Advertisement

SRSnF: A Strategy for Secured Routing in Spray and Focus Routing Protocol for DTN

  • Sujoy Saha
  • Rohit Verma
  • Satadal Sengupta
  • Vineet Mishra
  • Subrata Nandi
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 176)

Abstract

This paper deals with the aspect of security in Delay Tolerant Networks (DTN). DTNs are characterized with decentralized control. Network performance and trustworthiness of transmitted information in DTNs depend upon the level of co-operation among participating nodes. As a result, DTNs are vulnerable towards untoward activities arising out of node selfishness as well as malicious intentions. In this paper, we limit our focus to the Black Hole Denial-of-Service attack. We develop a table-based strategy to record network history and use this information to detect discrepancies in the behavior of nodes, followed by elimination of those detected as malicious. We explain our detection mechanism considering Spray & Focus routing protocol as the representative routing scheme. The detection mechanism has been described in detail with examples pertaining to various case scenarios. Furthermore, we study the effect of variation of various parameters on detection efficiency and message transmission through simulation results.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Fall, K.: A Delay Tolerant Network Architecture for Challenged Internets. In: Proc. ACM SIGCOMM, pp. 27–34 (2003)Google Scholar
  2. 2.
    Spyropoulos, T., et al.: Spray & Focus: Efficient Mobility-Assisted Routing For Heterogeneous & Correlated Mobility. In: Proc. Fifth IEEE PERCOM Workshops 2007 (2007)Google Scholar
  3. 3.
    Lindgreny: Probabilistic Routing in Intermittently Connected Networks. In: Proc. ACM SIGMOBILE Mobile Computing & Communications Review, vol. 7 (July 2003)Google Scholar
  4. 4.
    Burgess, J., et al.: Maxprop: Routing for vehicle-based disruption-tolerant networking. In: Proc. INFOCOM (April 2006)Google Scholar
  5. 5.
    Kernen, et al.: The ONE Simulator for DTN Protocol Evaluation. In: Proc. of the 2nd Int‘l Conf. on Simulation Tools & Techniques, Simutools 2009, Belgium (2009)Google Scholar
  6. 6.
    Chuah, M., et al.: A Ferry based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks. In: Proc. MOBIQUITOUS (August 2007)Google Scholar
  7. 7.
    Ren, Y., et al.: MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks. In: Proc. IEEE WCNC (2010)Google Scholar
  8. 8.
    Li, F., et al.: Thwarting Blackhole Attacks in Distruption-Tolerant Networks using Encounter Tickets. In: Proc. INFOCOM (2009)Google Scholar
  9. 9.
    Ren, Y., et al.: Detecting Blackhole Attacks in Disruption-Tolerant Networks through Packet Exchange Recording. In: Proc. IEEE WoWMoM (2010)Google Scholar
  10. 10.
    Zhu, H., et al.: SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks. IEEE Trans. on Vehicular Tech. 58 (October 2009)Google Scholar
  11. 11.
    Lu, R., et al.: Pi: A Practical Incentive Protocol for Delay Tolerant Networks. IEEE Trans. on Wireless Communications 9(4) (April 2010)Google Scholar
  12. 12.
    Li, Q., et al.: Routing in Socially Selfish Delay Tolerant Networks. In: Proc. of INFOCOM, pp. 857–865 (2010)Google Scholar
  13. 13.
    Ning, T., et al.: Incentive-Aware Data Dissemination in Delay-Tolerant Mobile Networks. In: Proc. of SECON (2011)Google Scholar
  14. 14.
    Saha, S., et al.: Secured Routing in DTNs: Threats & Counter-measures. In: Ph.D. Forum, ICDCN (2011)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Sujoy Saha
    • 1
  • Rohit Verma
    • 1
  • Satadal Sengupta
    • 1
  • Vineet Mishra
    • 2
  • Subrata Nandi
    • 1
  1. 1.Dept. of Computer Science & EngineeringNational Institute of TechnologyDurgapurIndia
  2. 2.Dept. of Computer ApplicationsNational Institute of TechnologyDurgapurIndia

Personalised recommendations