In DTN selfish node or malicious node may drop received packets such reduces the packet delivery ratio and system resources. Routing misbehavior can be caused by selfish node because it drops packets even it has a sufficient buffer space. One serious problem in this paper is routing misbehavior and black whole attack. The router act as an attacker and drops the packet continuously and will not forwards the packet to receiver node. The another problem in this paper is black whole attack, it is caused by the black whole node, it advertise itself as a perfect node to all the destination but it drops the packet received from other node. To address this problem we propose a distributed scheme to detect such routing misbehavior in DTN. In this scheme a node is required to keep a few signed contact record of its previous contacts based on the next contacted node. The contact node contains when this contact happens, what packet they send and what packets they received during the data exchange so it is easy to identify which node has drops received packet. We also propose tracer routing to provide the efficient routing strategy that is designed to control routing. In this scheme the initiator appends the signature to the query. when an intermediate node x receives the packet first it verifies the packet and discard the forged one using the initiators public key. Then x forwards the packet it received to the next hop. At the same time it sends the acknowledgement to the initiator. We also propose an encryption algorithm to detect attacker and provide the security during the data exchange.
[1]
Mary Baker,et al.
Mitigating routing misbehavior in mobile ad hoc networks
,
2000,
MobiCom '00.
[2]
S Neelavathy Pari,et al.
Mitigating routing misbehaviour in self organizing mobile ad hoc network using K-neighbourhood local reputation system
,
2011,
2011 International Conference on Recent Trends in Information Technology (ICRTIT).
[3]
Pramod K. Varshney,et al.
An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs
,
2007,
IEEE Transactions on Mobile Computing.
[4]
Songwu Lu,et al.
SCAN: self-organized network-layer security in mobile ad hoc networks
,
2006,
IEEE Journal on Selected Areas in Communications.
[5]
Mooi Choo Chuah,et al.
Detecting wormhole attacks in delay-tolerant networks [Security and Privacy in Emerging Wireless Networks]
,
2010,
IEEE Wireless Communications.
[6]
Vinton G. Cerf,et al.
Delay-tolerant networking: an approach to interplanetary Internet
,
2003,
IEEE Commun. Mag..
[7]
Qinghua Li,et al.
Mitigating Routing Misbehavior in Disruption Tolerant Networks
,
2012,
IEEE Transactions on Information Forensics and Security.