Detecting blackhole attacks in disruption-tolerant networks through packet exchange recording

Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Chen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

28 Scopus citations

Abstract

The Disruption Tolerant Networks (DTNs) are especially useful in providing mission critical services such as in emergency networks or battlefield scenarios. However, DTNs are vulnerable to insider attacks, in which the legitimate nodes are compromised and the adversary nodes launch blackhole attacks by dropping packets in the networks. The traditional approaches of securing routing protocols can not address such insider attacks in DTNs. In this paper, we propose a method to secure the history records of packet delivery information at each contact so that other nodes can detect insider attacks by analyzing these packet delivery records. We evaluated our approach through extensive simulations using both Random Way Point and Zebranet mobility models. Our results show that our method can detect insider attacks efficiently with high detection rate and low false positive rate.

Original languageEnglish (US)
Title of host publication2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2010 - Digital Proceedings
DOIs
StatePublished - 2010
Externally publishedYes
Event2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2010 - Montreal, QC, Canada
Duration: Jun 14 2010Jun 17 2010

Publication series

Name2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2010 - Digital Proceedings

Other

Other2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2010
Country/TerritoryCanada
CityMontreal, QC
Period6/14/106/17/10

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Software

Fingerprint

Dive into the research topics of 'Detecting blackhole attacks in disruption-tolerant networks through packet exchange recording'. Together they form a unique fingerprint.

Cite this