A game theory based secure model against Black hole attacks in Opportunistic Networks

Opportunistic Networks, a subset of Delay Tolerant Networks (DTNs), do not have a predefined source to destination end-to-end path and hence, offer a multitude of challenges with regard to security. In this paper a Potential Threat (PT) based security protocol has been developed which models the characters of the incoming nodes on the basis of swift delivery of messages, their reputation and history. Thus, it secures the network against malicious nodes. The PT based mechanism also trumps previous security based protocols as the basis of its conception is rooted in evolutionary game theory and in evaluating the malicious nodes as a player with certain goals and intentions. A comprehensive comparison with an existing protocol has also been done. The simulations of the protocol are run on the Opportunistic Network Environment (ONE) simulator with Spray and Wait as the base routing protocol. It is observed that the security of the network is much more vigorous with the proposed PT based security protocol. The network also benefits in terms of delivery probability, data packets dropped, network overhead ratio and the average transmission delay.

[1]  Zhenfu Cao,et al.  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks , 2014 .

[2]  Sarah Rothstein Jacobians Of Matrix Transformations And Functions Of Matrix Argument , 2016 .

[3]  J. Visumathi,et al.  Countering Flood Attacks and Routing Misbehavior in DTN , 2015 .

[4]  Marco Conti,et al.  Opportunistic networking: data forwarding in disconnected mobile ad hoc networks , 2006, IEEE Communications Magazine.

[5]  Jörg Ott,et al.  The ONE simulator for DTN protocol evaluation , 2009, SIMUTools 2009.

[6]  Rachid El Azouzi,et al.  Evolutionary forwarding games in delay tolerant networks: Equilibria, mechanism design and stochastic approximation , 2013, Comput. Networks.

[7]  Isaac Woungang,et al.  Performance evaluation of various routing protocols in Opportunistic Networks , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).

[8]  Hui Cheng,et al.  A routing defense mechanism using evolutionary game theory for Delay Tolerant Networks , 2016, Appl. Soft Comput..

[9]  Anders Lindgren,et al.  Probabilistic Routing in Intermittently Connected Networks , 2004, SAPIR.

[11]  Jie Yang,et al.  Detecting blackhole attacks in Disruption-Tolerant Networks through packet exchange recording , 2010, 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).

[12]  Doina Bucur,et al.  Black Holes and Revelations: Using Evolutionary Algorithms to Uncover Vulnerabilities in Disruption-Tolerant Networks , 2015, EvoApplications.

[13]  P. Taylor,et al.  Evolutionarily Stable Strategies and Game Dynamics , 1978 .

[14]  Sajal K. Das,et al.  A trust-based framework for data forwarding in opportunistic networks , 2013, Ad Hoc Networks.

[15]  Jie Wu,et al.  Thwarting Blackhole Attacks in Disruption-Tolerant Networks using Encounter Tickets , 2009, IEEE INFOCOM 2009.

[16]  G. Akilarasu,et al.  Wormhole-Free Routing and DoS Attack Defense in Wireless Mesh Networks , 2017, Wirel. Networks.