DocumentCode :
2975229
Title :
MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks
Author :
Ren, Yanzhi ; Chuah, Mooi Choo ; Yang, Jie ; Chen, Yingying
Author_Institution :
Dept. of ECE, Stevens Inst. of Technol., Hoboken, NJ, USA
fYear :
2010
fDate :
18-21 April 2010
Firstpage :
1
Lastpage :
6
Abstract :
The Disruption Tolerant Networks (DTNs) are vulnerable to insider attacks, in which the legitimate nodes are compromised and the adversary modifies the delivery metrics of the node to launch harmful attacks in the networks. The traditional detection approaches of secure routing protocols can not address such kind of insider attacks in DTNs. In this paper, we propose a mutual correlation detection scheme (MUTON) for addressing these insider attacks. MUTON takes into consideration of the transitive property when calculating the packet delivery probability of each node and correlates the information collected from other nodes. We evaluated our approach through extensive simulations using both Random Way Point and Zebranet mobility models. Our results show that MUTON can detect insider attacks efficiently with high detection rate and low false positive rate.
Keywords :
ad hoc networks; routing protocols; telecommunication security; MUTON; Zebranet mobility models; ad hoc networks; disruption-tolerant networks; malicious node detection; mutual correlation detection scheme; packet delivery probability; random way point model; routing protocols; Ad hoc networks; Base stations; Chaotic communication; Communications Society; Disruption tolerant networking; History; Mission critical systems; Peer to peer computing; Probability; Routing protocols;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Wireless Communications and Networking Conference (WCNC), 2010 IEEE
Conference_Location :
Sydney, NSW
ISSN :
1525-3511
Print_ISBN :
978-1-4244-6396-1
Type :
conf
DOI :
10.1109/WCNC.2010.5506574
Filename :
5506574
Link To Document :
بازگشت