Title :
Detecting blackhole attacks in Disruption-Tolerant Networks through packet exchange recording
Author :
Ren, Yanzhi ; Chuah, Mooi Choo ; Yang, Jie ; Chen, Yingying
Author_Institution :
Dept. of ECE, Stevens Inst. of Technol., Hoboken, NJ, USA
Abstract :
The Disruption Tolerant Networks (DTNs) are especially useful in providing mission critical services such as in emergency networks or battlefield scenarios. However, DTNs are vulnerable to insider attacks, in which the legitimate nodes are compromised and the adversary nodes launch blackhole attacks by dropping packets in the networks. The traditional approaches of securing routing protocols can not address such insider attacks in DTNs. In this paper, we propose a method to secure the history records of packet delivery information at each contact so that other nodes can detect insider attacks by analyzing these packet delivery records. We evaluated our approach through extensive simulations using both Random Way Point and Zebranet mobility models. Our results show that our method can detect insider attacks efficiently with high detection rate and low false positive rate.
Keywords :
Equations; History; Mathematical model; Measurement; Routing; Routing protocols; Simulation;
Conference_Titel :
World of Wireless Mobile and Multimedia Networks (WoWMoM), 2010 IEEE International Symposium on a
Conference_Location :
Montreal, QC, Canada
Print_ISBN :
978-1-4244-7264-2
Electronic_ISBN :
978-1-4244-7263-5
DOI :
10.1109/WOWMOM.2010.5534944