Abstract
This paper deals with the aspect of security in Delay Tolerant Networks (DTN). DTNs are characterized with decentralized control. Network performance and trustworthiness of transmitted information in DTNs depend upon the level of co-operation among participating nodes. As a result, DTNs are vulnerable towards untoward activities arising out of node selfishness as well as malicious intentions. In this paper, we limit our focus to the Black Hole Denial-of-Service attack. We develop a table-based strategy to record network history and use this information to detect discrepancies in the behavior of nodes, followed by elimination of those detected as malicious. We explain our detection mechanism considering Spray & Focus routing protocol as the representative routing scheme. The detection mechanism has been described in detail with examples pertaining to various case scenarios. Furthermore, we study the effect of variation of various parameters on detection efficiency and message transmission through simulation results.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Fall, K.: A Delay Tolerant Network Architecture for Challenged Internets. In: Proc. ACM SIGCOMM, pp. 27–34 (2003)
Spyropoulos, T., et al.: Spray & Focus: Efficient Mobility-Assisted Routing For Heterogeneous & Correlated Mobility. In: Proc. Fifth IEEE PERCOM Workshops 2007 (2007)
Lindgreny: Probabilistic Routing in Intermittently Connected Networks. In: Proc. ACM SIGMOBILE Mobile Computing & Communications Review, vol. 7 (July 2003)
Burgess, J., et al.: Maxprop: Routing for vehicle-based disruption-tolerant networking. In: Proc. INFOCOM (April 2006)
Kernen, et al.: The ONE Simulator for DTN Protocol Evaluation. In: Proc. of the 2nd Int‘l Conf. on Simulation Tools & Techniques, Simutools 2009, Belgium (2009)
Chuah, M., et al.: A Ferry based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks. In: Proc. MOBIQUITOUS (August 2007)
Ren, Y., et al.: MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks. In: Proc. IEEE WCNC (2010)
Li, F., et al.: Thwarting Blackhole Attacks in Distruption-Tolerant Networks using Encounter Tickets. In: Proc. INFOCOM (2009)
Ren, Y., et al.: Detecting Blackhole Attacks in Disruption-Tolerant Networks through Packet Exchange Recording. In: Proc. IEEE WoWMoM (2010)
Zhu, H., et al.: SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks. IEEE Trans. on Vehicular Tech. 58 (October 2009)
Lu, R., et al.: Pi: A Practical Incentive Protocol for Delay Tolerant Networks. IEEE Trans. on Wireless Communications 9(4) (April 2010)
Li, Q., et al.: Routing in Socially Selfish Delay Tolerant Networks. In: Proc. of INFOCOM, pp. 857–865 (2010)
Ning, T., et al.: Incentive-Aware Data Dissemination in Delay-Tolerant Mobile Networks. In: Proc. of SECON (2011)
Saha, S., et al.: Secured Routing in DTNs: Threats & Counter-measures. In: Ph.D. Forum, ICDCN (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Saha, S., Verma, R., Sengupta, S., Mishra, V., Nandi, S. (2012). SRSnF: A Strategy for Secured Routing in Spray and Focus Routing Protocol for DTN. In: Meghanathan, N., Nagamalai, D., Chaki, N. (eds) Advances in Computing and Information Technology. Advances in Intelligent Systems and Computing, vol 176. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31513-8_17
Download citation
DOI: https://doi.org/10.1007/978-3-642-31513-8_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31512-1
Online ISBN: 978-3-642-31513-8
eBook Packages: EngineeringEngineering (R0)