Detecting malicious behavior in a vehicular DTN for public transportation

In the past we presented a system that uses public buses and trams in the city of Braunschweig to monitor air pollution in a distributed way. This system has been built on the principles of delay tolerant networking. Since reliability and resilience is an important factor in such systems, in this work we propose a Misbehavior Detection System (MDS) to defend the Braunschweig network against the interference of faulty and malicious nodes. By collecting and securely exchanging data of previous encounters, a node can use cluster analysis to assess the trustworthiness of other nodes in order to detect malicious behavior. By evaluating our method through different routing protocols in Delay- and Disruption-Tolerant Networks (DTNs), we will show that our MDS is able to efficiently protect the system with low overhead.

[1]  Alex Pentland,et al.  DakNet: rethinking connectivity in developing nations , 2004, Computer.

[2]  Anders Lindgren,et al.  Probabilistic Routing in Intermittently Connected Networks , 2004, SAPIR.

[3]  Ali S. Hadi,et al.  Finding Groups in Data: An Introduction to Chster Analysis , 1991 .

[4]  Xiaodong Lin,et al.  SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks , 2009, IEEE Transactions on Vehicular Technology.

[5]  Anil K. Jain Data clustering: 50 years beyond K-means , 2008, Pattern Recognit. Lett..

[6]  Sven Lahde,et al.  A practical analysis of communication characteristics for mobile and distributed pollution measurements on the road , 2007, Wirel. Commun. Mob. Comput..

[7]  Lars C. Wolf,et al.  DTN routing in urban public transport systems , 2010, CHANTS '10.

[8]  Amin Vahdat,et al.  Epidemic Routing for Partially-Connected Ad Hoc Networks , 2009 .

[9]  Jie Wu,et al.  Thwarting Blackhole Attacks in Disruption-Tolerant Networks using Encounter Tickets , 2009, IEEE INFOCOM 2009.

[10]  Anil K. Jain,et al.  Algorithms for Clustering Data , 1988 .

[11]  Vinton G. Cerf,et al.  Delay-Tolerant Networking Architecture , 2007, RFC.

[12]  Brian Gallagher,et al.  MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[13]  Cauligi S. Raghavendra,et al.  Spray and wait: an efficient routing scheme for intermittently connected mobile networks , 2005, WDTN '05.

[14]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[15]  Denis Laurendeau,et al.  Award winning papers from the 19th International Conference on Pattern Recognition (ICPR) , 2010, Pattern Recognit. Lett..

[16]  Srinivasan Keshav,et al.  Very low-cost internet access using KioskNet , 2007, CCRV.

[17]  W. Hamilton,et al.  The Evolution of Cooperation , 1984 .

[18]  Jörg Ott,et al.  Applicability of identity-based cryptography for disruption-tolerant networking , 2007, MobiOpp '07.

[19]  Lars C. Wolf,et al.  Detecting blackhole and greyhole attacks in vehicular Delay Tolerant Networks , 2013, 2013 Fifth International Conference on Communication Systems and Networks (COMSNETS).

[20]  Yin Zhang,et al.  Incentive-aware routing in DTNs , 2008, 2008 IEEE International Conference on Network Protocols.

[21]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[22]  Jörg Ott,et al.  The ONE simulator for DTN protocol evaluation , 2009, SIMUTools 2009.