Title :
Secure efficient routing based on network coding in the delay tolerant networks
Author :
Jianmin Bao ; Shu Zhang ; Junjie Zhang ; Kun Wang ; Haifeng Hu
Author_Institution :
Key Lab. of Broadband Wireless Commun. & Sensor Network Technol., Nanjing Univ. of Posts & Telecommun., Nanjing, China
Abstract :
The Delay/Disruption Tolerant Network (DTN) is characterized with long delay, high bit-error rate, intermittent connectivity and frequent partitions. Due to this, network coding is introduced to improve its transmission performance significantly. Numerous DTN routing algorithms based on network coding have been developed. However, they are susceptible to various malicious attacks. In this paper, we propose a new kind of networking scheme suitable to the DTN, which can resist the eavesdropping attacks to a certain extant. Firstly, we establish a DTN network model based on the packet path optimization allocation algorithm and redefine the packet format to meet the algorithm requirements. Meanwhile, to resist the dropping attacks, the source node dynamically adds redundancy factors at the certain time. Then the pollution attacks and the data tampering attacks can almost be resisted by means of mutual authentication between intermediate nodes. This approach avoids the traditional anti-tampering attack algorithm over-reliant on the source node. The security analysis and simulation results show that our scheme can effectively resist the joint attacks and optimize the network performance.
Keywords :
delay tolerant networks; network coding; optimisation; telecommunication network routing; telecommunication security; DTN routing algorithms; bit-error rate; data tampering attacks; delay tolerant networks; disruption tolerant network; dropping attacks; eavesdropping attacks; frequent partitions; intermediate nodes; intermittent connectivity; malicious attacks; mutual authentication; network coding; packet path optimization allocation algorithm; pollution attacks; secure efficient routing algorithm; Delays; Encoding; Equations; Mathematical model; Network coding; Routing; Security; delay tolerant networks (DTNs); joint-attack; network coding;
Conference_Titel :
Software Engineering and Service Science (ICSESS), 2014 5th IEEE International Conference on
Conference_Location :
Beijing
Print_ISBN :
978-1-4799-3278-8
DOI :
10.1109/ICSESS.2014.6933604