scholarly journals Malicious Node Detection in Delay Tolerance Network

Author(s):  
Er. Ashu Garg ◽  
Sourav

Delay tolerant networks (DTNs), such as sensor networks with scheduled intermittent connectivity, vehicular DTNs that disseminate location-dependent information, and pocket-switched networks that allow humans to communicate without network infrastructure, are highly partitioned networks that may suffer from frequent disconnectivity. In DTNs, the in-transit messages, also named bundles, can be sent over an existing link and buffered at the next hop until the next link in the path appears. This message propagation process is usually referred to as the “store-carry-and-forward” strategy, and the routing is decided in an “opportunistic” fashion. We aim to evaluate the added effect of the presence of malicious nodes on ad hoc network performance, and determine appropriate measures to detect malicious nodes. A malicious node advertising itself as having a valid route to the destination. With this intension the attacker consumes or intercepts the packet without any forwarding. An attacker can completely modify the packet and generate fake information, this cause the network traffic diverted or dropped. Let H be a malicious node. When H receives a Route Request, it sends back a Route Reply immediately, which constructs the data and can be transmitted by itself with the shortest path. So S receives Route Reply and it is replaced by H->S. then H receives all the data from S. In this research we propose a new assesment based scheme for detection of Malicious Nodes in DTN. And examine different strategies for prevention to malicious nodes as well as Compare out come proposed scheme with the earliest established schemes.

2011 ◽  
Vol 7 (1) ◽  
pp. 1 ◽  
Author(s):  
Bruno M. C. Silva ◽  
Vasco N. G. J. Soares ◽  
Joel J. P. C. Rodrigues

Vehicular delay-tolerant networks (VDTNs) are opportunistic networks that enable connectivity in challenged scenarios with unstable links where end-to-end communications may not exist. VDTN architecture handles non-real timeapplications using vehicles to relay messages between network nodes. To address the problem of intermittent connectivity, network nodes store messages on their buffers, carrying them through the network while waiting for transfer opportunities. The storage capacity of the nodes affects directly the network performance. Therefore, it is important to incorporate suitable network protocols using self-contained messages to improve communication that supports store-carry-and-forward operation procedures. Clearly, such procedures motivate content cachingand retrieval. This paper surveys the state-of-the art on intelligent caching and retrieval mechanisms focusing on ad-hoc and delay tolerant networks (DTN). These approaches can offer important insights for upcoming proposals on intelligent caching and retrieval mechanisms for VDTNs.


Nodes are important aspect of Mobile network. Mobile ad-hoc network means any network that is made at the time of need. Ad-hoc network has its own place in networking. Mobility in network makes it more demandable. Nodes are the device that takes part in network or makes network. Nodes behavior describes network configuration. Genuine node insures you proper working of network with best results as throughput or packet ratio. Presence of malicious nodes differs in comparison to genuine node. Malicious node degrades output of network. Performance metrics noted degradation in their quality when malicious node encounters in network. Malicious nodes in different sets of node density affect the network in different way


Author(s):  
Ali Kamil Ahmed ◽  
Mohanad Najm Abdulwahed ◽  
Behnam Farzaneh

<p>Vehicular Ad-hoc Networks (VANETs) are one of the most important types of networks which are widely used in recent years. Along with all the benefits of Quality of Service (QoS) improvements, vulnerability analysis for this type of networks is an important issue. For instance, a Gray-hole attack decreases network performance. We proposed a novel solution to help to secure these networks against this vulnerability. The proposed method can detect and prevent the Gray-hole attack. Anywhere in the network, each node (vehicle) can distinguish between the Gray-hole attack and the failed link. Some topology related information helps us to detect attacks more accurately. Also, the proposed method uses the most reliable path in terms of link failure when there is no malicious node. In this paper, we used the TOPSIS method for choosing the most trusted node for routing intelligently. We validated our proposal using a simulation model in the NS-2 simulator. Simulation results show that the proposed method can prevent Gray-hole attack efficiently with low overhead.</p>


Author(s):  
Santosh Sahu ◽  
Sanjeev Sharma

A cross layer QoS framework is a complete system that provides required QoS services to each node present in the network. All components within it cooperate together for providing the required services. In existing QoS frameworks there is no security mechanism provided while Security is a critical aspect for QoS in the MANET environment. Cross layer QoS framework  tend to be vulnerable to a number of threats and attacks like, over/under-reporting of available bandwidth, over-reservation, state table starvation, QoS degradation,  information disclosure, theft of services timing attack, flooding attack, replay attack, and denial of service (DoS) attack,  attacks on information in transit and attacks against routing. So it is necessary when designing protocols for QoS framework, the harmony between security and QoS must be present as one impacts the others. In this work we proposed secure and proficient cross layer (SPCL) QoS frameworks which prevents from various types of threats and attacks.  The proposed SPCL QoS framework achieves better performance compared to existing QoS frameworks  in metrics of throughput, packet drop ratio, end-to-end delay, and average jitter in both condition when malicious node present in the network and when malicious node not present in the network


2019 ◽  
Vol 10 (2) ◽  
pp. 80-90
Author(s):  
Munesh C. Trivedi ◽  
Sachin Malhotra

Ad-hoc networks consist of a set of autonomous communicating devices that can communicate with each other by establishing multi-hop radio connections, and these connections are maintained in a localized manner. In these types of networks, especially where the nature of communicating nodes is mobile, e.g., MANETs, maintaining security remains a serious challenge due to their wireless, open, and shared communication medium, reliance on cooperative algorithms, dynamically adaptable topologies, an absence of centralized watching points, etc. Most of the existing protocols, utilized for routing in MANETs are susceptible to diverse varieties of attacks. However, it is also susceptible to the well-known gray and black hole attacks. In these types of attacks, malicious nodes are incorrectly advertised as sensible ways to a destination node throughout the route discovery method. This attack becomes complicated when a bunch of malicious nodes are acting together. In this work, a novel mechanism is introduced to identify the malicious node or nodes that have tried to perform malicious activity. Here, identification is made by their increased data routing information (DRI).


Sensors ◽  
2020 ◽  
Vol 20 (11) ◽  
pp. 3330
Author(s):  
DooHo Keum ◽  
Jihun Lim ◽  
Young-Bae Ko

In tactical ad-hoc networks, the importance of various tactical sensors and mission-critical data is increasing owing to their role in determining a tactical situation and ensuring the viability of soldiers. In particular, the reliability of mission-critical data has to be ensured for accurate situation determination and decision making. However, managing the network and trustworthiness in an environment where malicious nodes exist and a large amount of mission-critical data occur is a challenging issue. To solve these issues, a routing protocol is needed that can effectively detect malicious nodes and ensure the reliability and quality of service (QoS) of mission-critical data. In this paper, we propose a trust-based multipath QoS routing protocol (called MC_TQR) for tactical ad-hoc networks that can detect malicious nodes and satisfy the requirements of mission-critical data. The proposed scheme is verified using an OPNET simulator, and the results confirm the improved network performance when compared with existing schemes.


Opportunistic forwarding mechanism in Delay Tolerant Networks (DTN), are prone to get disconnected from the nodes in the network. These types of networks deal with intermittent connectivity, large delays.Existing routing protocols of DTNs fights with these issues, but fail to integrate the security available for delay tolerant networks,it is necessary to design a secure routing protocol to overcome these issues. There are centralized Trust Authority (TA) based security systems but the disconnection or failure of TA, affects the security model and network performance. It becomes crucial to have the distributed approach for security system and have multiple TAs working on security model. This reduces the possibility of poor network performance. The paper presents a distributed misbehavior detection system, and implements multiple TAs for implementing the security model for DTN.


Author(s):  
A. S. M. Muntaheen ◽  
Milton Chandro Bhowmick ◽  
Md. Raqibul Hasan Rumman ◽  
Nayeem Al-Tamzid Bhuiyan ◽  
Md. Taslim Mahmud Bhuyain ◽  
...  

A self-organized wireless communication short-lived network containing collection of mobile nodes is mobile ad hoc network (MANET). The mobile nodes communicate with each other by wireless radio links without the use of any pre-established fixed communication network infrastructure or centralized administration, such as base stations or access points, and with no human intervention. In addition, this network has potential applications in conference, disaster relief, and battlefield scenario, and have received important attention in current years. There is some security concern that increases fear of attacks on the mobile ad-hoc network. The mobility of the NODE in a MANET poses many security problems and vulnerable to different types of security attacks than conventional wired and wireless networks. The causes of these issues are due to their open medium, dynamic network topology, absence of central administration, distributed cooperation, constrained capability, and lack of clear line of defense. Without proper security, mobile hosts are easily captured, compromised, and attacked by malicious nodes. Malicious nodes behavior may deliberately disrupt the network so that the whole network will be suffering from packet losses. One of the major concerns in mobile ad-hoc networks is a traffic DoS attack in which the traffic is choked by the malicious node which denied network services for the user. Mobile ad-hoc networks must have a safe path for transmission and correspondence which is a serious testing and indispensable issue. So as to provide secure communication and transmission, the scientist worked explicitly on the security issues in versatile impromptu organizations and many secure directing conventions and security measures within the networks were proposed. The goal of the work is to study DoS attacks and how it can be detected in the network. Existing methodologies for finding a malicious node that causes traffic jamming is based on node’s retains value. The proposed approach finds a malicious node using reliability value determined by the broadcast reliability packet (RL Packet). In this approach at the initial level, every node has zero reliability value, specific time slice, and transmission starts with a packet termed as reliability packet, node who responded properly in specific time, increases its reliability value and those nodes who do not respond in a specific time decreases their reliability value and if it goes to less than zero then announced that it’s a malicious node. Reliability approach makes service availability and retransmission time.


The general behavior of Mobile AdHoc Networks (MANETs) is different in certain stages due to its mode of operations and maintenance as well as factors such as NodeEnergy level, manipulation energy, randomly movable nature and the topology-changes. These type of dynamicity causes or needs over concentration and needs more security with routingstability. For eliminating these issues and improve the security, a new methodology called Fuzzy Secured Node Selection Routing (FSNSR) is defined, which provides the Trusted-Network-Service and better performance with energy efficiency in security and dynamicity perspectives. This algorithm FSNSR provides highreliability and dynamicity to nodes, which can move frequently without any security causes and attain more robustness during performance. The selection of next node selection and forwarding is purely based on the link-stability and nextneighbor availability, which is ensured by means of the parental node by sending route-request and getting response for the request. Once the neighbor provides the response properly for the raised request the node will be treated as a next successful neighbor, otherwise the node will be considered as a malicious node and which cannot be considered for next process further. The survey results further to guarantee regarding the network robustness, dynamicity, good packet delivery ratio, goodput and secure-routing over MANET with the help of Fuzzy Secured Node Selection Routing.


Author(s):  
Sweta Jain ◽  
Vasco N.G.J. Soares

Delay-tolerant networks (DTN) is an approach to deal with scarce network connectivity found in sparse mobile ad-hoc networks (MANETs) which makes the problem of routing messages a challenging task. DTNs have find their usefulness in many challenging environments such as tactical networks, underwater sensor networks, wildlife monitoring, disaster recovery etc. Pocket Switched Networks (PSNs) have emerged as a new application of the delay tolerant networks where network nodes are computing devices carried by humans. Hence, the study of how humans interact in their day-to-day life, the places they visit frequently, the people they meet frequently, the social groups in which they participate on regular basis etc. can help improve routing process in PSNs. This type of routing inspired from the way humans interact with each other is referred to as social based routing and had been a recent topic of research in the field of DTNs. This paper presents a comprehensive survey of the various social-based algorithms that have been designed for Delay Tolerant Networks.


Sign in / Sign up

Export Citation Format

Share Document