Mitigating Routing Misbehavior in Disruption Tolerant Networks
DOI:
https://doi.org/10.26438/ijcse/v10i5.3035Keywords:
Disruption Tolerant Networks, Detection, Mitigation, Routing Misbehaviour, SecurityAbstract
Destructive Tolerance Network (DTN) can drop packets received by selfish or malicious nodes. These routing malfunctions slow down packet delivery and waste system resources such as power and bandwidth. Techniques have been proposed to mitigate routing malfunctions in mobile ad hoc networks, but they cannot be applied directly to DTN due to the intermittent connections between the nodes. To address this issue, we propose a distributed method to detect packet drops on the DTN. In our scheme, the node should keep a signed contact record for the previous contact. Based on this, the next node to contact can determine if the node dropped the packet. Rogue nodes can falsely report contact records to avoid detection, so a small portion of each contact record is distributed to the specified number of watch nodes and the appropriate contact record. Can be collected to identify rogue nodes. We also propose a scheme to mitigate incorrect routing behavior by limiting the number of packets forwarded to malicious nodes. Trace-based simulations show that our solution is efficient and can effectively mitigate routing fraud.
References
[1] W. Gao and G. Cao, “User-centric data dissemination in disruption tolerant networks,” in Proc. IEEE INFOCOM, pp. 3119–3127, 2011.
[2] H. Yang, J. Shu, X. Meng, and S. Lu, “Scan: Self-organized network-layer security in mobile ad hoc networks,” IEEE J. Sel. Areas Commun., vol. 24, no. 2, pp. 261–273, 2006.
[3] K. Fall, “Providing fault-tolerant ad-hoc routing service in adversarial environments,” in Proc. SIGCOMM, pp. 27–34, 2003.
[4] J. Burgess, B. Gallagher, D. Jensen, and B. Levine, “Maxprop: Routing for vehicle-based disruption-tolerant networks,” in Proc. IEEE INFOCOM, pp. 1–11, 2006.
[5] E. Daly and M. Haahr, “Social network analysis for routing in disconnected delay-tolerant manets,” in Proc. ACM MobiHoc, pp.32–40, 2007.
[6] V. Erramilli, A. Chaintreau,M. Crovella, and C. Diot, “Delegation forwarding,” in Proc. ACM MobiHoc, pp. 251–260, 2008.
[7] S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehaviorin mobile ad hoc networks,” in Proc. ACM MobiCom, pp.255–265, 2000.
[8] H. Yang, J. Shu, X. Meng, and S. Lu, “Scan: Self-organized network-layer security in mobile ad hoc networks,” IEEE J. Sel. AreasCommun., vol. 24, no. 2, pp. 261–273, 2006.
[9] K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, “An acknowledgment-based approach for the detection of routing misbehavior inMANETs,” IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536–550, May 2007.
[10] B. Burns, O. Brock, and B.N. Levine. “MV routing and capacity building in disruption tolerant networks”. In Proc. IEEE INFOCOM, pp.398– 408, March 2017.
[11] J. Davis, A. Fagg, and B.N. Levine. “Wearable Computers and Packet Transport Mechanisms in Highly Partitioned Ad hoc Networks”. In Proc. IEEE Intl. Symposium on Wearable Computers, pp.141–148, October 2018.
[12] J. Yang and C.-K. Lee Y. Chen, M. Ammar. ”Ferry Replacement Protocols In Sparse Manet Message Ferrying Systems”. In Proc. IEEE Wireless Communications and Networking (WCNC), March 2005.
[13] W. Zhao and M. Ammar. Message Ferrying: Proactive Routing In Highly-Partitioned Wireless Ad Hoc Networks. In Proc. IEEE Workshop on Future Trends in Distributed Computing Systems, May 2003.
[14] W. Zhao, M. Ammar, and E. Zegura. A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad hoc Networks. In Proc. ACM Mobihoc, May 2004.
[15] W. Zhao, M. Ammar, and E. Zegura. Controlling the mobility of multiple data transport ferries in a delay-tolerant network. In IEEE INFOCOM, 2005.
[16]Yookesh, T. L., et al. "Efficiency of iterative filtering method for solving Volterra fuzzy integral equations with a delay and material investigation." Materials today: Proceedings 47: 6101-6104, 2021.
[17]Kumar E. Boopathi, and V. Thiagarasu. "Segmentation using Fuzzy Membership Functions: An Approach." IJCSE, Vol.5, Issue.3, pp.101-105, 2017.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
