Black Hole Attack in Delay Tolerant Networks: A Survey

Authors

  • Shikha Jain Department of Computer Science, Delhi University, India

Keywords:

Wireless Networks, Delay Tolerant Networks, Security, Black Hole Attack

Abstract

Delay-Tolerant Network is a network above networks having unique characteristics like intermittent connectivity, longer delays and constraints on resources. DTN have the capability to survive long delays to achieve interoperability between the regional networks. Since nodes are intermittently connected with each other some new future prediction based routing protocols like Prophet, MaxProp have been proposed in this emerging areas for communication purposes. These future prediction based routing protocols depends on some easily modifiable metrics; attackers can easily forge these parameters to attack the network. This paper discusses one such popular Black-Hole attack on these routing protocols and some of the proposed solutions to mitigate their effect in the network.

References

F. Warthman. “Delay-tolerant networks (dtns): A tutorial”, 2003.

Amin Vahdat and David Becker. “Epidemic routing for partially connected ad hoc networks”, Technical Report CS-2000-06, Department of Computer Science, Duke University, April 2000.

Shikha Jain, Sandhya Aneja. “Spread and Erase: Efficient Routing Algorithm Based on Anti-Message Info Relay Hubs for Delay Tolerant Networks”, In Computer Networks & Communications (NetCom), Vol. 131 (2013), pp. 643-651.

Guoliang Liu; Krishnamani, J.; Sunderraman, R.; Yingshu Li, "Prediction-based routing with packet scheduling under temporal constraint in delay tolerant networks," Performance Computing and Communications Conference (IPCCC), 2013 IEEE 32nd International , vol., no., pp.1,7, 6-8 Dec. 2013

J.Burgess, B.Gallagher, D.Jensen and B.N.Levine, “Maxprop: Routing for vehicle-based disruption-tolerant networking,” in Proceedings of IEEE Infocom, April 2006.

A. Lindgren, A. Doria, and O. Schelen, “Probabilistic routing in intermittently connected networks,” in Mobile Computing and Communications Review, 2003.

A. Balasubramanianm, B. Levine, and A. Venkataramani. “DTN routing as a resource allocation problem”, In Proc. of ACM SIGCOMM, 2007.

S. C. Nelson, M. Bakht and R. Kravets, “Encounter-based Routing in DTNs”, in Proceedings of IEEE Infocom, Rio De Janeiro, Brazil, pp.846-854, Apr. 2009.

http://www.netlab.tkk.fi/tutkimus/dtn/theone

Yanzhi Ren, Mooi Choo CHuah, Jie Yang, Yingying Chen, “MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks”.

M. Chuah, P. Yang, and J. Han, "A ferry-based intrusion detection scheme for sparsely connected adhoc networks," in Proceedings of first workshop on security for emerging ubiquotous computing, 2007.

http://www.isi.edu/nsnam/ns

Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Chen, “Detecting Blackhole attacks in Disruption-Tolerant Networks through packet exchange recording”.

M. E. Mahmoud, M. Barua, X. Shen, “SATS: Secure Data-Forwarding Scheme for Delay-Tolerant Wireless Networks.”

Downloads

Published

2014-04-30

How to Cite

[1]
S. Jain, “Black Hole Attack in Delay Tolerant Networks: A Survey”, Int. J. Comp. Sci. Eng., vol. 2, no. 4, pp. 172–175, Apr. 2014.

Issue

Section

Survey Article