Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

SRSnF: A Strategy for Secured Routing in Spray and Focus Routing Protocol for DTN

  • Conference paper
Advances in Computing and Information Technology

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 176))

Abstract

This paper deals with the aspect of security in Delay Tolerant Networks (DTN). DTNs are characterized with decentralized control. Network performance and trustworthiness of transmitted information in DTNs depend upon the level of co-operation among participating nodes. As a result, DTNs are vulnerable towards untoward activities arising out of node selfishness as well as malicious intentions. In this paper, we limit our focus to the Black Hole Denial-of-Service attack. We develop a table-based strategy to record network history and use this information to detect discrepancies in the behavior of nodes, followed by elimination of those detected as malicious. We explain our detection mechanism considering Spray & Focus routing protocol as the representative routing scheme. The detection mechanism has been described in detail with examples pertaining to various case scenarios. Furthermore, we study the effect of variation of various parameters on detection efficiency and message transmission through simulation results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Fall, K.: A Delay Tolerant Network Architecture for Challenged Internets. In: Proc. ACM SIGCOMM, pp. 27–34 (2003)

    Google Scholar 

  2. Spyropoulos, T., et al.: Spray & Focus: Efficient Mobility-Assisted Routing For Heterogeneous & Correlated Mobility. In: Proc. Fifth IEEE PERCOM Workshops 2007 (2007)

    Google Scholar 

  3. Lindgreny: Probabilistic Routing in Intermittently Connected Networks. In: Proc. ACM SIGMOBILE Mobile Computing & Communications Review, vol. 7 (July 2003)

    Google Scholar 

  4. Burgess, J., et al.: Maxprop: Routing for vehicle-based disruption-tolerant networking. In: Proc. INFOCOM (April 2006)

    Google Scholar 

  5. Kernen, et al.: The ONE Simulator for DTN Protocol Evaluation. In: Proc. of the 2nd Int‘l Conf. on Simulation Tools & Techniques, Simutools 2009, Belgium (2009)

    Google Scholar 

  6. Chuah, M., et al.: A Ferry based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks. In: Proc. MOBIQUITOUS (August 2007)

    Google Scholar 

  7. Ren, Y., et al.: MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks. In: Proc. IEEE WCNC (2010)

    Google Scholar 

  8. Li, F., et al.: Thwarting Blackhole Attacks in Distruption-Tolerant Networks using Encounter Tickets. In: Proc. INFOCOM (2009)

    Google Scholar 

  9. Ren, Y., et al.: Detecting Blackhole Attacks in Disruption-Tolerant Networks through Packet Exchange Recording. In: Proc. IEEE WoWMoM (2010)

    Google Scholar 

  10. Zhu, H., et al.: SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks. IEEE Trans. on Vehicular Tech. 58 (October 2009)

    Google Scholar 

  11. Lu, R., et al.: Pi: A Practical Incentive Protocol for Delay Tolerant Networks. IEEE Trans. on Wireless Communications 9(4) (April 2010)

    Google Scholar 

  12. Li, Q., et al.: Routing in Socially Selfish Delay Tolerant Networks. In: Proc. of INFOCOM, pp. 857–865 (2010)

    Google Scholar 

  13. Ning, T., et al.: Incentive-Aware Data Dissemination in Delay-Tolerant Mobile Networks. In: Proc. of SECON (2011)

    Google Scholar 

  14. Saha, S., et al.: Secured Routing in DTNs: Threats & Counter-measures. In: Ph.D. Forum, ICDCN (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sujoy Saha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Saha, S., Verma, R., Sengupta, S., Mishra, V., Nandi, S. (2012). SRSnF: A Strategy for Secured Routing in Spray and Focus Routing Protocol for DTN. In: Meghanathan, N., Nagamalai, D., Chaki, N. (eds) Advances in Computing and Information Technology. Advances in Intelligent Systems and Computing, vol 176. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31513-8_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31513-8_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31512-1

  • Online ISBN: 978-3-642-31513-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics