Security Analysis of Opportunistic Networks Using Complex Network Properties

  • Srikar Mohan
  • Guangzhi Qu
  • Fatma Mili
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7405)


An Opportunistic Network (Oppnet) is an enhanced evolution of Mobile ad hoc network, where at any given time a route between source and destination does not exist, yet messages are routed opportunistically via intermediate contacts. We implemented two types of Oppnet deployments, an Open Oppnet and a Selective Oppnet, and analyzed both deployments by studying three Complex Network Properties, namely Average Shortest Distance, Degree Distribution, and Clustering Coefficients. In order to study the robustness of an Oppnet against network attacks, we examined Wormhole attack. According to the simulation results, severity of a Wormhole depends on the nodes location, trajectory and its neighboring nodes. When a worm tunnel was established between a popular node and an aloof node, it caused a noticeable impact on Average Shortest Distance. While in other cases Oppnet remained robust. We also observed that security in a Selective Oppnet is comparatively better than an Open Oppnet.


opportunistic network security complex network 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Aschenbruck, N., Ernst, R., Padella, E.G., Schwamborn, M.: BonnMotion - A Mobility Scenario Generation and Analysis Tool. In: Proc. International ICST Conference on Simulation Tools and Techniques (2010)Google Scholar
  2. 2.
    Barabasi, A.L., Albert, R.: Emergence of Scaling in Random Networks, Science Magazine. Science 286(5439), 509–512 (1999)MathSciNetCrossRefGoogle Scholar
  3. 3.
    Burgress, J., Bissias, G., Corner, M., Levine, B.: Surviving Attacks on Disruption-Tolerant Networks without Authentication. In: Proc. ACM MobiHoc (2007)Google Scholar
  4. 4.
    Buttyan, L., Hubaux, J.P.: Security and Cooperation in Wireless Networks, A Graduate Textbook, Version 1.5.1. Cambridge University Press (July 2007),
  5. 5.
    Campbell, A., Eisenman, S., Lane, N., Miluzzo, E., Peterson, R.: People-Centric Urban Sensing. In: Proc. ACM WICON (2006)Google Scholar
  6. 6.
    Chen, L.J., Yu, C.H., Sun, T., Chen, Y.C., Chu, H.H.: A Hybrid Routing Approach for Opportunistic Networks. In: Proc. ACM SIGCOMM Workshop on Challenged Networks, pp. 213–220 (September 2006)Google Scholar
  7. 7.
    Choo, F., Chan, M., Chang, E.C.: Robustness of DTN against Routing Attacks. In: Proc. IEEE COMSNETS, pp. 1 -10 (January 2010)Google Scholar
  8. 8.
    Conti, M., Kumar, M.: Opportunities in opportunistic Computing. IEEE Computer Society 43(1), 42–50 (2010)CrossRefGoogle Scholar
  9. 9.
    Cornelius, C., Kapadia, A., Kotz, D., Peebles, D., Shin, M., Triandopoulos, N.: AnonySense: Privacy-Aware People-Centric Sensing. In: Proc. ACM MobiSys (June 2008)Google Scholar
  10. 10.
    Doria, A., Uden, M., Pandey, D.P.: Providing connectivity to the Saami nomadic community. In: Proc. International Conference on Open Collaborative Design for Sustainable Innovation (December 2002)Google Scholar
  11. 11.
    Hu, Y., Perrig, A., Johnson, D.: Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks. In: Proc. IEEE INFOCOM, vol. 3, pp. 1976–1986 (April 2003)Google Scholar
  12. 12.
    Huangm, C.M., Lan, K.C., Tsai, C.Z.: A survey of Opportunistic Networks. In: Proc. IEEE Advanced Information Networking and Applications - Workshops, pp. 1672–1677 (March 2008)Google Scholar
  13. 13.
    Jayakumar, G., Ganapathi, G.: Reference Point Group Mobility and Random Waypoint Models in Performance Evaluation of MANET Routing Protocols. ACM Journal of Computer Systems, Networks, and Communication 2008 (January 2008)Google Scholar
  14. 14.
    Juang, P., Oki, H., Wang, Y., Martonosi, M., Peh, L.S., Rubesnstein, D.: Energy-Efficient Computing for Wildlife Tracking: Design Tradeoffs and Early Experiences with ZebraNet. In: Proc. ACM ASPLOS-X (2002)Google Scholar
  15. 15.
    Kapadia, A., Kotz, D., Triandopoulos, N.: Opportunistic Sensing: Security Challenges for the New Paradigm. In: Proc. IEEE COMSNETS, pp. 1–10 (January 2009)Google Scholar
  16. 16.
    Lilien, L., Kamal, Z.H., Bhuse, V., Gupta, A.: Opportunistic Networks: The Concept and Research Challenges in Privacy and Security. In: Proc. NSF Intl. WSPWN (2006)Google Scholar
  17. 17.
    Musolesi, M., Hailes, S., Mascolo, C.: Adaptive Routing for Intermittently Connected Mobile Ad Hoc Networks. In: Proc. IEEE WoWMoM Symposium (June 2005)Google Scholar
  18. 18.
    Pelusi, L., Passarella, A., Conti, M.: Opportunistic Networking: Data Forwarding in Disconnected Mobile Ad Hoc Networks. IEEE Communication Magazine 44(11), 134–141 (2006)CrossRefGoogle Scholar
  19. 19.
    Petland, A., Fletcher, R., Hasson, A.: DakNet: Rethinking Connectivity in Developing Nations. IEEE Computer Society 37(1), 78–83 (2004)CrossRefGoogle Scholar
  20. 20.
    Shikfa, A.: Security Challenges in Opportunistic Communication. In: Proc. IEEE GCC, pp. 425–428 (February 2011)Google Scholar
  21. 21.
    C. H. Vu, A. Soneye, An Analysis of Collaborative Attacks on Mobile Ad hoc Networks, Masters Thesis MCS-2009:4 (June 2009),
  22. 22.
    Wang, X.F., Chen, G.: Small World, Scale-Free and Beyond. IEEE Circuits and Systems Magazine 3(1), 6–20 (2003)CrossRefGoogle Scholar
  23. 23.
    Watts, D.J., Stogatz, S.H.: Collective dynamics of small-world networks. Nature International Weekly Journal of Science, Nature 393, 440–442 (1998)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Srikar Mohan
    • 1
  • Guangzhi Qu
    • 1
  • Fatma Mili
    • 2
  1. 1.Computer Science and Engineering DepartmentOakland UniversityRochesterUSA
  2. 2.Department of Computer and Information Technology, College of TechnologyPurdue UniversityWest LafayetteUSA

Personalised recommendations