An energy efficient flexible delay tolerant network with adaptive secured framework (ASF-DTN)

Delay tolerant networks are widely used in mobile communications because of network withstanding capability of delay. However, when the connectivity of nodes increases, data loss may occur while transmission. Due to the malicious behavior of nodes the data may get permanently lost, which is known as black hole attacks and there is a chance to partial data loss because of the lower energy level of a node, which is known as a gray hole attack. In existing work, the data capacity of a node is not limited, so most of the highly energy efficient node contains a huge amount of data, when compared to other nodes which may lead to random attack. To overcome this, we propose a subjective capability model (SCM) for each and every node to limit the capacity of each node. ASF-DTN prevents collision attack and injection attack by implementing Kalman filtering, which can statistically analyze the behavior of nodes while each and every transmission. Here, we propose an effective node optimization scheme using genetic algorithm with a fitness function to find out energy efficient nodes among the optimal path for effective communication and its performance.

[1]  Harry Eugene Stanley,et al.  Robustness of interdependent networks under targeted attack , 2010, Physical review. E, Statistical, nonlinear, and soft matter physics.

[2]  Savitha,et al.  Detecting and Eliminating Grey Hole Attack in Delay Tolerant Network , 2016 .

[3]  Karthikeyan Bhargavan,et al.  Transcript Collision Attacks: Breaking Authentication in TLS, IKE and SSH , 2016, NDSS.

[4]  Sarawagya Singh,et al.  A SURVEY OF MISBEHAVIORS OF NODE AND ROUTING ATTACK IN DELAY TOLERANT NETWORK , 2015 .

[5]  Pablo Rodriguez,et al.  Fair Routing in Delay Tolerant Networks , 2009, IEEE INFOCOM 2009.

[6]  K. Vengatesan,et al.  Recommendation system based on statistical analysis of ranking from user , 2013, 2013 International Conference on Information Communication and Embedded Systems (ICICES).

[7]  Poonam Sharma,et al.  Selfish nodes detection in delay tolerant networks , 2015, 2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE).

[8]  Jie Wu,et al.  Thwarting Blackhole Attacks in Disruption-Tolerant Networks using Encounter Tickets , 2009, IEEE INFOCOM 2009.

[9]  Erman Ayday,et al.  Trust management and adversary detection for delay tolerant networks , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.

[10]  Chai Kiat Yeo,et al.  Detecting colluding blackhole and greyhole attack in Delay Tolerant Networks , 2016, 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC).

[11]  Hong Cheng,et al.  Measuring robustness of complex networks under MVC attack , 2012, CIKM.

[12]  Haibo Zhang,et al.  Mitigating Blackhole Attacks in Delay Tolerant Networks , 2012, 2012 13th International Conference on Parallel and Distributed Computing, Applications and Technologies.

[13]  Sajal K. Das,et al.  Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing , 2011, IEEE Transactions on Mobile Computing.

[14]  Feng Xia,et al.  ROSE: Robustness Strategy for Scale-Free Wireless Sensor Networks , 2017, IEEE/ACM Transactions on Networking.

[15]  S. Bhargavi,et al.  The Impact of Collusion Attacks in WSN with Secure Data Aggregation System , 2015 .

[16]  Luca Maria Gambardella,et al.  Ant Algorithms for Discrete Optimization , 1999, Artificial Life.

[17]  Sajal K. Das,et al.  A trust-based framework for data forwarding in opportunistic networks , 2013, Ad Hoc Networks.