115 research outputs found

    A collaborative trust management scheme for emergency communication using delay tolerant networks

    Get PDF
    Delay Tolerant Network (DTN) comprises of nodes with small and limited resources including power and memory capacity. We propose the use of DTN as an alternate means of communication for the dissemination of emergency information in a post-disaster evacuation operation. We investigate the performance of DTN in providing emergency communication support services under packet dropping attacks. We consider internally motivated attacks where the nodes that are part of the emergency rescue team are compromised with malicious behaviours thereby dropping packets to disrupt the message dissemination during the evacuation operation. A way to mitigating malicious behaviour and improve network performance of DTN is to use incentives in exchanging information between nodes. Unlike existing schemes, we consider the Basic Watchdog Detection System which detects and acts against misbehaving nodes to reduce their overall impact on the network performance. We design a Collaborative Trust Management Scheme (CTMS) which is based on the Bayesian detection watchdog approach to detect selfish and malicious behaviour in DTN nodes. We have evaluated our proposed CTMS through extensive simulations and compared our results with the other existing schemes. Our evaluations show that the use of adequate collaborative strategies between well behaved nodes could improve the performance of Watchdog schemes taking into account the delivery ratio, routing cost and the message delay from the source node to the destination node

    A collaborative trust management scheme for emergency communication using delay tolerant networks

    Get PDF
    Delay Tolerant Network (DTN) comprises of nodes with small and limited resources including power and memory capacity. We propose the use of DTN as an alternate means of communication for the dissemination of emergency information in a post-disaster evacuation operation. We investigate the performance of DTN in providing emergency communication support services under packet dropping attacks. We consider internally motivated attacks where the nodes that are part of the emergency rescue team are compromised with malicious behaviours thereby dropping packets to disrupt the message dissemination during the evacuation operation. A way to mitigating malicious behaviour and improve network performance of DTN is to use incentives in exchanging information between nodes. Unlike existing schemes, we consider the Basic Watchdog Detection System which detects and acts against misbehaving nodes to reduce their overall impact on the network performance. We design a Collaborative Trust Management Scheme (CTMS) which is based on the Bayesian detection watchdog approach to detect selfish and malicious behaviour in DTN nodes. We have evaluated our proposed CTMS through extensive simulations and compared our results with the other existing schemes. Our evaluations show that the use of adequate collaborative strategies between well behaved nodes could improve the performance of Watchdog schemes taking into account the delivery ratio, routing cost and the message delay from the source node to the destination node

    Secure Group Communication in Delay Tolerant Mobile Ad-Hoc Network

    Get PDF
    Delay-tolerant networks (DTNs) are well-known for delivering various types of information from different senders in a multicast manner, both in centralised and decentralised networks. Wireless mobile nodes form small networks in which one or more senders transmit data to one or more destinations through intermediate nodes. DTN routing protocols differ from traditional wireless routing protocols. There are security threats in DTNs, such as blackhole attackers dropping data, jamming attacks consuming bandwidth, and Vampire attacks depleting battery power and available bandwidth. This paper proposes a prevention scheme to detect and mitigate all three types of attackers in multicast communication. These attackers can impact performance by generating false replies, flooding with redundant information, and wasting communication power. The primary focus of this paper is on security issues related to DTN routing protocols. In order to counter malicious nodes, a blacklist is maintained, and if a neighbour identifies a node as malicious, it excludes packets from that node. Meanwhile, the neighbour continues sending packets to the malicious node, except for broadcast packets, which are dropped. If a node is found to forward no packets or only some packets by all its neighbours, any reply it gives to route requests is disregarded, and any request it initiates is ignored. Successful data reception at the destination indicates that hop-based data delivery maintains a record of successful transmissions. The proposed security scheme demonstrates improved performance

    Comparative analysis of attack detection methods in Delay Tolerant Network

    Get PDF
    Delay Tolerant Network is a new kind of wireless network which includes Radio Frequency (RF) and acoustic (sonar) technologies. DTN developed for an interplanetary network where the speed of light is slow. DTN is derived from deep space communication. DTN is distinguished as long delay and intermittent connectivity. The Delay Tolerant Network is more vulnerable to different kinds of attacks like flooding attack, blackhole and greyhole attacks, due to limited connectivity. There is no end-to-end connectivity between source & destination in DTN. So that it uses a store, carry and forward mechanism to transfer the data from one node to another node. The Delay Tolerant Network was developed to solve technical problems in the end-to-end network. DTN is becoming more and more important because communication networks are ubiquitous today. It provides automotive communication solutions. DTN is a decentralized and self-managed system with unique network attributes; however, attributes such as high mobility nodes, network uplinks and downlinks, and separate routing can cause network vulnerabilities. These vulnerabilities include the host being compromised, which in turn will bring security risks, because the compromised host may destroy the routing protocol in the network. This article analyses the various types of attack detection methods

    Comparative analysis of attack detection methods in Delay Tolerant Network

    Get PDF
    Delay Tolerant Network is a new kind of wireless network which includes Radio Frequency (RF) and acoustic (sonar) technologies. DTN developed for an interplanetary network where the speed of light is slow. DTN is derived from deep space communication. DTN is distinguished as long delay and intermittent connectivity. The Delay Tolerant Network is more vulnerable to different kinds of attacks like flooding attack, blackhole and greyhole attacks, due to limited connectivity. There is no end-to-end connectivity between source & destination in DTN. So that it uses a store, carry and forward mechanism to transfer the data from one node to another node. The Delay Tolerant Network was developed to solve technical problems in the end-to-end network. DTN is becoming more and more important because communication networks are ubiquitous today. It provides automotive communication solutions. DTN is a decentralized and self-managed system with unique network attributes; however, attributes such as high mobility nodes, network uplinks and downlinks, and separate routing can cause network vulnerabilities. These vulnerabilities include the host being compromised, which in turn will bring security risks, because the compromised host may destroy the routing protocol in the network. This article analyses the various types of attack detection methods

    A Taxonomy on Misbehaving Nodes in Delay Tolerant Networks

    Get PDF
    Delay Tolerant Networks (DTNs) are type of Intermittently Connected Networks (ICNs) featured by long delay, intermittent connectivity, asymmetric data rates and high error rates. DTNs have been primarily developed for InterPlanetary Networks (IPNs), however, have shown promising potential in challenged networks i.e. DakNet, ZebraNet, KioskNet and WiderNet. Due to unique nature of intermittent connectivity and long delay, DTNs face challenges in routing, key management, privacy, fragmentation and misbehaving nodes. Here, misbehaving nodes i.e. malicious and selfish nodes launch various attacks including flood, packet drop and fake packets attack, inevitably overuse scarce resources (e.g., buffer and bandwidth) in DTNs. The focus of this survey is on a review of misbehaving node attacks, and detection algorithms. We firstly classify various of attacks depending on the type of misbehaving nodes. Then, detection algorithms for these misbehaving nodes are categorized depending on preventive and detective based features. The panoramic view on misbehaving nodes and detection algorithms are further analyzed, evaluated mathematically through a number of performance metrics. Future directions guiding this topic are also presented

    A Survey on Secure Cooperative Bait Detection Approach for Detecting Malicious Nodes in MANETs

    Get PDF
    In Mobile Ad-hoc Networks (MANETs), the main problem is the security as well as formation of communication amongst nodes is that nodes must work together with each other. Avoiding or sensing malicious nodes initiation grayhole or collaborative blackhole attacks is the main challenge. Cooperative bait detection approach mixes the advantages of both proactive and reactive defense architectures. Here it uses the technique of transposition for implementing security and the CBDA technique outfits a reverse tracing method to help in attaining the specified aim. The demonstration in the occurrence of malicious-node attacks, the CBDA outperforms the DSR, and Best-Effort Fault-Tolerant Routing (BFTR) protocols in relations to packet delivery ratio and routing overhead. In the transposition method we use the key which is the askey value of the character which is encrypted at sender side and decrypted at receiver. DOI: 10.17762/ijritcc2321-8169.15033

    A routing defense mechanism using evolutionary game theory for Delay Tolerant Networks

    Get PDF
    Delay Tolerant Networks (DTNs) often suffer from intermittent disruption due to factors such as mobility and energy. Though lots of routing algorithms in DTNs have been proposed in the last few years, the routing security problems have not attracted enough attention. DTNs are still facing the threats from different kinds of routing attacks. In this paper, a general purpose defense mechanism is proposed against various routing attacks on DTNs. The defense mechanism is based on the routing path information acquired from the forwarded messages and the acknowledgment (ACK), and it is suitable for different routing schemes. Evolutionary game theory is applied with the defense mechanism to analyze and facilitate the strategy changes of the nodes in the networks. Simulation results show that the proposed evolutionary game theory based defense scheme can achieve high average delivery ratio, low network overhead and low average transmission delay in various routing attack scenarios. By introducing the game theory, the networks can avoid being attacked and provide normal transmission service. The networks can reach evolutionary strategy stable (ESS) under special conditions after evolution. The initial parameters will affect the convergence speed and the final ESS, but the initial ratio of the nodes choosing different strategies can only affect the game process
    • …
    corecore