A security framework for content retrieval in DTNs

In this paper, we address several security issues in our previously proposed content retrieval scheme for Disruption Tolerant Networks (DTNs). The content retrieval is built upon the social-tie relationships among DTN nodes for routing and content lookup service placement. Malicious nodes can launch attacks by advertising falsified social-tie information to attract and drop packets intended for other nodes, or simply disrupt and destroy the query and delivery paths. Furthermore, selfish nodes, while not seeking to attack, are unwilling to forward packets of others. Both malicious and selfish behaviors contribute to the deterioration of the content retrieval performance. To address the problem, we propose to secure both social-tie records and content delivery records during a contact between two nodes. The unforgeable social-tie records prevent malicious nodes from falsifying the social-tie information. The delivery records from which the packet forwarding ratio of a node is computed, help detect selfish behavior. Lastly, we propose a blacklist distribution method that allows nodes to filter out misbehaving nodes from their social contact graph, effectively preventing network traffic from flowing to misbehaving nodes. Extensive real-trace-driven simulation results show that our scheme can detect misbehaving nodes and mitigate their effects efficiently, thus improving the content retrieval performance.

[1]  Kevin R. Fall,et al.  A delay-tolerant network architecture for challenged internets , 2003, SIGCOMM '03.

[2]  Lars C. Wolf,et al.  Detecting blackhole and greyhole attacks in vehicular Delay Tolerant Networks , 2013, 2013 Fifth International Conference on Communication Systems and Networks (COMSNETS).

[3]  Philip Ginzboorg,et al.  ns-3 Module for routing and congestion control studies in mobile opportunistic DTNs , 2013, 2013 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS).

[4]  Jie Wu,et al.  Thwarting Blackhole Attacks in Disruption-Tolerant Networks using Encounter Tickets , 2009, IEEE INFOCOM 2009.

[5]  Qinghua Li,et al.  Mitigating Routing Misbehavior in Disruption Tolerant Networks , 2012, IEEE Transactions on Information Forensics and Security.

[6]  Peng Yang,et al.  A Ferry-based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks , 2007, 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous).

[7]  Raj Jain,et al.  A Quantitative Measure Of Fairness And Discrimination For Resource Allocation In Shared Computer Systems , 1998, ArXiv.

[8]  D.M. Mount,et al.  An Efficient k-Means Clustering Algorithm: Analysis and Implementation , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[9]  Hussein Zedan,et al.  A comprehensive survey on vehicular Ad Hoc network , 2014, J. Netw. Comput. Appl..

[10]  Georgios Karagiannis,et al.  Exploring the solution space of beaconing in VANETs , 2009, 2009 IEEE Vehicular Networking Conference (VNC).

[11]  Xiaodong Lin,et al.  Public key distribution scheme for delay tolerant networks based on two-channel cryptography , 2012, J. Netw. Comput. Appl..

[12]  Mario Gerla,et al.  Social caching and content retrieval in Disruption Tolerant Networks (DTNs) , 2015, 2015 International Conference on Computing, Networking and Communications (ICNC).

[13]  Jie Yang,et al.  MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks , 2010, 2010 IEEE Wireless Communication and Networking Conference.

[14]  Bodo Manthey,et al.  k-Means Has Polynomial Smoothed Complexity , 2009, 2009 50th Annual IEEE Symposium on Foundations of Computer Science.