Title :
Trust management and adversary detection for delay tolerant networks
Author :
Ayday, Erman ; Lee, Hanseung ; Fekri, Faramarz
Author_Institution :
Sch. of Electr. & Comp. Eng., Georgia Inst. of Technol., Atlanta, GA, USA
fDate :
Oct. 31 2010-Nov. 3 2010
Abstract :
Delay Tolerant Networks (DTNs) have been identified as one of the key areas in the field of wireless communications. They are characterized by large end-to-end communication latency and the lack of end-to-end path from a source to its destination. These characteristics pose several challenges to the security of DTNs. Especially, Byzantine attacks give serious damages to the network in terms of latency and data availability. Using reputation-based trust management systems is shown to be an effective way to handle the adversarial behavior in Mobile Ad-Hoc Networks (MANETs). However, because of the unique characteristics of DTNs, the techniques to build a trust mechanism for MANETs do not apply to DTNs. Our main objective in this paper is to develop a robust trust mechanism and an efficient and low cost malicious node detection technique for DTNs. Inspired by our recent results on reputation management for online systems and e-commerce, we developed an iterative malicious node detection mechanism for DTNs which is far more effective than existing techniques. Our results indicate the proposed scheme provides high data availability and packet-delivery ratio with low latency in DTNs under adversary attacks.
Keywords :
mobile ad hoc networks; mobility management (mobile radio); telecommunication network reliability; telecommunication security; DTN security; MANET; adversary detection; data availability; delay tolerant networks; e-commerce; end-to-end communication latency; end-to-end path; iterative malicious node detection mechanism; mobile ad-hoc networks; node detection technique; online systems; packet-delivery ratio; reputation-based trust management systems; wireless communications; Ad hoc networks; Authentication; Availability; Filtering; Mobile computing; Protocols;
Conference_Titel :
MILITARY COMMUNICATIONS CONFERENCE, 2010 - MILCOM 2010
Conference_Location :
San Jose, CA
Print_ISBN :
978-1-4244-8178-1
DOI :
10.1109/MILCOM.2010.5680245