DocumentCode :
130890
Title :
Secure efficient routing based on network coding in the delay tolerant networks
Author :
Jianmin Bao ; Shu Zhang ; Junjie Zhang ; Kun Wang ; Haifeng Hu
Author_Institution :
Key Lab. of Broadband Wireless Commun. & Sensor Network Technol., Nanjing Univ. of Posts & Telecommun., Nanjing, China
fYear :
2014
fDate :
27-29 June 2014
Firstpage :
456
Lastpage :
459
Abstract :
The Delay/Disruption Tolerant Network (DTN) is characterized with long delay, high bit-error rate, intermittent connectivity and frequent partitions. Due to this, network coding is introduced to improve its transmission performance significantly. Numerous DTN routing algorithms based on network coding have been developed. However, they are susceptible to various malicious attacks. In this paper, we propose a new kind of networking scheme suitable to the DTN, which can resist the eavesdropping attacks to a certain extant. Firstly, we establish a DTN network model based on the packet path optimization allocation algorithm and redefine the packet format to meet the algorithm requirements. Meanwhile, to resist the dropping attacks, the source node dynamically adds redundancy factors at the certain time. Then the pollution attacks and the data tampering attacks can almost be resisted by means of mutual authentication between intermediate nodes. This approach avoids the traditional anti-tampering attack algorithm over-reliant on the source node. The security analysis and simulation results show that our scheme can effectively resist the joint attacks and optimize the network performance.
Keywords :
delay tolerant networks; network coding; optimisation; telecommunication network routing; telecommunication security; DTN routing algorithms; bit-error rate; data tampering attacks; delay tolerant networks; disruption tolerant network; dropping attacks; eavesdropping attacks; frequent partitions; intermediate nodes; intermittent connectivity; malicious attacks; mutual authentication; network coding; packet path optimization allocation algorithm; pollution attacks; secure efficient routing algorithm; Delays; Encoding; Equations; Mathematical model; Network coding; Routing; Security; delay tolerant networks (DTNs); joint-attack; network coding;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Software Engineering and Service Science (ICSESS), 2014 5th IEEE International Conference on
Conference_Location :
Beijing
ISSN :
2327-0586
Print_ISBN :
978-1-4799-3278-8
Type :
conf
DOI :
10.1109/ICSESS.2014.6933604
Filename :
6933604
Link To Document :
بازگشت