DocumentCode :
3571060
Title :
A Co-operative Approach to Thwart Selfish and Black-Hole Attacks in DTN for Post Disaster Scenario
Author :
Gupta, Amit Kumar ; Bhattacharya, Indrajit ; Banerjee, Partha Sarathi ; Mandal, Jyotsna Kumar
Author_Institution :
Dept. of Comput. Applic., Kalyani Gov. Eng. Coll., Kalyani, India
fYear :
2014
Firstpage :
113
Lastpage :
118
Abstract :
A Delay Tolerant Network (DTN) is prone to security threats, especially the Selfish and Black-hole attacks. In this work, we have taken up these two security issues in a DTN based on an architecture suitable for Post disaster scenario, where mobile nodes move around a fixed destination and communicate messages to it. A co-operative scheme is presented to reduce the harmful effects of these malicious nodes in the network. The cooperation is obtained from the neighbouring nodes. The malicious behavior of a node is examined at the time of sending messages to that node by inquiring other neighbouring nodes about the past performances of that node. Simple parameters, such as total number of sent and received messages to and from other nodes and the elapsed time since the network is active, are used for arriving at the decision of forwarding messages to that node. The node whose malicious behavior is being tested is not involved in the whole process as it may manipulate information to pose as a valid node. By the cooperation of other neighbouring nodes, a combined faith value (CFV) is calculated. If this value satisfies a pre-defined threshold condition, then the node is treated as valid for that moment. The process is performed every time a node wants to transmit a message to another node. Also, the calculated CFV is multicast in the neighbourhood for updating. The scheme has been tested on the Spray and Wait (S&W) DTN routing protocol with mobile nodes and fixed destination type architecture to prove its effectiveness. It is found to avoid malicious nodes and increase the trustiness of the network and data communication.
Keywords :
data communication; delay tolerant networks; electronic messaging; mobile radio; routing protocols; telecommunication security; trusted computing; CFV; S&W DTN routing protocol; black-hole attack; combined faith value; cooperative approach; data communication; delay tolerant network security threats; message forwarding; message sending; mobile network node trust; post disaster scenario; spray and wait DTN routing protocol; thwart selfish attack; Delays; Information technology; Mobile ad hoc networks; Routing; Routing protocols; Security; TV; Black-hole; DTN Security; Delay Tolerant Network; Faith value; Post Disaster Situation; Selfish node;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Emerging Applications of Information Technology (EAIT), 2014 Fourth International Conference of
Type :
conf
DOI :
10.1109/EAIT.2014.24
Filename :
7052032
Link To Document :
بازگشت