Abstract
In spite of modernization of humanity, in emergency situations like after any natural calamity our infrastructure-based network backbone gets affected first. Disaster relief volunteers face the immense pain to set up a communication system, due to the failure of telecommunication infrastructure and long-standing power. Smartphones are the most preferable devices, operating and acting in delay-tolerant mode through Bluetooth/Wi-Fi, for setting up a peer-to-peer network enabling communication in post-disaster network. It is now popularly known as delay-/disruption-tolerant network (DTN). In this network, a node can misbehave and fail to establish a route or direct the data to neighbor node due to its malicious activity to decrease the performance of overall network. If a node suddenly drops messages after receiving, then it is known as black hole node. Black hole nodes do not forward any messages and can also destroy the message forever. A node may also act as a partially black hole node with the character of selective dropping. However, black hole nodes can hamper the overall performance of the network. In this paper, we have proposed a method to detect and avoid the malicious nodes forming black hole attack in DTN. We also evaluate the scheme using ONE simulator.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Image Source: https://www.jpinfotech.org/provest-provenance-based-trust-model-delay-tolerant-networks/
C. Chakrabarti, S. Roy, Adapting mobility of observers for quick reputation assignment in a sparse post-disaster communication network, in IEEE Proceedings of AIMoC (2015), pp. 29–35
C. Chakrabarti, S. Roy, S. Basu, Intention aware misbehavior detection for post-disaster opportunistic communication over peer-to-peer DTN, in Peer to Peer Networking and Applications (Springer, 2018), pp. 1–19
C. Chakrabarti, A. Banerjee, S. Roy, An observer-based distributed scheme for selfish-node detection in a post-disaster communication environment using delay tolerant network, in Proceedings of AIMoC (2014), pp. 151–156
S. Banerjee, Detection/removal of cooperative black and gray hole attack in mobile ad-hoc networks, in World Congress on Engineering and Computer Science, October (2008), pp. 337–342
L. Tamilselvan, V. Sankaranarayanan, Prevention of co-operative black hole attack in MANET. J. Netw. 3(5), 13–20 (2008)
S. Kurosawa, Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method. Proc. Int. J. Netw. Secur. (2006)
A. Bhattacharyya, D. Bose, A. Banerjee, H. Saha, D. Bhattacharjee, Different types of attacks in Mobile ADHOC Network: prevention and mitigation techniques. Int. J. Commun. Netw. Syst. 22 Sep 2012
Bhattacharjee, S., Basu, S., Roy, S., Das Bit, S.: Best-effort delivery of emergency messages in post disaster scenario with content-based filtering and priority-enhanced Prophet over DTN, in 2016 8th International Conference on Communication Systems and Networks (2016)
S. Saha, V.K. Shah, R. Verma, R. Mandal, S. Nandi, Is it worth taking a planned approach to design ad hoc infrastructure for post disaster communication, in CHANTS’12, Istanbul, Turkey, 22 August 2012
S. Saha, S. Patra, A. Sheldekar, S. Nandi, Post disaster management using delay tolerant network, in 3rd International Conference on Wireless & Mobile Networks, Ankara, Turkey, 26–28 June 2011
R. Hegde, T.H. Sreenivas, Steganography in ad hoc networks. Int. J. Comput. Sci. Inf. Technol. 6(6), 5405–5408 (2015)
L. Delosières, S. Nadjm-Tehrani, BATMAN store-and-forward: the best of the two worlds, in IEEE (2012)
Y.S. Uddin, D.M. Nicol, T.F. Abdelzaher, R.H. Kravets, A post-disaster mobility model for delay tolerant networking, in Proceedings of WSC (2009), pp. 2785–2796
X. Zhang, X. Wang, A. Liu, Q. Zhang, C. Tang, Reputation-based scheme for delay tolerant networks, in 2011 International Conference on Computer Science and Network Technology (2011)
Z. Gao, H. Zhu, S. Du, C. Xiao, R. Lu, PMDS: A probabilistic misbehavior detection scheme in DTN, in IEEE ICC 2012—Wireless Networks Symposium
H. Zhu, S. Du, Z. Gao, M. Dong, Z. Cao, A secure user centric and social-aware reputation based incentive scheme for DTNs, In final form 12 March (2012)
R. Lu, X. Lin, H. Zhu, X. Shen, B. Preiss, Pi: a practical incentive protocol for delay tolerant networks. IEEE Trans. Wireless Commun. 9(4), April (2010)
H. Zhu, S. Du, Z. Gao, M. Dong, Z. Cao, A probabilistic misbehavior detection scheme toward efficient trust establishment in delay-tolerant networks. IEEE Trans. Parallel Distrib. Syst. 25(1), 22–32 (2014)
M. Asplund, S. Nadjm-Tehrani, J. Sigholm, Emerging Information Infrastructures: Cooperation in Disasters, Lecture Notes in Computer Science, vol. 5508 (Springer, Berlin, 2009)
A. Keranen, J. Ott, T. Karkkainen, The ONE simulator for DTN protocol evaluation, in Proceedings of SIMUTools (2009), Article No. 55
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Chakrabarti, C. et al. (2020). Detection of Black Hole Attack in Delay-Tolerant Network. In: Maharatna, K., Kanjilal, M., Konar, S., Nandi, S., Das, K. (eds) Computational Advancement in Communication Circuits and Systems. Lecture Notes in Electrical Engineering, vol 575. Springer, Singapore. https://doi.org/10.1007/978-981-13-8687-9_19
Download citation
DOI: https://doi.org/10.1007/978-981-13-8687-9_19
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-8686-2
Online ISBN: 978-981-13-8687-9
eBook Packages: EngineeringEngineering (R0)