Protocols for mitigating blackhole attacks in delay tolerant networks

High node mobility and infrequent connectivity in delay tolerant networks (DTNs) makes it challenging to implement traditional security algorithms for detecting malicious nodes. In DTN, most of the routing algorithms are based on the announcement of routing metrics like probability of delivery, contact strength or social group strength by the nodes in contact. Blackhole in DTN exploits these characteristics of routing protocols and either announces a high value of these metrics or tries to attain a high value for them by following fast, repeated movement patterns. Dynamic social grouping (DSG) based routing algorithm shows that social behavior of nodes helps to make better forwarding decisions and to achieve highest message delivery ratio amongst other existing routing algorithms. We examine the impact of blackholes, intermittent blackholes and tailgating attack on DSG. We propose a suit of three solutions. Our first solution detects blackholes and tailgating malicious nodes in the network, however, is not suitable for intermittent blackholes. Second solution handles intermittent blackholes and performs well when the nodes are well connected. The third and final solution handles intermittent blackholes in sparsely connected as well as in well-connected networks. In all proposed solutions, blackholes are not able to degrade the performance of the protocols by changing their geographical locations. We demonstrate through simulation that our protocols improve upon the message delivery ratio over the existing solutions. An appropriate protocol from the suit may be used depending upon an application.

[1]  Sajal K. Das,et al.  A trust-based framework for data forwarding in opportunistic networks , 2013, Ad Hoc Networks.

[2]  Qinghua Li,et al.  Mitigating Routing Misbehavior in Disruption Tolerant Networks , 2012, IEEE Transactions on Information Forensics and Security.

[3]  Pan Hui,et al.  CRAWDAD dataset cambridge/haggle (v.2009-05-29) , 2009 .

[4]  Lars C. Wolf,et al.  Detecting blackhole and greyhole attacks in vehicular Delay Tolerant Networks , 2013, 2013 Fifth International Conference on Communication Systems and Networks (COMSNETS).

[5]  Ilias Giechaskiel,et al.  Delay Tolerant Bulk Data Transfers on the Internet , 2014 .

[6]  Anders Lindgren,et al.  Probabilistic Routing in Intermittently Connected Networks , 2004, SAPIR.

[7]  Brian Gallagher,et al.  MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[8]  Jie Wu,et al.  Thwarting Blackhole Attacks in Disruption-Tolerant Networks using Encounter Tickets , 2009, IEEE INFOCOM 2009.

[9]  Roy CabanissSrinivasa Social group detection based routing in Delay Tolerant Networks , 2013 .

[10]  Haitham S. Cruickshank,et al.  Delay- and Disruption-Tolerant Networking (DTN): An Alternative Solution for Future Satellite Networking Applications , 2011, Proceedings of the IEEE.

[11]  Amin Vahdat,et al.  Epidemic Routing for Partially-Connected Ad Hoc Networks , 2009 .

[12]  Cecilia Mascolo,et al.  CAR: Context-Aware Adaptive Routing for Delay-Tolerant Mobile Networks , 2009, IEEE Transactions on Mobile Computing.

[13]  Jörg Ott,et al.  The ONE simulator for DTN protocol evaluation , 2009, SIMUTools 2009.

[14]  Jie Yang,et al.  MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks , 2010, 2010 IEEE Wireless Communication and Networking Conference.

[15]  Lars C. Wolf,et al.  A Misbehavior Detection System for Vehicular Delay Tolerant Networks , 2012, GI-Jahrestagung.

[16]  Jianhua Fan,et al.  Delay/Disruption Tolerant Network and its application in military communications , 2010, 2010 International Conference On Computer Design and Applications.

[17]  Gianluca Dini,et al.  A reputation-based approach to tolerate misbehaving carriers in Delay Tolerant Networks , 2010, The IEEE symposium on Computers and Communications.