SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
The International Journal of Engineering And Science (IJES)
||Volume|| 2 ||Issue|| 1 ||Pages|| 67-75 ||2013||
ISSN: 2319 – 1813 ISBN: 2319 – 1805


   Detection of Routing Attacks in Disruption Tolerant Networks
                                         1
                                          Sangeetha.R, 2Krishnammal.N
  1
      Department of Computer Science, Sri Shakthi Institute of Engineering and Technology, Coimbatore, India
  2
      Department of Information Technology, Sri Shakthi Institute of Engineering and Technology, Coimbatore,
                                                      India


-------------------------------------------------------------ABSTRACT--------------------------------------------------------
             Disruption tolerant networks (DTN) differ from other networks in such a way that they provide
inconsistent connectivity between the nodes in order to exchange the data. Due to the inconsistent connectivity
the data is exchanged only when the nodes come in contact with each other. DTN performs store-carry-forward
method. When a node receives a packet it stores the packet first in the buffer and then carries until it contacts
another node. After the two nodes are in contact the packet is forwarded to the next node. This system detect
the packet dropping and to limit the traffic flowing to the misbehaving node. To detect the packet dropping in
DTN the distributed scheme is introduced in which a node is selected that contains the signed contact records
of its previous contact. Based on this record the next node in contact can detect the node that had dropped the
packet. Also a node that is compromised may misreport a false record so that the packet dropping cannot be
detected. In order to avoid this, the contact record is distributed to few witness nodes which then can detect the
node that has dropped the packet. SimBet is a forwarding-based algorithm where a packet only has one
replica. A packet is forwarded to a node if that node has higher metric than the current node. Delegation is a
replication-based algorithm where a packet may have multiple replicas. The packet is replicated based on the
usage of the neighbour node. The communication cost can be reduced. Such routing misbehavior can increase
the packet delivery ratio and does not waste system resources such as power and bandwidth.
Keywords— Disruption tolerant network, Routing , Attacks, Security, Detection.
------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: 19, December, 2012                                          Date of Publication: 05, January 2013
------------------------------------------------------------------------------------------------------------------------------------------
                 I. INTRODUCTION
                                                                              In this paper the packet dropping is detected
         Disruption tolerant network (DTN) do not                    and the misbehaving nodes are blacklisted such that
                                                                     they do not receive any packet nor send any packet.
provide continuous connectivity between the nodes in
                                                                     The packet dropping is detected by the contact
the network. Due to the lack of connectivity the nodes
                                                                     records that contains the information about the nodes
are unable to exchange the packets frequently. The
                                                                     previous contacts and the information about the node
nodes can transfer the packet only when two nodes
                                                                     that it is going to contact and many other
come in contact with each other. Disruption tolerant
                                                                     information. The contact records itself may contain
network usually follows store–carry-forward method.
                                                                     false records. The misbehaving contact record can be
       The nodes in disruption tolerant network
                                                                     detected by sending the part of contact record to the
misbehaves by dropping the packet it receives and
                                                                     randomly selected nodes.
informs that it has not received any packets.
                                                                              In disruption tolerant networks the packet
Otherwise the selfish nodes do not spend the
                                                                     may be dropped if the buffer is full. In order to
available resources such as buffer and power in
                                                                     identify the difference between the packet dropped
forwarding the packets of the previous nodes.
                                                                     due to the buffer overflow and the packet dropped due
Routing misbehaviour occurs by dropping the packets
                                                                     to the misbehavior , the contact records are used. The
even if the node has sufficient power and buffer to
                                                                     contact record contains the information like the
store.
                                                                     packets sent, packets received, the sequence number
        The routing misbehavior can be detected by
                                                                     and transmission options.
introducing two algorithms. SIMBET AND
DELEGATION are the two algorithms in which the                               In mobile and ad-hoc networks the packet
misbehavior in routing can be detected. Simbet is the                dropping is detected by monitoring the neighbour
algorithm based on forwarding. Delegation is the                     nodes and acknowledgment schemes. The packet
algorithm based on replication.                                      dropping is detected in a distributed manner.



www.theijes.com                                                 The IJES                                                    Page 67
Detection of Routing Attacks in Disruption Tolerant Networks

          In distributed scheme the node that contains              transient connected subnets despite the
the previous contacts are forwarded to the next node      general absence of end-to-end paths among them.
that comes into contact. The information about the                  For example, a student remains connected
buffer and the packets sent and received are              with his classmates during the class and they form a
transmitted to the next node.                             TCS during that time period. Similarly, vehicles also
         If the contact record is being attacked then     form a TCS when they are waiting for the traffic light
the part of it are stored randomly and finally the node   at the cross roads .
that is misbehaving is pushed into the blacklist such               Mobile Ad-hoc networks are self-
that it neither receives any packet nor can transmit      configuring and self-organizing multi hop wireless
and packet. A node generates a contact record and         networks where, the network structure changes
reports its previous contact to the next contacted        dynamically. To detect the routing misbehavior in
node. If misbehavior happens in contact record ,the       MANETS, 2acknowledgement based approach is
copy of the contact record is sent to the witness         used. In this approach when a data travels for two
nodes.                                                    hops ,acknowledgement is sent.
                                                                    Data is disseminated based on the interest of
II. Related Work                                          the node in delay tolerant mobile networks. The
         Routing misbehavior takes place in mobile        interest of a node may be weather forecast, event
ad hoc networks when the node agrees to forward the       alerts, commercial advertisement, movie trailers, blog
packet but does not. In order to avoid this               updates, and various news. The source interest refers
misbehavior two approached are applied. They are          to generating the data messages that match the
watchdog and path rater. The watchdog monitors the        corresponding interest. A sink of an interest is a node
neighbour nodes weather they forward the packet or        that wishes to acquire and consume data messages
not. The path rater finds the best path and also avoids   that match the corresponding interest. Lack of
the misbehaving nodes from forwarding packets.            continuous connectivity of the network is one of the
         Routing in disruption tolerant network is        major problem in delay tolerant networks.
very difficult. In order to make routing effective a                Multicasting the data is very difficult in
protocol called MAXPROB is proposed. The protocol         delay tolerant networks due to frequent partitioning.
is based on priority wise. The prioritization is based    In this paper they have proposed a forwarding
on the duration, storage, message delivery, history of    algorithm called delegation forwarding to handle the
the nodes etc. Priority is also based on scheduling of    delay tolerant networks multicast and develop several
packets to be transmitted and scheduling of packets to    multicast forwarding algorithms. The delegation
be dropped.                                               forwarding algorithm is also compared with the
         Detecting the wormhole attacks in delay          single copy multicasting and multiple copy
tolerant networks is a tedious process. Wormhole          multicasting.
attack refers to the malicious node that forwards the
packet to the next colluding node and damages the         III. Preliminaries
network. In order to detect the wormhole attack two       A. Network and routing model
schemes were proposed. They are Random Way Point                   The nodes in disruption tolerant network
and Zebranet mobility models.                             contains two buffers in which one buffer stores its
         The node replication attacks in sensor           own packets and the other buffer is used for storing
networks are detected in distributed manner. The          the packets from other nodes. The network is
node replication attacks are attacks that replicate the   synchronized loosely such that the nodes can come
node and produces in the network. It also causes          into contact for a short period of time.
more disconnections in the network. Two algorithms                  When the nodes come in contact they
are proposed to detect this attack. They are              exchange messages .The network is designed in such
Randomized Multicast distributes node location            a way that the nodes come in contact exchange the
information      to   randomly-selected      witnesses,   packets.
exploiting the birthday paradox to detect replicated
nodes.                                                    B. Security model
                                                                    The malicious nodes drops the packet even if
         Data forwarding in delay tolerant networks
                                                          they have enough space in memory. The normal
is very challenging. Data forwarding is not much
                                                          nodes will drop the packet only if the buffer if full.
effective in delay tolerant networks. To efficiently
                                                          The misbehaving node will not allow to drop its own
forward the data we exploit transient contact patterns.
                                                          packets. Each node in DTN has a certain lifetime. If
Some nodes in DTNs may remain connected with
                                                          the lifetime of the packet has expired then the packet
each other during specific time periods to form
                                                          has to be dropped. The expired packets can be

www.theijes.com                                      The IJES                                           Page 68
Detection of Routing Attacks in Disruption Tolerant Networks
detected if the source specifies the lifetime of the              The node that drops the packet and report
packet along with the packet it sends.                   the false contact record is detected and blacklisted
                                                         such that they do not receive any packets and neither
C. Overview of the approach                              send packets.

                                                          IV. Packet Dropping Detection
                                                                   Each node contains its own buffer. The node
                                                         when received the packet it stores in its buffer. The
                                                         malicious node drops the packet but it informs the
                                                         next contacted node that it had not received any
                                                         packets. Detecting the misbehavior is done by simbet
                                                         and delegation algorithms. The simbet is a
                                                         forwarding based algorithm and delegation is a
                                                         replication based algorithm. The packet is forwarded
                                                         according to the metrices like packet delivery ratio
                                                         number of wasted transmissions, bytes transmitted
                                                         per packet, detection rate, detection delay.
                                                         1. Packet delivery ratio:
                                                         Packet delivery ratio deals with number of packets
          Fig1. Packet Dropping Detection                delivered.
                                                         2. Number of wasted transmissions:
          The approach has two schemes. Packet           Deals with wastage of power and other resources
dropping detection and routing attacks are detected in   3. Bytes transmitted per packet:
our scheme. The packet is detected by generating the     Deals with number of bytes transmitted per packet
contact records.                                         4. Detection rate:
          A node generates its previous contact          It deals with the number of malicious node detected.
records and reports it to the other node. The contact    5. Detection delay:
record itself generates a false records .The false       The delay in sending and receiving the packets are
records will be detected by the witness nodes where      detected.
the part of the contact record is distributed randomly
                                                        V. Analysing The Conact Record
to the set of nodes.
                                                                 The contact record is analyzed by viewing
          A misbehaving node may drop the packet
                                                        the details in it. The misbehavior in contact record
and report a true contact record or drop the packet
                                                        can be detected by sending the part of contact record
and report the false contact record. A misbehaving
                                                        to the witness nodes who are responsible for viewing
node that reports the true contact record is detected
                                                        the activities in the network. If the details in forged
and the misbehaviour is detected. A node that reports
                                                        contact record and the details in contact record stored
false contact record is blacklisted. The part of the
                                                        in witness nodes differs, then the forgery in contact
contact record is reported to the witness nodes if a
                                                        record can be detected.
node is being detected.
          The contact record contains the information VI. Routing Algorithms
like when the contact record had happened and the                When the routing algorithm simbet is used ,
packets sent ,packets received and the sequence it decreases the delivery ratio as the number of
number . A misbehaving node drops the packet but malicious nodes increases. The number of packets
keeps the ID of it in order to show that they have used for forwarding are less when simbet is used.
forwarded the record. Two algorithms are used to When the number of malicious nodes increases then
detect the misbehavior. The summary of the contact more number of packets are dropped. The number of
record is generated to the witness nodes.               hops traversed by the packet becomes less.
          By detecting the nodes the network                      When the routing algorithm delegation is
performance can be increased and message delay also used, the packet delivery ratio increases as the
can be reduced. The packet delivery ratio can be number of malicious node increases. In this
increased. The misbehaving node overhead can be algorithm the nodes are replicated such that the
reduced. The node that has been attacked either drop communication cost can be reduced. When the
and report true contact record or drop and report false replicated packet is passed to the malicious node then
contact record. The node that drops and report the the probability of replicating the packets gets
true contact record is detected by analyzing the reduced.
contact record details. Thus the misbehavior is
detected.
www.theijes.com                                     The IJES                                          Page 69
Detection of Routing Attacks in Disruption Tolerant Networks
         The destination node can easily receive the    generated contact record can be given the sequence
packets when it is replicated.                          number initially.
                                                        2. The record that has less contact time will also have
                                                        smaller sequence number.
                                                        D. Alarm
                                                                  The witness node upon sending the alarm
                                                        signal to the corresponding nodes, the nodes verify it
                                                        by comparing the included information and signature
                                                        information. Upon verification of the information by
                                                        the nodes, the nodes come to the conclusion that the
                                                        node is a malicious node and sends it in to the
                                                        blacklist and the blacklisted node cannot receive any
                                                        more messages and neither can send messaged to the
                                                        other nodes. Thus the misbehavior can be detected.
           Fig 2. Analyzing the Contact Record          The node will be kept in the blacklist for certain
                                                        amount of time and then deleted in order to avoid less
          When the routing algorithm delegation is      memory space.
used, the packet delivery ratio increases as the VIII. Collision Avoidance
number of malicious node increases. In this A. False report with collision
algorithm the nodes are replicated such that the                 The malicious node drops the packet and
communication cost can be reduced. When the reports the true contact record. The misbehavior of
replicated packet is passed to the malicious node then such nodes can be detected. If the node reports false
the probability of replicating the packets gets record inorder to avoid the detection of dropping, it
reduced.                                                forwards the packet to the next colluder. Both the
          The destination node can easily receive the colluding nodes can hide the dropping from being
packets when packets are replicated. The storage cost detected in several ways The dropping can be
can be reduced by deleting the packets when not detected by analyzing the sequence number. When
necessary. Thus the algorithm increases the two nodes come into contact they exchange the
performance by reducing the number of malicious information through a contact record and detect the
nodes as possible and blacklisting them. Detecting misbehavior.
the false records can be done by analyzing the                   A node may drop a packet if the buffer
sequence numbers whether they are in proper order.      becomes full. A node may drop a packet when the
                                                        lifetime of the network is over. These dropping
VII. False Reporting Detection                          cannot be misbehavior.
A. Reproduction of the old record                       B. Duplicate buffer
          A malicious node cannot forge the contact              The forge buffer is used to hide the packet
record when there is no collision. Only when being dropped. When a normal node comes in
collision occurs the false record can be reported . The contact with the misbehaving node and colluder
compromised node cannot modify the true contact node, the colluder cannot view the long history of the
record since it is signed by the previous node that was previous records. In order to overcome this problem,
in contact.                                             each node has to report more than one previous
B. Selection of Witness node                            contact records to the next node.
          Due to false reporting, the inconsistency is C. Duplicate Not active
caused. In order to avoid the inconsistency that has             In duplicate inactive the node is allowed to
been caused the witness nodes are selected in random forward the packet only to an active node. The active
where the whole information about the misbehaving node is a node that behaves normal. When this rule is
node is sent and analysed. The witness nodes that are not followed by a particular node, the node is
directly in contact are selected. The old witness nodes considered to be malicious node and placed inside the
are not selected because they might have left the blacklist where it remains idle and later deleted from
network. The witness node by receiving the it.Each node maintains an active table that contains
information will compare it with the already existing the list of active nodes that it knows from its local
information and verify whether the signer has knowledge.
involved in violation by not following the rules.
                                                        D. Duplicate transactions
C. Rules to avoid inconsistency                                    The node deletes the contact record as soon
1. The inconsistency can be avoided by assigning the as the record reaches its destination. Therefore the
sequence numbers to each contact record. The first packet delivery ratio can be increased and

www.theijes.com                                     The IJES                                          Page 70
Detection of Routing Attacks in Disruption Tolerant Networks
inconsistencies can be reduced and the collision can       replication-based algorithm where a packet may have
be avoided. The destination node can easily receive        multiple replicas. The packet is replicated based on
the packets when packets are replicated. The storage       the usage of the neighbor node. The communication
cost can be reduced by deleting the packets when not       cost can be reduced. Such routing misbehavior can
necessary.                                                 increase the packet delivery ratio and does not waste
        The algorithm increases the performance by         system resources such as power and bandwidth.
reducing the number of malicious nodes as possible         X. References
and blacklisting them. Detecting the false records can     [1]    K. Fall, ―A delay-tolerant network architecture
be done by analyzing the sequence numbers whether                 for challenged internets,‖ in Proc. SIGCOMM,
they are in proper order.                                         2003, pp. 27–34.
                                                           [2]    J. Burgess, B. Gallagher, D. Jensen, and B.
                                                                  Levine, Maxprop: Routing for vehicle-based
                                                                  disruption-tolerant networks,‖ in Proc. IEEE
                                                                  INFOCOM, 2006, pp. 1–11.
                                                           [3]    W. Gao and G. Cao, ―User-centric data
                                                                  dissemination in disruption tolerant networks,‖
                                                                  in Proc. IEEE INFOCOM, 2011, pp. 3119–
                                                                  3127.
                                                           [4]    E. Daly and M. Haahr, ―Social network
                                                                  analysis for routing in disconnected delay-
                                                                  tolerant manets,‖ in Proc. ACM MobiHoc,
                                                                  2007, pp. 32–40.
                                                           [5]    V. Erramilli, A. Chaintreau,M. Crovella, and
                                                                  C. Diot, Delegation forwarding,‖ in Proc. ACM
                                                                  MobiHoc, 2008, pp. 251–260.
                                                           [6]    N. Eagle and A. Pentland, ―Reality mining:
                                                                  Sensing complex social systems,‖ Pers.
                                                                  Ubiquitous Comput., vol. 10, no. 4, pp. 255–
                                                                  268, 2006.
                                                           [7]    J. Burgess, G. D. Bissias, M. Corner, and B. N.
                                                                  Levine, ―Surviving attacks on disruption-
                                                                  tolerant networks without authentication,‖ in
              Fig 3. Detection of Colluder                        Proc. ACM MobiHoc, 2007, pp. 61–70.
                                                           [8]    S. Marti, T. J. Giuli, K. Lai, and M. Baker,
IX. Conclusion                                                    Mitigating routing misbehavior in mobile ad
         Due to the inconsistent connectivity the data            hoc networks,‖ in Proc. ACM MobiCom, 2000,
is exchanged only when the nodes come in contact                  pp. 255–265.
with each other. DTN performs store-carry-forward          [9]    H. Yang, J. Shu, X. Meng, and S. Lu, ―Scan:
method. When a node receives a packet it stores the               Self-organized network- layer security in mobile
packet first in the buffer and then carries until it              ad hoc networks,‖ IEEE J. Sel. Areas Commun.,
contacts another node. After the two nodes are in                 vol. 24, no. 2, pp. 261–273, 2006.
contact the packet is forwarded to the next node. This     [10]   S. Buchegger and Y. L. Boudec, ―Performance
system detect the packet dropping and to limit the                analysis of the confidant protocol (cooperation
traffic flowing to the misbehaving node. To detect the            of nodes: Fairness in dynamic ad-hoc
packet dropping in DTN the distributed scheme is                  networks),‖ in Proc. MobiHoc, 2002, pp. 226–
introduced in which a node is selected that contains              236.
the signed contact records of its previous contact.        [11]   K. Liu, J. Deng, P. K. Varshney, and K.
Based on this record the next node in contact can                 Balakrishnan, ―An acknowledgment- based
detect the node that had dropped the packet. Also a               approach for the detection of routing
node that is compromised may misreport a false                    misbehavior in MANETs,‖ IEEE Trans. Mobile
record so that the packet dropping cannot be detected.            Comput., vol. 6, no. 5, pp. 536–550, May 2007.
In order to avoid this the contact record is distributed   [12]   B. Awerbuch, D. Holmer, C.-N. Rotaru, and H.
to few witness nodes which then can detect the node               Rubens, ―An on-demand secure routing
that has dropped the packet. SimBet is a forwarding-              protocol resilient to byzantine failures,‖ in Proc.
based algorithm where a packet only has one replica.              ACM WiSe, 2002, pp. 21–30.
A packet is forwarded to a node if that node has           [13]   Y. Xue and K. Nahrstedt, ―Providing fault-
higher metric than the current node. Delegation is a              tolerant ad-hoc routing service in adversarial

www.theijes.com                                       The IJES                                              Page 71
Detection of Routing Attacks in Disruption Tolerant Networks
       environments,‖ Wireless Pers. Commun., vol.
       29, no. 3-4, pp. 367–388, 2004.
[14]   P. Hui, J. Crowcroft, and E. Yoneki, ―Bubble
       rap: Social-based forwarding in delay tolerant
       networks,‖ in Proc. ACM MobiHoc, 2008, pp.
       241–250.
[15]   F. Li, A. Srinivasan, and J. Wu, ―Thwarting
       blackhole attacks in distruption- tolerant
       networks using encounter tickets,‖ in Proc.
       IEEE INFOCOM, 2009, pp. 2428–2436.
[16]   Y. Ren, M. C. Chuah, J. Yang, and Y. Chen,
       Detecting wormhole attacks in delay tolerant
       networks,‖     IEEEWireless      Commun.Mag.,
       vol.17, no. 5, pp. 36–42, Oct. 2010.
[17]   U. Shevade, H. Song, L. Qiu, and Y. Zhang,
       Incentive-aware routing in dtns,‖ in Proc. IEEE
       ICNP, 2008, pp. 238–247.




www.theijes.com                                     The IJES                                   Page 72

Más contenido relacionado

La actualidad más candente

Iaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detectionIaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detectionIaetsd Iaetsd
 
EAASR: Enhanced AASR Protocol to Reduce Traffic and Eliminate the Malicious N...
EAASR: Enhanced AASR Protocol to Reduce Traffic and Eliminate the Malicious N...EAASR: Enhanced AASR Protocol to Reduce Traffic and Eliminate the Malicious N...
EAASR: Enhanced AASR Protocol to Reduce Traffic and Eliminate the Malicious N...paperpublications3
 
Enhancing msf for mobile ad hoc network security though active handshaking &a...
Enhancing msf for mobile ad hoc network security though active handshaking &a...Enhancing msf for mobile ad hoc network security though active handshaking &a...
Enhancing msf for mobile ad hoc network security though active handshaking &a...ijctet
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...IJSRD
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...IRJET Journal
 
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSNA Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSNIJERDJOURNAL
 
Bz32915919
Bz32915919Bz32915919
Bz32915919IJMER
 
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...IOSR Journals
 
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1422  Defending Against Collaborative Attacks by Malicious Nodes in MANETs...JPN1422  Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...chennaijp
 
Defending against collaborative attacks by
Defending against collaborative attacks byDefending against collaborative attacks by
Defending against collaborative attacks byranjith kumar
 
Content Sharing over Smartphone-Based Delay-Tolerant Networks
Content Sharing over Smartphone-Based Delay-Tolerant NetworksContent Sharing over Smartphone-Based Delay-Tolerant Networks
Content Sharing over Smartphone-Based Delay-Tolerant NetworksIJERA Editor
 
Preventing Malicious Node and Provide Secure Routing In Manet
Preventing Malicious Node and Provide Secure Routing In ManetPreventing Malicious Node and Provide Secure Routing In Manet
Preventing Malicious Node and Provide Secure Routing In ManetIOSR Journals
 
Secure and distributed data discovery and dissemination in wireless sensor ne...
Secure and distributed data discovery and dissemination in wireless sensor ne...Secure and distributed data discovery and dissemination in wireless sensor ne...
Secure and distributed data discovery and dissemination in wireless sensor ne...Pvrtechnologies Nellore
 
Bx32903907
Bx32903907Bx32903907
Bx32903907IJMER
 
CoCoWa A Collaborative Contact-Based
CoCoWa  A Collaborative Contact-BasedCoCoWa  A Collaborative Contact-Based
CoCoWa A Collaborative Contact-BasedBen Paul
 

La actualidad más candente (16)

Iaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detectionIaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detection
 
EAASR: Enhanced AASR Protocol to Reduce Traffic and Eliminate the Malicious N...
EAASR: Enhanced AASR Protocol to Reduce Traffic and Eliminate the Malicious N...EAASR: Enhanced AASR Protocol to Reduce Traffic and Eliminate the Malicious N...
EAASR: Enhanced AASR Protocol to Reduce Traffic and Eliminate the Malicious N...
 
Enhancing msf for mobile ad hoc network security though active handshaking &a...
Enhancing msf for mobile ad hoc network security though active handshaking &a...Enhancing msf for mobile ad hoc network security though active handshaking &a...
Enhancing msf for mobile ad hoc network security though active handshaking &a...
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
 
17 18
17 1817 18
17 18
 
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSNA Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN
 
Bz32915919
Bz32915919Bz32915919
Bz32915919
 
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
 
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1422  Defending Against Collaborative Attacks by Malicious Nodes in MANETs...JPN1422  Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
 
Defending against collaborative attacks by
Defending against collaborative attacks byDefending against collaborative attacks by
Defending against collaborative attacks by
 
Content Sharing over Smartphone-Based Delay-Tolerant Networks
Content Sharing over Smartphone-Based Delay-Tolerant NetworksContent Sharing over Smartphone-Based Delay-Tolerant Networks
Content Sharing over Smartphone-Based Delay-Tolerant Networks
 
Preventing Malicious Node and Provide Secure Routing In Manet
Preventing Malicious Node and Provide Secure Routing In ManetPreventing Malicious Node and Provide Secure Routing In Manet
Preventing Malicious Node and Provide Secure Routing In Manet
 
Secure and distributed data discovery and dissemination in wireless sensor ne...
Secure and distributed data discovery and dissemination in wireless sensor ne...Secure and distributed data discovery and dissemination in wireless sensor ne...
Secure and distributed data discovery and dissemination in wireless sensor ne...
 
Bx32903907
Bx32903907Bx32903907
Bx32903907
 
CoCoWa A Collaborative Contact-Based
CoCoWa  A Collaborative Contact-BasedCoCoWa  A Collaborative Contact-Based
CoCoWa A Collaborative Contact-Based
 

Similar a The International Journal of Engineering and Science (The IJES)

Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...
Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...
Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...IJMTST Journal
 
Privacy preserving and truthful detection of packet dropping attacks in wirel...
Privacy preserving and truthful detection of packet dropping attacks in wirel...Privacy preserving and truthful detection of packet dropping attacks in wirel...
Privacy preserving and truthful detection of packet dropping attacks in wirel...Pvrtechnologies Nellore
 
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...IJNSA Journal
 
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...1crore projects
 
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...1crore projects
 
Behavioral Model to Detect Anomalous Attacks in Packet Transmission
Behavioral Model to Detect Anomalous Attacks in Packet TransmissionBehavioral Model to Detect Anomalous Attacks in Packet Transmission
Behavioral Model to Detect Anomalous Attacks in Packet TransmissionIOSR Journals
 
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...Baddam Akhil Reddy
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodIJTET Journal
 
Ensure Security and Scalable Performance in Multiple Relay Networks
Ensure Security and Scalable Performance in Multiple Relay NetworksEnsure Security and Scalable Performance in Multiple Relay Networks
Ensure Security and Scalable Performance in Multiple Relay NetworksEditor IJCATR
 
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)cscpconf
 
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...IRJET Journal
 
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORK
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORKDETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORK
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORKIJCI JOURNAL
 
Survey paper on Evaluating Trust and Reputation Using Uncertain Reasoning in ...
Survey paper on Evaluating Trust and Reputation Using Uncertain Reasoning in ...Survey paper on Evaluating Trust and Reputation Using Uncertain Reasoning in ...
Survey paper on Evaluating Trust and Reputation Using Uncertain Reasoning in ...IJARIIE JOURNAL
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
To Lie or To Comply: Defending against Flood Attacks in Disruption Tolerant N...
To Lie or To Comply: Defending against Flood Attacks in Disruption Tolerant N...To Lie or To Comply: Defending against Flood Attacks in Disruption Tolerant N...
To Lie or To Comply: Defending against Flood Attacks in Disruption Tolerant N...Vamsi IV
 
Various Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networksVarious Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networksKishan Patel
 

Similar a The International Journal of Engineering and Science (The IJES) (20)

Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...
Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...
Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...
 
Privacy preserving and truthful detection of packet dropping attacks in wirel...
Privacy preserving and truthful detection of packet dropping attacks in wirel...Privacy preserving and truthful detection of packet dropping attacks in wirel...
Privacy preserving and truthful detection of packet dropping attacks in wirel...
 
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
 
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
 
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
 
Behavioral Model to Detect Anomalous Attacks in Packet Transmission
Behavioral Model to Detect Anomalous Attacks in Packet TransmissionBehavioral Model to Detect Anomalous Attacks in Packet Transmission
Behavioral Model to Detect Anomalous Attacks in Packet Transmission
 
B010110514
B010110514B010110514
B010110514
 
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
 
1 7
1 71 7
1 7
 
1 7
1 71 7
1 7
 
Ensure Security and Scalable Performance in Multiple Relay Networks
Ensure Security and Scalable Performance in Multiple Relay NetworksEnsure Security and Scalable Performance in Multiple Relay Networks
Ensure Security and Scalable Performance in Multiple Relay Networks
 
L 1000 423
L 1000 423L 1000 423
L 1000 423
 
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
 
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
 
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORK
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORKDETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORK
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORK
 
Survey paper on Evaluating Trust and Reputation Using Uncertain Reasoning in ...
Survey paper on Evaluating Trust and Reputation Using Uncertain Reasoning in ...Survey paper on Evaluating Trust and Reputation Using Uncertain Reasoning in ...
Survey paper on Evaluating Trust and Reputation Using Uncertain Reasoning in ...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
To Lie or To Comply: Defending against Flood Attacks in Disruption Tolerant N...
To Lie or To Comply: Defending against Flood Attacks in Disruption Tolerant N...To Lie or To Comply: Defending against Flood Attacks in Disruption Tolerant N...
To Lie or To Comply: Defending against Flood Attacks in Disruption Tolerant N...
 
Various Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networksVarious Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networks
 

The International Journal of Engineering and Science (The IJES)

  • 1. The International Journal of Engineering And Science (IJES) ||Volume|| 2 ||Issue|| 1 ||Pages|| 67-75 ||2013|| ISSN: 2319 – 1813 ISBN: 2319 – 1805  Detection of Routing Attacks in Disruption Tolerant Networks 1 Sangeetha.R, 2Krishnammal.N 1 Department of Computer Science, Sri Shakthi Institute of Engineering and Technology, Coimbatore, India 2 Department of Information Technology, Sri Shakthi Institute of Engineering and Technology, Coimbatore, India -------------------------------------------------------------ABSTRACT-------------------------------------------------------- Disruption tolerant networks (DTN) differ from other networks in such a way that they provide inconsistent connectivity between the nodes in order to exchange the data. Due to the inconsistent connectivity the data is exchanged only when the nodes come in contact with each other. DTN performs store-carry-forward method. When a node receives a packet it stores the packet first in the buffer and then carries until it contacts another node. After the two nodes are in contact the packet is forwarded to the next node. This system detect the packet dropping and to limit the traffic flowing to the misbehaving node. To detect the packet dropping in DTN the distributed scheme is introduced in which a node is selected that contains the signed contact records of its previous contact. Based on this record the next node in contact can detect the node that had dropped the packet. Also a node that is compromised may misreport a false record so that the packet dropping cannot be detected. In order to avoid this, the contact record is distributed to few witness nodes which then can detect the node that has dropped the packet. SimBet is a forwarding-based algorithm where a packet only has one replica. A packet is forwarded to a node if that node has higher metric than the current node. Delegation is a replication-based algorithm where a packet may have multiple replicas. The packet is replicated based on the usage of the neighbour node. The communication cost can be reduced. Such routing misbehavior can increase the packet delivery ratio and does not waste system resources such as power and bandwidth. Keywords— Disruption tolerant network, Routing , Attacks, Security, Detection. ------------------------------------------------------------------------------------------------------------------------------------------ Date of Submission: 19, December, 2012 Date of Publication: 05, January 2013 ------------------------------------------------------------------------------------------------------------------------------------------ I. INTRODUCTION In this paper the packet dropping is detected Disruption tolerant network (DTN) do not and the misbehaving nodes are blacklisted such that they do not receive any packet nor send any packet. provide continuous connectivity between the nodes in The packet dropping is detected by the contact the network. Due to the lack of connectivity the nodes records that contains the information about the nodes are unable to exchange the packets frequently. The previous contacts and the information about the node nodes can transfer the packet only when two nodes that it is going to contact and many other come in contact with each other. Disruption tolerant information. The contact records itself may contain network usually follows store–carry-forward method. false records. The misbehaving contact record can be The nodes in disruption tolerant network detected by sending the part of contact record to the misbehaves by dropping the packet it receives and randomly selected nodes. informs that it has not received any packets. In disruption tolerant networks the packet Otherwise the selfish nodes do not spend the may be dropped if the buffer is full. In order to available resources such as buffer and power in identify the difference between the packet dropped forwarding the packets of the previous nodes. due to the buffer overflow and the packet dropped due Routing misbehaviour occurs by dropping the packets to the misbehavior , the contact records are used. The even if the node has sufficient power and buffer to contact record contains the information like the store. packets sent, packets received, the sequence number The routing misbehavior can be detected by and transmission options. introducing two algorithms. SIMBET AND DELEGATION are the two algorithms in which the In mobile and ad-hoc networks the packet misbehavior in routing can be detected. Simbet is the dropping is detected by monitoring the neighbour algorithm based on forwarding. Delegation is the nodes and acknowledgment schemes. The packet algorithm based on replication. dropping is detected in a distributed manner. www.theijes.com The IJES Page 67
  • 2. Detection of Routing Attacks in Disruption Tolerant Networks In distributed scheme the node that contains transient connected subnets despite the the previous contacts are forwarded to the next node general absence of end-to-end paths among them. that comes into contact. The information about the For example, a student remains connected buffer and the packets sent and received are with his classmates during the class and they form a transmitted to the next node. TCS during that time period. Similarly, vehicles also If the contact record is being attacked then form a TCS when they are waiting for the traffic light the part of it are stored randomly and finally the node at the cross roads . that is misbehaving is pushed into the blacklist such Mobile Ad-hoc networks are self- that it neither receives any packet nor can transmit configuring and self-organizing multi hop wireless and packet. A node generates a contact record and networks where, the network structure changes reports its previous contact to the next contacted dynamically. To detect the routing misbehavior in node. If misbehavior happens in contact record ,the MANETS, 2acknowledgement based approach is copy of the contact record is sent to the witness used. In this approach when a data travels for two nodes. hops ,acknowledgement is sent. Data is disseminated based on the interest of II. Related Work the node in delay tolerant mobile networks. The Routing misbehavior takes place in mobile interest of a node may be weather forecast, event ad hoc networks when the node agrees to forward the alerts, commercial advertisement, movie trailers, blog packet but does not. In order to avoid this updates, and various news. The source interest refers misbehavior two approached are applied. They are to generating the data messages that match the watchdog and path rater. The watchdog monitors the corresponding interest. A sink of an interest is a node neighbour nodes weather they forward the packet or that wishes to acquire and consume data messages not. The path rater finds the best path and also avoids that match the corresponding interest. Lack of the misbehaving nodes from forwarding packets. continuous connectivity of the network is one of the Routing in disruption tolerant network is major problem in delay tolerant networks. very difficult. In order to make routing effective a Multicasting the data is very difficult in protocol called MAXPROB is proposed. The protocol delay tolerant networks due to frequent partitioning. is based on priority wise. The prioritization is based In this paper they have proposed a forwarding on the duration, storage, message delivery, history of algorithm called delegation forwarding to handle the the nodes etc. Priority is also based on scheduling of delay tolerant networks multicast and develop several packets to be transmitted and scheduling of packets to multicast forwarding algorithms. The delegation be dropped. forwarding algorithm is also compared with the Detecting the wormhole attacks in delay single copy multicasting and multiple copy tolerant networks is a tedious process. Wormhole multicasting. attack refers to the malicious node that forwards the packet to the next colluding node and damages the III. Preliminaries network. In order to detect the wormhole attack two A. Network and routing model schemes were proposed. They are Random Way Point The nodes in disruption tolerant network and Zebranet mobility models. contains two buffers in which one buffer stores its The node replication attacks in sensor own packets and the other buffer is used for storing networks are detected in distributed manner. The the packets from other nodes. The network is node replication attacks are attacks that replicate the synchronized loosely such that the nodes can come node and produces in the network. It also causes into contact for a short period of time. more disconnections in the network. Two algorithms When the nodes come in contact they are proposed to detect this attack. They are exchange messages .The network is designed in such Randomized Multicast distributes node location a way that the nodes come in contact exchange the information to randomly-selected witnesses, packets. exploiting the birthday paradox to detect replicated nodes. B. Security model The malicious nodes drops the packet even if Data forwarding in delay tolerant networks they have enough space in memory. The normal is very challenging. Data forwarding is not much nodes will drop the packet only if the buffer if full. effective in delay tolerant networks. To efficiently The misbehaving node will not allow to drop its own forward the data we exploit transient contact patterns. packets. Each node in DTN has a certain lifetime. If Some nodes in DTNs may remain connected with the lifetime of the packet has expired then the packet each other during specific time periods to form has to be dropped. The expired packets can be www.theijes.com The IJES Page 68
  • 3. Detection of Routing Attacks in Disruption Tolerant Networks detected if the source specifies the lifetime of the The node that drops the packet and report packet along with the packet it sends. the false contact record is detected and blacklisted such that they do not receive any packets and neither C. Overview of the approach send packets. IV. Packet Dropping Detection Each node contains its own buffer. The node when received the packet it stores in its buffer. The malicious node drops the packet but it informs the next contacted node that it had not received any packets. Detecting the misbehavior is done by simbet and delegation algorithms. The simbet is a forwarding based algorithm and delegation is a replication based algorithm. The packet is forwarded according to the metrices like packet delivery ratio number of wasted transmissions, bytes transmitted per packet, detection rate, detection delay. 1. Packet delivery ratio: Packet delivery ratio deals with number of packets Fig1. Packet Dropping Detection delivered. 2. Number of wasted transmissions: The approach has two schemes. Packet Deals with wastage of power and other resources dropping detection and routing attacks are detected in 3. Bytes transmitted per packet: our scheme. The packet is detected by generating the Deals with number of bytes transmitted per packet contact records. 4. Detection rate: A node generates its previous contact It deals with the number of malicious node detected. records and reports it to the other node. The contact 5. Detection delay: record itself generates a false records .The false The delay in sending and receiving the packets are records will be detected by the witness nodes where detected. the part of the contact record is distributed randomly V. Analysing The Conact Record to the set of nodes. The contact record is analyzed by viewing A misbehaving node may drop the packet the details in it. The misbehavior in contact record and report a true contact record or drop the packet can be detected by sending the part of contact record and report the false contact record. A misbehaving to the witness nodes who are responsible for viewing node that reports the true contact record is detected the activities in the network. If the details in forged and the misbehaviour is detected. A node that reports contact record and the details in contact record stored false contact record is blacklisted. The part of the in witness nodes differs, then the forgery in contact contact record is reported to the witness nodes if a record can be detected. node is being detected. The contact record contains the information VI. Routing Algorithms like when the contact record had happened and the When the routing algorithm simbet is used , packets sent ,packets received and the sequence it decreases the delivery ratio as the number of number . A misbehaving node drops the packet but malicious nodes increases. The number of packets keeps the ID of it in order to show that they have used for forwarding are less when simbet is used. forwarded the record. Two algorithms are used to When the number of malicious nodes increases then detect the misbehavior. The summary of the contact more number of packets are dropped. The number of record is generated to the witness nodes. hops traversed by the packet becomes less. By detecting the nodes the network When the routing algorithm delegation is performance can be increased and message delay also used, the packet delivery ratio increases as the can be reduced. The packet delivery ratio can be number of malicious node increases. In this increased. The misbehaving node overhead can be algorithm the nodes are replicated such that the reduced. The node that has been attacked either drop communication cost can be reduced. When the and report true contact record or drop and report false replicated packet is passed to the malicious node then contact record. The node that drops and report the the probability of replicating the packets gets true contact record is detected by analyzing the reduced. contact record details. Thus the misbehavior is detected. www.theijes.com The IJES Page 69
  • 4. Detection of Routing Attacks in Disruption Tolerant Networks The destination node can easily receive the generated contact record can be given the sequence packets when it is replicated. number initially. 2. The record that has less contact time will also have smaller sequence number. D. Alarm The witness node upon sending the alarm signal to the corresponding nodes, the nodes verify it by comparing the included information and signature information. Upon verification of the information by the nodes, the nodes come to the conclusion that the node is a malicious node and sends it in to the blacklist and the blacklisted node cannot receive any more messages and neither can send messaged to the other nodes. Thus the misbehavior can be detected. Fig 2. Analyzing the Contact Record The node will be kept in the blacklist for certain amount of time and then deleted in order to avoid less When the routing algorithm delegation is memory space. used, the packet delivery ratio increases as the VIII. Collision Avoidance number of malicious node increases. In this A. False report with collision algorithm the nodes are replicated such that the The malicious node drops the packet and communication cost can be reduced. When the reports the true contact record. The misbehavior of replicated packet is passed to the malicious node then such nodes can be detected. If the node reports false the probability of replicating the packets gets record inorder to avoid the detection of dropping, it reduced. forwards the packet to the next colluder. Both the The destination node can easily receive the colluding nodes can hide the dropping from being packets when packets are replicated. The storage cost detected in several ways The dropping can be can be reduced by deleting the packets when not detected by analyzing the sequence number. When necessary. Thus the algorithm increases the two nodes come into contact they exchange the performance by reducing the number of malicious information through a contact record and detect the nodes as possible and blacklisting them. Detecting misbehavior. the false records can be done by analyzing the A node may drop a packet if the buffer sequence numbers whether they are in proper order. becomes full. A node may drop a packet when the lifetime of the network is over. These dropping VII. False Reporting Detection cannot be misbehavior. A. Reproduction of the old record B. Duplicate buffer A malicious node cannot forge the contact The forge buffer is used to hide the packet record when there is no collision. Only when being dropped. When a normal node comes in collision occurs the false record can be reported . The contact with the misbehaving node and colluder compromised node cannot modify the true contact node, the colluder cannot view the long history of the record since it is signed by the previous node that was previous records. In order to overcome this problem, in contact. each node has to report more than one previous B. Selection of Witness node contact records to the next node. Due to false reporting, the inconsistency is C. Duplicate Not active caused. In order to avoid the inconsistency that has In duplicate inactive the node is allowed to been caused the witness nodes are selected in random forward the packet only to an active node. The active where the whole information about the misbehaving node is a node that behaves normal. When this rule is node is sent and analysed. The witness nodes that are not followed by a particular node, the node is directly in contact are selected. The old witness nodes considered to be malicious node and placed inside the are not selected because they might have left the blacklist where it remains idle and later deleted from network. The witness node by receiving the it.Each node maintains an active table that contains information will compare it with the already existing the list of active nodes that it knows from its local information and verify whether the signer has knowledge. involved in violation by not following the rules. D. Duplicate transactions C. Rules to avoid inconsistency The node deletes the contact record as soon 1. The inconsistency can be avoided by assigning the as the record reaches its destination. Therefore the sequence numbers to each contact record. The first packet delivery ratio can be increased and www.theijes.com The IJES Page 70
  • 5. Detection of Routing Attacks in Disruption Tolerant Networks inconsistencies can be reduced and the collision can replication-based algorithm where a packet may have be avoided. The destination node can easily receive multiple replicas. The packet is replicated based on the packets when packets are replicated. The storage the usage of the neighbor node. The communication cost can be reduced by deleting the packets when not cost can be reduced. Such routing misbehavior can necessary. increase the packet delivery ratio and does not waste The algorithm increases the performance by system resources such as power and bandwidth. reducing the number of malicious nodes as possible X. References and blacklisting them. Detecting the false records can [1] K. Fall, ―A delay-tolerant network architecture be done by analyzing the sequence numbers whether for challenged internets,‖ in Proc. SIGCOMM, they are in proper order. 2003, pp. 27–34. [2] J. Burgess, B. Gallagher, D. Jensen, and B. Levine, Maxprop: Routing for vehicle-based disruption-tolerant networks,‖ in Proc. IEEE INFOCOM, 2006, pp. 1–11. [3] W. Gao and G. Cao, ―User-centric data dissemination in disruption tolerant networks,‖ in Proc. IEEE INFOCOM, 2011, pp. 3119– 3127. [4] E. Daly and M. Haahr, ―Social network analysis for routing in disconnected delay- tolerant manets,‖ in Proc. ACM MobiHoc, 2007, pp. 32–40. [5] V. Erramilli, A. Chaintreau,M. Crovella, and C. Diot, Delegation forwarding,‖ in Proc. ACM MobiHoc, 2008, pp. 251–260. [6] N. Eagle and A. Pentland, ―Reality mining: Sensing complex social systems,‖ Pers. Ubiquitous Comput., vol. 10, no. 4, pp. 255– 268, 2006. [7] J. Burgess, G. D. Bissias, M. Corner, and B. N. Levine, ―Surviving attacks on disruption- tolerant networks without authentication,‖ in Fig 3. Detection of Colluder Proc. ACM MobiHoc, 2007, pp. 61–70. [8] S. Marti, T. J. Giuli, K. Lai, and M. Baker, IX. Conclusion Mitigating routing misbehavior in mobile ad Due to the inconsistent connectivity the data hoc networks,‖ in Proc. ACM MobiCom, 2000, is exchanged only when the nodes come in contact pp. 255–265. with each other. DTN performs store-carry-forward [9] H. Yang, J. Shu, X. Meng, and S. Lu, ―Scan: method. When a node receives a packet it stores the Self-organized network- layer security in mobile packet first in the buffer and then carries until it ad hoc networks,‖ IEEE J. Sel. Areas Commun., contacts another node. After the two nodes are in vol. 24, no. 2, pp. 261–273, 2006. contact the packet is forwarded to the next node. This [10] S. Buchegger and Y. L. Boudec, ―Performance system detect the packet dropping and to limit the analysis of the confidant protocol (cooperation traffic flowing to the misbehaving node. To detect the of nodes: Fairness in dynamic ad-hoc packet dropping in DTN the distributed scheme is networks),‖ in Proc. MobiHoc, 2002, pp. 226– introduced in which a node is selected that contains 236. the signed contact records of its previous contact. [11] K. Liu, J. Deng, P. K. Varshney, and K. Based on this record the next node in contact can Balakrishnan, ―An acknowledgment- based detect the node that had dropped the packet. Also a approach for the detection of routing node that is compromised may misreport a false misbehavior in MANETs,‖ IEEE Trans. Mobile record so that the packet dropping cannot be detected. Comput., vol. 6, no. 5, pp. 536–550, May 2007. In order to avoid this the contact record is distributed [12] B. Awerbuch, D. Holmer, C.-N. Rotaru, and H. to few witness nodes which then can detect the node Rubens, ―An on-demand secure routing that has dropped the packet. SimBet is a forwarding- protocol resilient to byzantine failures,‖ in Proc. based algorithm where a packet only has one replica. ACM WiSe, 2002, pp. 21–30. A packet is forwarded to a node if that node has [13] Y. Xue and K. Nahrstedt, ―Providing fault- higher metric than the current node. Delegation is a tolerant ad-hoc routing service in adversarial www.theijes.com The IJES Page 71
  • 6. Detection of Routing Attacks in Disruption Tolerant Networks environments,‖ Wireless Pers. Commun., vol. 29, no. 3-4, pp. 367–388, 2004. [14] P. Hui, J. Crowcroft, and E. Yoneki, ―Bubble rap: Social-based forwarding in delay tolerant networks,‖ in Proc. ACM MobiHoc, 2008, pp. 241–250. [15] F. Li, A. Srinivasan, and J. Wu, ―Thwarting blackhole attacks in distruption- tolerant networks using encounter tickets,‖ in Proc. IEEE INFOCOM, 2009, pp. 2428–2436. [16] Y. Ren, M. C. Chuah, J. Yang, and Y. Chen, Detecting wormhole attacks in delay tolerant networks,‖ IEEEWireless Commun.Mag., vol.17, no. 5, pp. 36–42, Oct. 2010. [17] U. Shevade, H. Song, L. Qiu, and Y. Zhang, Incentive-aware routing in dtns,‖ in Proc. IEEE ICNP, 2008, pp. 238–247. www.theijes.com The IJES Page 72