 ›› Issue (3) : 734 -756. DOI: 10.1016/j.dcan.2024.11.008
Original article

CrowdRouting: Trustworthy and customized cross-domain routing based on crowdsourcing☆

Author information +
History +
PDF

Abstract

Cross-domain routing in Integrated Heterogeneous Networks (Inte-HetNet) should ensure efficient and secure data transmission across different network domains by satisfying diverse routing requirements. However, current solutions face numerous challenges in continuously ensuring trustworthy routing, fulfilling diverse requirements, achieving reasonable resource allocation, and safeguarding against malicious behaviors of network operators. We propose CrowdRouting, a novel cross-domain routing scheme based on crowdsourcing, dedicated to establishing sustained trust in cross-domain routing, comprehensively considering and fulfilling various customized routing requirements, while ensuring reasonable resource allocation and effectively curbing malicious behavior of network operators. Concretely, CrowdRouting employs blockchain technology to verify the trustworthiness of border routers in different network domains, thereby establishing sustainable and trustworthy cross-domain routing based on sustained trust in these routers. In addition, CrowdRouting ingeniously integrates a crowdsourcing mechanism into the auction for routing, achieving fair and impartial allocation of routing rights by flexibly embedding various customized routing requirements into each auction phase. Moreover, CrowdRouting leverages incentive mechanisms and routing settlement to encourage network domains to actively participate in cross-domain routing, thereby promoting optimal resource allocation and efficient utilization. Furthermore, CrowdRouting introduces a supervisory agency (e.g., undercover agent) to effectively suppress the malicious behavior of network operators through the game and interaction between the agent and the network operators. Through comprehensive experimental evaluations and comparisons with existing works, we demonstrate that CrowdRouting excels in providing trustworthy and fine-grained customized routing services, stimulating active participation in cross-domain routing, inhibiting malicious operator behavior, and maintaining reasonable resource allocation, all of which outperform baseline schemes.

Keywords

Trustworthy routing / Cross-domain routing / Customized routing / Crowdsourcing

Cite this article

Download citation ▾
Jialei Zhang, Zheng Yan, Huidong Dong, Peng Zhang. CrowdRouting: Trustworthy and customized cross-domain routing based on crowdsourcing☆. , 2025, 11(3): 734-756 DOI:10.1016/j.dcan.2024.11.008

登录浏览全文

4963

注册一个新账户 忘记密码

CRediT authorship contribution statement

Jialei Zhang: Writing - original draft, Validation, Software, Investigation. Zheng Yan: Writing - review & editing, Supervision, Resources, Project administration, Methodology, Investigation, Funding acquisition, Conceptualization. Huidong Dong: Validation, Software, Methodology, Investigation, Formal analysis, Data curation. Peng Zhang: Writing - review & editing, Investigation, Conceptualization.

Declaration of Competing Interest

There is no conflict of interest.

Acknowledgements

This work was supported in part by the National Natural Science Foundation of China under Grant U23A20300 and 62072351; in part by the Key Research Project of Shaanxi Natural Science Foundation under Grant 2023-JC-ZD-35, in part by the Concept Verification Funding of Hangzhou Institute of Technology of Xidian University under Grant GNYZ2024XX007, and in part by the 111 Project under Grant B16037.

References

[1]

C.X. Wang, X. You, X. Gao, X. Zhu, Z. Li, C. Zhang, H. Wang, Y. Huang, Y. Chen, H. Haas, J.S. Thompson, E.G. Larsson, M.D. Renzo, W. Tong, P. Zhu, X. Shen, H.V. Poor, L. Hanzo,On the road to 6g: visions, requirements, key technologies, and testbeds, IEEE Commun. Surv. Tutor. 25 (2) (2023) 905-974.

[2]

W. Saad, M. Bennis, M. Chen,A vision of 6g wireless systems: applications, trends, technologies, and open research problems, IEEE Netw. 34 (3) (2020) 134-142.

[3]

W. Jiang, B. Han, M.A. Habibi, H.D. Schotten,The road towards 6g: a comprehensive survey, IEEE Open J. Commun. Soc. 2 (2021) 334-366.

[4]

Y. Zhang, Y. Tian, W. Wang, P. Cong, C. Chen, D. Li, K. Xu,Federated routing scheme for large-scale cross domain network, in: IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS, 2020, pp. 1358-1359.

[5]

X. Xie, J. Zhang, Z. Yan, H. Wang, T. Li, Can routing be effectively learned in inte-grated heterogeneous networks?, IEEE Netw. 38 (1) (2024) 210-218.

[6]

P. Cong, Y. Zhang, L. Wang, H. Ni, W. Wang, X. Gong, T. Yang, D. Li, K. Xu,Break the blackbox! Desensitize intra-domain information for inter-domain routing, in:2022 IEEE/ACM 30th International Symposium on Quality of Service, IWQoS, 2022, pp. 1-10.

[7]

B. Zong, C. Fan, X. Wang, X. Duan, B. Wang, J. Wang, 6g technologies: key drivers, core requirements, system architectures, and enabling technologies, IEEE Veh. Tech-nol. Mag. 14 (3) (2019) 18-27.

[8]

Huawei, 6g, The next horizon, https://www-file.huawei.com/-/media/corp2020/pdf/tech-insights/1/6g-white-paper-en.pdf, 2023. (Accessed 11 November 2023).

[9]

G.D. Putra, V. Dedeoglu, S.S. Kanhere, R. Jurdak,Toward blockchain-based trust and reputation management for trustworthy 6g networks, IEEE Netw. 36 (4) (2022) 112-119.

[10]

L.A. Matti, L. Kari,Key drivers and research challenges for 6g ubiquitous wireless intelligence, http://jultika.oulu.fi/files/isbn9789526223544.pdf, 2023. (Accessed 9 September 2023).

[11]

ITU, Overview of trust provisioning for information and communication technol-ogy infrastructures and services, https://www.itu.int/rec/T-REC-Y.3052, 2023. (Ac-cessed 18 June 2023).

[12]

C. Zhang, X. Si, X. Zhu, Y. Zhang,A survey on the security of the metaverse, in: 2023 IEEE International Conference on Metaverse Computing, Networking and Applica-tions, MetaCom, 2023, pp. 428-432.

[13]

R. Kaviyaraj, M. Uma,A survey on future of augmented reality with ai in educa-tion, in:2021 International Conference on Artificial Intelligence and Smart Systems, ICAIS, 2021, pp. 47-52.

[14]

F. Yaraş, H. Kang, L. Onural, State of the art in holographic displays: a survey, J. Disp. Technol. 6 (10) (2010) 443-454.

[15]

M. Hashem Eiza, T. Owens, Q. Ni, Secure and robust multi-constrained qos aware routing algorithm for vanets, IEEE Trans. Dependable Secure Comput. 13 (1) (2016) 32-45.

[16]

T. Li, H. Zhou, H. Luo, S. Yu, Service: a software defined framework for integrated space-terrestrial satellite communication, IEEE Trans. Mob. Comput. 17 (3) (2018) 703-716.

[17]

M.M. Mahmoud, X. Lin, X. Shen, Secure and reliable routing protocols for heteroge-neous multihop wireless networks, IEEE Trans. Parallel Distrib. Syst. 26 (4) (2015) 1140-1153.

[18]

Y. Rekhter, T. Li, A border gateway protocol 4 (bgp-4), RFC 4271 ( 1994) 1-104.

[19]

S. Kent, C. Lynn, K. Seo, Secure border gateway protocol (s-bgp), IEEE J. Sel. Areas Commun. 18 (4) (2000) 582-592.

[20]

R. Bush, R. Austein, The resource public key infrastructure (rpki) to router protocol, version 1, RFC 8210 (2017) 1-35.

[21]

M. Wählisch, O. Maennel, T.C. Schmidt, Towards detecting bgp route hijacking using the rpki, SIGCOMM Comput. Commun. Rev. 42 (4) (2012) 103-104.

[22]

K. Phemius, M. Bouet, J. Leguay,Disco: distributed sdn controllers in a multi-domain environment, in: 2014 IEEE Network Operations and Management Symposium, NOMS, 2014, pp. 1-2.

[23]

X. Zhang, H.C. Hsiao, G. Hasker, H. Chan, A. Perrig, D.G. Andersen, Scion: scalability, control, and isolation on next-generation networks, in: 2011 IEEE Symposium on Security and Privacy, 2011, pp. 212-227.

[24]

Y.C. Wang, L.C. Yen,Collaborative route management to mitigate congestion in multi-domain networks using sdn, in:2022 IEEE 12th Annual Computing and Com-munication Workshop and Conference, CCWC, 2022, pp. 0988-0994.

[25]

K.D. Joshi, K. Kataoka,Prime-q: privacy aware end-to-end qos framework in multi-domain sdn, in: 2019 IEEE Conference on Network Softwarization, NetSoft, 2019, pp. 169-177.

[26]

Q. Chen, S. Shi, X. Li, C. Qian, S. Zhong, Sdn-based privacy preserving cross domain routing, IEEE Trans. Dependable Secure Comput. 16 (6) (2019) 930-943.

[27]

H. Owens, A. Durresi,Multi-domain video over software-defined networking (md-vsdn), in: 2017 IEEE 31st International Conference on Advanced Information Net-working and Applications, AINA, 2017, pp. 57-63.

[28]

P. Podili, K. Kataoka, Traqr: trust aware end-to-end qos routing in multi-domain sdn using blockchain, J. Netw. Comput. Appl. 182 (2021) 103055.

[29]

K. Guo, D. Wang, H. Zhi, Y. Lu, Z. Jiao, A trusted resource-based routing algo-rithm with entropy estimation in integrated space-terrestrial network, IEEE Access 8 (2020) 122456-122468.

[30]

H. Yang, Y. Liang, J. Yuan, Q. Yao, A. Yu, J. Zhang,Distributed blockchain-based trusted multidomain collaboration for mobile edge computing in 5g and beyond, IEEE Trans. Ind. Inform. 16 (11) (2020) 7094-7104.

[31]

G. He, W. Su, S. Gao, N. Liu, S.K. Das, Netchain: a blockchain-enabled privacy-preserving multi-domain network slice orchestration architecture, IEEE Trans. Netw. Serv. Manag. 19 (1) (2022) 188-202.

[32]

C. Liu, M. Xu, Y. Yang, N. Geng,Drl-or: deep reinforcement learning-based online routing for multi-type service requirements, in: IEEE INFOCOM 2021 - IEEE Confer-ence on Computer Communications, 2021, pp. 1-10.

[33]

L.M. Sanagavarapu, Y.R. Reddy,Crowdsourcing security - opportunities and chal-lenges, in:2018 IEEE/ACM 11th International Workshop on Cooperative and Human Aspects of Software Engineering, CHASE, 2018, pp. 37-40.

[34]

Y. Zhang, M. van der Schaar, Reputation-based incentive protocols in crowdsourcing applications, in: 2012 Proceedings IEEE INFOCOM, 2012, pp. 2140-2148.

[35]

M. Li, J. Weng, A. Yang, W. Lu, Y. Zhang, L. Hou, J.N. Liu, Y. Xiang, R.H. Deng, Crowdbc: a blockchain-based decentralized framework for crowdsourcing, IEEE Trans. Parallel Distrib. Syst. 30 (6) (2019) 1251-1266.

[36]

J. Zhang, Z. Yan, S. Fei, M. Wang, T. Li, H. Wang,Is today’s end-to-end communica-tion security enough for 5g and its beyond?, IEEE Netw. 36 (1) (2022) 105-112.

[37]

J. Zhang, Z. Yan, H. Wang, X. Liang, T. Li,Custrouting: trusted and customized routing in integrated heterogeneous networks, in: 2024 IEEE/CIC International Con-ference on Communications in China, ICCC, 2024, pp. 1662-1667.

[38]

S. Berger, R. Cáceres, K.A. Goldman, R. Perez, R. Sailer, L. van Doorn,vtpm: virtual-izing the trusted platform module,in:Proceedings of the 15th Conference on USENIX Security Symposium - Volume 15, USENIX-SS’06, USENIX Association, USA, 2006.

[39]

ITU T SG17, Framework of trust-level assessment for trustworthy network-ing, https://www.itu.int/md/T22-SG13-240304-TD-WP3-0508, 2024. (Accessed 13 March 2024).

[40]

E. Voit, Trusted path routing, https://datatracker.ietf.org/doc/draft-voit-rats-trusted-path-routing/02/, 2023. (Accessed 10 June 2023).

[41]

G. Xu, Y. Tang, Z. Yan, P. Zhang, Tim: a trust insurance mechanism for network func-tion virtualization based on trusted computing,in: Security, Privacy, and Anonymity in Computation, Communication, and Storage, Springer International Publishing, Cham, 2017, pp. 139-152.

[42]

Z. Yan, P. Cofta, A mechanism for trust sustainability among trusted computing plat-forms, in: Trust and Privacy in Digital Business, Springer Berlin Heidelberg, Berlin, Heidelberg, 2004, pp. 11-19.

[43]

H. Han, X. Jing, Z. Yan, W. Pedrycz, Extendedsketch+: super host identification and network host trust evaluation with memory efficiency and high accuracy, Inf. Fusion 92 ( 2023) 300-312.

[44]

J. Wang, Z. Yan, J. Lan, E. Bertino, W. Pedrycz, Trustguard: gnn-based robust and ex-plainable trust evaluation with dynamicity support, IEEE Trans. Dependable Secure Comput. 21 (5) (2024) 4433-4450.

[45]

J. Wang, X. Jing, Z. Yan, Y. Fu, W. Pedrycz, L.T. Yang, A survey on trust evaluation based on machine learning, ACM Comput. Surv. 53 (5) (2020) 1-36.

[46]

G. Liu, Z. Yan, W. Feng, X. Jing, Y. Chen, M. Atiquzzaman, Sedid: an sgx-enabled decentralized intrusion detection framework for network trust evaluation, Inf. Fusion 70 ( 2021) 100-114.

[47]

Z. Wang, S.C.S. Cheung, Y. Luo, Information-theoretic secure multi-party compu-tation with collusion deterrence, IEEE Trans. Inf. Forensics Secur. 12 (4) (2017) 980-995.

[48]

K. Akkarajitsakul, E. Hossain, D. Niyato, D.I. Kim, Game theoretic approaches for multiple access in wireless networks: a survey, IEEE Commun. Surv. Tutor. 13 (3) (2011) 372-395.

[49]

J. Zhang, X. Xie, Z. Yan, H. Wang, T. Li,Custtest: an effective testbed for testing cus-tomized routing in integrated heterogeneous networks, in: 2023 IEEE 29th Interna-tional Conference on Parallel and Distributed Systems, ICPADS, 2023, pp. 783-790.

[50]

L. Angrisani, P. Arpaia, F. Bonavolontà, A. Cioffi, Experimental test of ecdsa digital signature robustness from timing-lattice attack, in: 2020 IEEE International Instru-mentation and Measurement Technology Conference, I2MTC, 2020, pp. 1-6.

[51]

T.M. Hewa, Y. Hu, M. Liyanage, S.S. Kanhare, M. Ylianttila, Survey on blockchain-based smart contracts: technical aspects and future research, IEEE Access 9 (2021) 87643-87662.

[52]

R. Agrawal, J. Yang, H. Javaid,Efficient fpga-based ecdsa verification engine for per-missioned blockchains, in: 2022 IEEE 33rd International Conference on Application- Specific Systems, Architectures and Processors, ASAP, 2022, pp. 148-155.

AI Summary AI Mindmap
PDF

347

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/