{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:13:15Z","timestamp":1773155595053,"version":"3.50.1"},"reference-count":24,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2025,1,29]],"date-time":"2025-01-29T00:00:00Z","timestamp":1738108800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"European Union","award":["101138678"],"award-info":[{"award-number":["101138678"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers"],"abstract":"<jats:p>Packet routing in computer networks provides complex challenges in environments with distrustful routers due to security vulnerabilities or potential malicious behaviors. The literature offers solutions to the problem designed for different types of networks. This paper introduces a novel method to mitigate risks associated with distrustful routers by constructing secure and efficient routing paths in Open Shortest Path First (OSPF) networks. Networks in which routing is carried out based on OSPF protocols are currently the most widespread, hence ensuring the security of data transmission in such networks is urgently needed. In turn, distrustful routers can degrade the overall security and performance of the network, creating vulnerabilities that can be used for malicious purposes. The proposed method is based on the Dijkstra algorithm which is enhanced to identify and mitigate the risk connected with potential distrustful network nodes. Analysis of the proposed method shows its ability to build efficient routes exclusively through trusted routers if such paths exist. As a criterion for effectiveness, a metric such as the channel weight is used. The proposed method is validated using applications across networks of varying topologies and sizes, including large-scale networks. For networks containing post-distrustful routers to which there is no path without distrustful nodes, the proposed method is able to build the shortest paths that are marked as not secure but have a minimum number of distrustful nodes on their path. In scenarios with multiple compromised routers with different locations in the network, the proposed method significantly increases network resilience.<\/jats:p>","DOI":"10.3390\/computers14020043","type":"journal-article","created":{"date-parts":[[2025,1,29]],"date-time":"2025-01-29T11:10:39Z","timestamp":1738149039000},"page":"43","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Mitigation of Risks Associated with Distrustful Routers in OSPF Networks\u2014An Enhanced Method"],"prefix":"10.3390","volume":"14","author":[{"given":"Kvitoslava","family":"Obelovska","sequence":"first","affiliation":[{"name":"Department of Automated Control Systems, Lviv Polytechnic National University, 79013 Lviv, Ukraine"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9403-824X","authenticated-orcid":false,"given":"Yaromyr","family":"Snaichuk","sequence":"additional","affiliation":[{"name":"Department of Automated Control Systems, Lviv Polytechnic National University, 79013 Lviv, Ukraine"}]},{"given":"Oleh","family":"Liskevych","sequence":"additional","affiliation":[{"name":"Department of Automated Control Systems, Lviv Polytechnic National University, 79013 Lviv, Ukraine"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7201-2703","authenticated-orcid":false,"given":"Stergios-Aristoteles","family":"Mitoulis","sequence":"additional","affiliation":[{"name":"Department of Civil Engineering, School of Engineering, University of Birmingham, Birmingham B15 2FG, UK"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-1335-4436","authenticated-orcid":false,"given":"Rostyslav","family":"Liskevych","sequence":"additional","affiliation":[{"name":"Interregional Academy of Personnel Management, Frometivska Str., 2, 03039 Kyiv, Ukraine"},{"name":"Ukrainian Industrial Telecommunications LLC, Smal-Stotskogo Str., 1, 79018 Lviv, Ukraine"}]}],"member":"1968","published-online":{"date-parts":[[2025,1,29]]},"reference":[{"key":"ref_1","first-page":"67","article-title":"Comparative performance evaluation of RIP with OSPF routing protocol","volume":"5","author":"Yau","year":"2021","journal-title":"J. Appl. Technol. Innov."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"AbuSalim, S.W., Ibrahim, R., Saringat, M.Z., Jamel, S., and Wahab, J.A. (2020). Comparative analysis between dijkstra and bellman-ford algorithms in shortest path optimization. IOP Conference Series: Materials Science and Engineering, IOP Publishing.","DOI":"10.1088\/1757-899X\/917\/1\/012077"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"103384","DOI":"10.1016\/j.cose.2023.103384","article-title":"Detecting compromised IoT devices: Existing techniques, challenges, and a way forward","volume":"132","author":"Makhdoom","year":"2023","journal-title":"Comput. Secur."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Yilmaz, S., and Dener, M. (2024). Security with Wireless Sensor Networks in Smart Grids: A Review. Symmetry, 16.","DOI":"10.3390\/sym16101295"},{"key":"ref_5","first-page":"226","article-title":"Malicious Nodes Detection and Avoidance Using Trust-based Routing in Critical Data Handling Wireless Sensor Network Applications","volume":"14","author":"Sreevidya","year":"2024","journal-title":"J. Internet Serv. Inf. Secur."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"15711","DOI":"10.48084\/etasr.7633","article-title":"A Secure Framework based On Hybrid Cryptographic Scheme and Trusted Routing to Enhance the QoS of a WSN","volume":"14","author":"Sirajuddin","year":"2024","journal-title":"Eng. Technol. Appl. Sci. Res."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1504\/IJICA.2021.113750","article-title":"TASRP: A trust aware secure routing protocol for wireless sensor networks","volume":"12","author":"Khan","year":"2021","journal-title":"Int. J. Innov. Comput. Appl."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"103387","DOI":"10.1016\/j.adhoc.2023.103387","article-title":"RTRV: An RSU-assisted trust-based routing protocol for VANETs","volume":"154","author":"Azizi","year":"2024","journal-title":"Ad Hoc Netw."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"103062","DOI":"10.1016\/j.adhoc.2022.103062","article-title":"TGRV: A trust-based geographic routing protocol for VANETs","volume":"140","author":"Shokrollahi","year":"2023","journal-title":"Ad Hoc Netw."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"2309","DOI":"10.1016\/j.procs.2023.01.206","article-title":"Machine learning and trust based AODV routing protocol to mitigate flooding and blackhole attacks in MANET","volume":"218","author":"Shafi","year":"2023","journal-title":"Procedia Comput. Sci."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"181149","DOI":"10.1109\/ACCESS.2024.3505236","article-title":"Enhancing MANET Security Through Federated Learning and Multiobjective Optimization: A Trust-aware Routing Framework","volume":"12","author":"Hassan","year":"2024","journal-title":"IEEE Access"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"2775","DOI":"10.32604\/csse.2023.029345","article-title":"Hybrid Trust Based Reputation Mechanism for Discovering Malevolent Node in MANET","volume":"44","author":"Pari","year":"2023","journal-title":"Comput. Syst. Sci. Eng."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Hussain, M.Z., and Hanapi, Z.M. (2023). Efficient secure routing mechanisms for the low-powered IoT network: A literature review. Electronics, 12.","DOI":"10.3390\/electronics12030482"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"567","DOI":"10.3390\/network4040028","article-title":"Secured Real-Time Machine Communication Protocol","volume":"4","author":"Ren","year":"2024","journal-title":"Network"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Krishnamoorthy, V.K., Izonin, I., Subramanian, S., Shandilya, S.K., Velayutham, S., Munichamy, T.R., and Havryliuk, M. (2023). Energy Saving Optimization Technique-Based Routing Protocol in Mobile Ad-Hoc Network with IoT Environment. Energies, 16.","DOI":"10.3390\/en16031385"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Rui, K., Pan, H., and Shu, S. (2023). Secure routing in the Internet of Things (IoT) with intrusion detection capability based on software-defined networking (SDN) and Machine Learning techniques. Sci. Rep., 13.","DOI":"10.1038\/s41598-023-44764-6"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Aletri, O.Z., Awan, K.A., and Alqahtani, A.M. (2025). Trust-Centric and Economically Optimized Resource Management for 6G-Enabled Internet of Things Environment. Computers, 14.","DOI":"10.3390\/computers14010010"},{"key":"ref_18","first-page":"1","article-title":"Cybersecurity Policy Compliance: Navigating GDPR in Network Security Architectures","volume":"7","author":"Sukhvinder","year":"2024","journal-title":"Netw. Secur."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"1904","DOI":"10.1007\/s12555-021-0368-6","article-title":"Modeling of Operation of Information System for Critical Use in the Conditions of Influence of a Complex Certain Negative Factor","volume":"20","author":"Bisikalo","year":"2022","journal-title":"Int. J. Control Autom. Syst."},{"key":"ref_20","unstructured":"Alkhdour, T., Almaiah, M.A., Ali, A., Al-Ali, R.O.M.E.L., Tin, T.T., and Aldahyani, T. (2024). Improving secure routing in IoMT: Enhanced blockchain cybersecurity scheme using Hyperledger Fabric. J. Theor. Appl. Inf. Technol., 102."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Kovtun, V., Izonin, I., and Gregus, M. (2022). Reliability model of the security subsystem countering to the impact of typed cyber-physical attacks. Sci. Rep., 12.","DOI":"10.1038\/s41598-022-17254-4"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Obelovska, K., Tkachuk, O., and Snaichuk, Y. (2024). Minimizing the Number of Distrustful Nodes on the Path of IP Packet Transmission. Computation, 12.","DOI":"10.3390\/computation12050091"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Gregus, M., Liskevych, O., Obelovska, K., and Panchyshyn, R. (2019, January 26\u201328). Packet Routing Based on Integral Normalized Criterion. Proceedings of the 2019 7th International Conference on Future Internet of Things and Cloud (FiCloud), Istanbul, Turkey.","DOI":"10.1109\/FiCloud.2019.00064"},{"key":"ref_24","first-page":"432","article-title":"An Approach Toward Packet Routing in the OSPF-Based Network with a Distrustful Router","volume":"20","author":"Obelovska","year":"2023","journal-title":"Wseas Trans. Inf. Sci. Appl."}],"container-title":["Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-431X\/14\/2\/43\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T10:38:32Z","timestamp":1759919912000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-431X\/14\/2\/43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,29]]},"references-count":24,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025,2]]}},"alternative-id":["computers14020043"],"URL":"https:\/\/doi.org\/10.3390\/computers14020043","relation":{},"ISSN":["2073-431X"],"issn-type":[{"value":"2073-431X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,29]]}}}