Black Hole Attack in Delay Tolerant Networks: A Survey
Keywords:
Wireless Networks, Delay Tolerant Networks, Security, Black Hole AttackAbstract
Delay-Tolerant Network is a network above networks having unique characteristics like intermittent connectivity, longer delays and constraints on resources. DTN have the capability to survive long delays to achieve interoperability between the regional networks. Since nodes are intermittently connected with each other some new future prediction based routing protocols like Prophet, MaxProp have been proposed in this emerging areas for communication purposes. These future prediction based routing protocols depends on some easily modifiable metrics; attackers can easily forge these parameters to attack the network. This paper discusses one such popular Black-Hole attack on these routing protocols and some of the proposed solutions to mitigate their effect in the network.
References
F. Warthman. “Delay-tolerant networks (dtns): A tutorial”, 2003.
Amin Vahdat and David Becker. “Epidemic routing for partially connected ad hoc networks”, Technical Report CS-2000-06, Department of Computer Science, Duke University, April 2000.
Shikha Jain, Sandhya Aneja. “Spread and Erase: Efficient Routing Algorithm Based on Anti-Message Info Relay Hubs for Delay Tolerant Networks”, In Computer Networks & Communications (NetCom), Vol. 131 (2013), pp. 643-651.
Guoliang Liu; Krishnamani, J.; Sunderraman, R.; Yingshu Li, "Prediction-based routing with packet scheduling under temporal constraint in delay tolerant networks," Performance Computing and Communications Conference (IPCCC), 2013 IEEE 32nd International , vol., no., pp.1,7, 6-8 Dec. 2013
J.Burgess, B.Gallagher, D.Jensen and B.N.Levine, “Maxprop: Routing for vehicle-based disruption-tolerant networking,” in Proceedings of IEEE Infocom, April 2006.
A. Lindgren, A. Doria, and O. Schelen, “Probabilistic routing in intermittently connected networks,” in Mobile Computing and Communications Review, 2003.
A. Balasubramanianm, B. Levine, and A. Venkataramani. “DTN routing as a resource allocation problem”, In Proc. of ACM SIGCOMM, 2007.
S. C. Nelson, M. Bakht and R. Kravets, “Encounter-based Routing in DTNs”, in Proceedings of IEEE Infocom, Rio De Janeiro, Brazil, pp.846-854, Apr. 2009.
http://www.netlab.tkk.fi/tutkimus/dtn/theone
Yanzhi Ren, Mooi Choo CHuah, Jie Yang, Yingying Chen, “MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks”.
M. Chuah, P. Yang, and J. Han, "A ferry-based intrusion detection scheme for sparsely connected adhoc networks," in Proceedings of first workshop on security for emerging ubiquotous computing, 2007.
Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Chen, “Detecting Blackhole attacks in Disruption-Tolerant Networks through packet exchange recording”.
M. E. Mahmoud, M. Barua, X. Shen, “SATS: Secure Data-Forwarding Scheme for Delay-Tolerant Wireless Networks.”
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
