3 Abstract: Defending the data from malicious attacks is an important yet demanding security issue. In this paper, we describe clarification for such network that protects both the routing and data forwarding functions. It guards the data by detecting and reacting to the malicious nodes. Although methods have been proposed to mitigate routing misbehavior in mobile ad hoc networks, they cannot be directly applied to DTNs because of the flashing connectivity between nodes. To overcome the problem, we propose a scheme to detect packet dropping in DTNs. In our proposal, a node is required to keep a few signed contact records of its previous contacts, based on which the next contacted node can detect if the node has dropped any packet. Since unruly nodes may misreport their contact records to avoid being detected, a small part of each contact record is scattered to a certain number of witness nodes, which can collect appropriate contact records and detect the misbehaving nodes. We address a scheme to mitigate routing misbehavior by off-putting the number of packets forwarded to the misbehaving nodes. Trace-driven simulations show that our solutions are efficient and can effectively mitigate routing misbehavior.
[1]
Jie Wu,et al.
Thwarting Blackhole Attacks in Disruption-Tolerant Networks using Encounter Tickets
,
2009,
IEEE INFOCOM 2009.
[2]
Guohong Cao,et al.
User-centric data dissemination in disruption tolerant networks
,
2011,
2011 Proceedings IEEE INFOCOM.
[3]
Alex Pentland,et al.
Reality mining: sensing complex social systems
,
2006,
Personal and Ubiquitous Computing.
[4]
Mary Baker,et al.
Mitigating routing misbehavior in mobile ad hoc networks
,
2000,
MobiCom '00.
[5]
Yin Zhang,et al.
Incentive-aware routing in DTNs
,
2008,
2008 IEEE International Conference on Network Protocols.
[6]
Pan Hui,et al.
BUBBLE Rap: Social-Based Forwarding in Delay-Tolerant Networks
,
2008,
IEEE Transactions on Mobile Computing.
[7]
Mads Haahr,et al.
Social network analysis for routing in disconnected delay-tolerant MANETs
,
2007,
MobiHoc '07.
[8]
S. D. Khatawkar,et al.
Detection of Routing Misbehavior in MANETs
,
.
[9]
Craig Gentry,et al.
Hierarchical ID-Based Cryptography
,
2002,
ASIACRYPT.