Secure interoperable architecture construction for overlay networks

Delay-tolerant networking (DTN) is an approach to computer network architecture that seeks to address the technical issues in heterogeneous networks that may lack continuous network connectivity. Examples of such networks are those operating in mobile or extreme terrestrial environments, or planned networks in space. In Disruption Tolerant Networks packets storage exists when there is any link breakage between the nodes in the network so delay is tolerable in this type of network during the data transmission. But this delay is not tolerable in wireless network for voice packet transmission. This evokes the use of wireless networks. Different wireless networks are interoperating with each other so the communication across the network is called overlay network. This network is vulnerable to attacks due to mobile behaviour of nodes. One of these is the wormhole attack. It is a critical threat to normal operation in wireless networks which results in the degradation of the network performance. It can be identified by using a technique called forbidden topology. The proposed recovery algorithm will increase the performance of the network. The performance metrics such as throughput, packet delivery ratio and delay are evaluated.

[1]  Vineet Srivastava,et al.  Wormhole Attack Detection in Mobile Ad Hoc Networks , 2012 .

[2]  Prateek Thakral,et al.  Detection and Prevention of Wormhole Attack in MANET: A Review , 2013 .

[3]  Bing Wu,et al.  Countermeasures of Network Layer Attacks in MANETs , 2011 .

[4]  Prashant Srivastava,et al.  Detection of Wormhole Attack using Hop-count and Time delay Analysis , 2012 .

[5]  David Evans,et al.  Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.

[6]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[7]  Mooi Choo Chuah,et al.  Detecting wormhole attacks in delay-tolerant networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.

[8]  Jie Gao,et al.  Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[9]  H. Vincent Poor,et al.  Secrecy Throughput of MANETs Under Passive and Active Attacks , 2011, IEEE Transactions on Information Theory.