Mitigating Routing Misbehavior in Disruption Tolerant Networks

Authors

  • S Devadharshini PG Student, Department of Information Technology, Bharathiar University, Tamil Nadu India
  • R Vadivel Assistant Professor, Department of Information Technology, Bharathiar University, Tamil Nadu, India

DOI:

https://doi.org/10.26438/ijcse/v10i5.3035

Keywords:

Disruption Tolerant Networks, Detection, Mitigation, Routing Misbehaviour, Security

Abstract

Destructive Tolerance Network (DTN) can drop packets received by selfish or malicious nodes. These routing malfunctions slow down packet delivery and waste system resources such as power and bandwidth. Techniques have been proposed to mitigate routing malfunctions in mobile ad hoc networks, but they cannot be applied directly to DTN due to the intermittent connections between the nodes. To address this issue, we propose a distributed method to detect packet drops on the DTN. In our scheme, the node should keep a signed contact record for the previous contact. Based on this, the next node to contact can determine if the node dropped the packet. Rogue nodes can falsely report contact records to avoid detection, so a small portion of each contact record is distributed to the specified number of watch nodes and the appropriate contact record. Can be collected to identify rogue nodes. We also propose a scheme to mitigate incorrect routing behavior by limiting the number of packets forwarded to malicious nodes. Trace-based simulations show that our solution is efficient and can effectively mitigate routing fraud.

References

[1] W. Gao and G. Cao, “User-centric data dissemination in disruption tolerant networks,” in Proc. IEEE INFOCOM, pp. 3119–3127, 2011.

[2] H. Yang, J. Shu, X. Meng, and S. Lu, “Scan: Self-organized network-layer security in mobile ad hoc networks,” IEEE J. Sel. Areas Commun., vol. 24, no. 2, pp. 261–273, 2006.

[3] K. Fall, “Providing fault-tolerant ad-hoc routing service in adversarial environments,” in Proc. SIGCOMM, pp. 27–34, 2003.

[4] J. Burgess, B. Gallagher, D. Jensen, and B. Levine, “Maxprop: Routing for vehicle-based disruption-tolerant networks,” in Proc. IEEE INFOCOM, pp. 1–11, 2006.

[5] E. Daly and M. Haahr, “Social network analysis for routing in disconnected delay-tolerant manets,” in Proc. ACM MobiHoc, pp.32–40, 2007.

[6] V. Erramilli, A. Chaintreau,M. Crovella, and C. Diot, “Delegation forwarding,” in Proc. ACM MobiHoc, pp. 251–260, 2008.

[7] S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehaviorin mobile ad hoc networks,” in Proc. ACM MobiCom, pp.255–265, 2000.

[8] H. Yang, J. Shu, X. Meng, and S. Lu, “Scan: Self-organized network-layer security in mobile ad hoc networks,” IEEE J. Sel. AreasCommun., vol. 24, no. 2, pp. 261–273, 2006.

[9] K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, “An acknowledgment-based approach for the detection of routing misbehavior inMANETs,” IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536–550, May 2007.

[10] B. Burns, O. Brock, and B.N. Levine. “MV routing and capacity building in disruption tolerant networks”. In Proc. IEEE INFOCOM, pp.398– 408, March 2017.

[11] J. Davis, A. Fagg, and B.N. Levine. “Wearable Computers and Packet Transport Mechanisms in Highly Partitioned Ad hoc Networks”. In Proc. IEEE Intl. Symposium on Wearable Computers, pp.141–148, October 2018.

[12] J. Yang and C.-K. Lee Y. Chen, M. Ammar. ”Ferry Replacement Protocols In Sparse Manet Message Ferrying Systems”. In Proc. IEEE Wireless Communications and Networking (WCNC), March 2005.

[13] W. Zhao and M. Ammar. Message Ferrying: Proactive Routing In Highly-Partitioned Wireless Ad Hoc Networks. In Proc. IEEE Workshop on Future Trends in Distributed Computing Systems, May 2003.

[14] W. Zhao, M. Ammar, and E. Zegura. A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad hoc Networks. In Proc. ACM Mobihoc, May 2004.

[15] W. Zhao, M. Ammar, and E. Zegura. Controlling the mobility of multiple data transport ferries in a delay-tolerant network. In IEEE INFOCOM, 2005.

[16]Yookesh, T. L., et al. "Efficiency of iterative filtering method for solving Volterra fuzzy integral equations with a delay and material investigation." Materials today: Proceedings 47: 6101-6104, 2021.

[17]Kumar E. Boopathi, and V. Thiagarasu. "Segmentation using Fuzzy Membership Functions: An Approach." IJCSE, Vol.5, Issue.3, pp.101-105, 2017.

Downloads

Published

2022-05-31
CITATION
DOI: 10.26438/ijcse/v10i5.3035
Published: 2022-05-31

How to Cite

[1]
S. Devadharshini and R. Vadivel, “Mitigating Routing Misbehavior in Disruption Tolerant Networks”, Int. J. Comp. Sci. Eng., vol. 10, no. 5, pp. 30–35, May 2022.

Issue

Section

Research Article