MUTON: Detecting malicious nodes in disruption-tolerant networks

Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Chen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

33 Scopus citations

Abstract

The Disruption Tolerant Networks (DTNs) are vulnerable to insider attacks, in which the legitimate nodes are compromised and the adversary modifies the delivery metrics of the node to launch harmful attacks in the networks. The traditional detection approaches of secure routing protocols can not address such kind of insider attacks in DTNs. In this paper, we propose a mutual correlation detection scheme (MUTON) for addressing these insider attacks. MUTON takes into consideration of the transitive property when calculating the packet delivery probability of each node and correlates the information collected from other nodes. We evaluated our approach through extensive simulations using both Random Way Point and Zebranet mobility models. Our results show that MUTON can detect insider attacks efficiently with high detection rate and low false positive rate.

Original languageEnglish (US)
Title of host publication2010 IEEE Wireless Communications and Networking Conference, WCNC 2010 - Proceedings
DOIs
StatePublished - 2010
Externally publishedYes
EventIEEE Wireless Communications and Networking Conference 2010, WCNC 2010 - Sydney, NSW, Australia
Duration: Apr 18 2010Apr 21 2010

Publication series

NameIEEE Wireless Communications and Networking Conference, WCNC
ISSN (Print)1525-3511

Other

OtherIEEE Wireless Communications and Networking Conference 2010, WCNC 2010
Country/TerritoryAustralia
CitySydney, NSW
Period4/18/104/21/10

All Science Journal Classification (ASJC) codes

  • Engineering(all)

Fingerprint

Dive into the research topics of 'MUTON: Detecting malicious nodes in disruption-tolerant networks'. Together they form a unique fingerprint.

Cite this