Establishing trust relationships in OppNets using Merkle trees

Opportunistic Networks (OppNets) are exposed to a variety of attacks, among them are packet dropping attacks. The security challenges in OppNets is to effectively and securely forward data and guarantee their delivery without any loss. Security and trust in OppNets have gained popularity in research because of their inherent features, including frequent partitions, long delays and intermittent connectivity. This paper presents an efficient malicious path and malicious node detection technique against selective packet dropping attacks. In our algorithm we have developed a solid detection mechanism using the Merkle tree hashing technique. The result of malicious path detection is used to build trust by destination nodes for each path, the built trust value of nodes is then used to detect malicious nodes. Simulation results show that the technique accurately detects malicious paths. The results also show that with the increase of simulation time, node detection accuracy also increases as intermediate nodes have more time to establish trust with destination nodes.

[1]  Sajal K. Das,et al.  A trust-based framework for data forwarding in opportunistic networks , 2013, Ad Hoc Networks.

[2]  Mohammad S. Obaidat,et al.  Trust-based Security Protocol against blackhole attacks in opportunistic networks , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[3]  Franck Legendre,et al.  Social Trust in Opportunistic Networks , 2010, 2010 INFOCOM IEEE Conference on Computer Communications Workshops.

[4]  Edson dos Santos Moreira,et al.  Trust Management in Opportunistic Networks , 2010, 2010 Ninth International Conference on Networks.

[5]  Robin Doss,et al.  Defense against packet dropping attacks in opportunistic networks , 2014, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[6]  Ralph C. Merkle,et al.  Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.

[7]  Marianne Azer,et al.  A Novel Proximity Based Trust Model for Opportunistic Networks , 2013, 2013 International Conference on Availability, Reliability and Security.

[8]  Werner Vogels,et al.  Dynamo: amazon's highly available key-value store , 2007, SOSP.

[9]  Isaac Woungang,et al.  Trust Management in Opportunistic Networks: A Semantic Web Approach , 2009, 2009 World Congress on Privacy, Security, Trust and the Management of e-Business.

[10]  Karin Anna Hummel,et al.  Preventing spam in opportunistic networks , 2014, Comput. Commun..