首页> 外文会议>2014 Fourth International Conference of Emerging Applications of Information Technology >A Co-operative Approach to Thwart Selfish and Black-Hole Attacks in DTN for Post Disaster Scenario
【24h】

A Co-operative Approach to Thwart Selfish and Black-Hole Attacks in DTN for Post Disaster Scenario

机译:灾难后场景中在DTN中阻止自私和黑洞攻击的合作方法

获取原文
获取原文并翻译 | 示例

摘要

A Delay Tolerant Network (DTN) is prone to security threats, especially the Selfish and Black-hole attacks. In this work, we have taken up these two security issues in a DTN based on an architecture suitable for Post disaster scenario, where mobile nodes move around a fixed destination and communicate messages to it. A co-operative scheme is presented to reduce the harmful effects of these malicious nodes in the network. The cooperation is obtained from the neighbouring nodes. The malicious behavior of a node is examined at the time of sending messages to that node by inquiring other neighbouring nodes about the past performances of that node. Simple parameters, such as total number of sent and received messages to and from other nodes and the elapsed time since the network is active, are used for arriving at the decision of forwarding messages to that node. The node whose malicious behavior is being tested is not involved in the whole process as it may manipulate information to pose as a valid node. By the cooperation of other neighbouring nodes, a combined faith value (CFV) is calculated. If this value satisfies a pre-defined threshold condition, then the node is treated as valid for that moment. The process is performed every time a node wants to transmit a message to another node. Also, the calculated CFV is multicast in the neighbourhood for updating. The scheme has been tested on the Spray and Wait (S&W) DTN routing protocol with mobile nodes and fixed destination type architecture to prove its effectiveness. It is found to avoid malicious nodes and increase the trustiness of the network and data communication.
机译:延迟容忍网络(DTN)容易受到安全威胁,尤其是自私和黑洞攻击。在这项工作中,我们基于适合于灾后场景的架构在DTN中解决了这两个安全问题,在该架构中,移动节点在固定的目标周围移动并向其传递消息。提出了一种合作方案,以减少网络中这些恶意节点的有害影响。从邻近节点获得合作。通过向其他相邻节点查询该节点的过去性能,可以在向该节点发送消息时检查该节点的恶意行为。简单的参数,例如去往和来自其他节点的已发送消息和已接收消息的总数以及自网络处于活动状态以来经过的时间,可用于确定将消息转发到该节点的决定。受恶意行为测试的节点不会参与整个过程,因为它可能会操纵信息以使其成为有效节点。通过其他相邻节点的协作,可以计算出组合置信度值(CFV)。如果该值满足预定义的阈值条件,则该节点在该时刻被视为有效。每当一个节点想要向另一个节点发送消息时就执行该过程。另外,计算出的CFV在附近被多播以进行更新。该方案已经在带有移动节点和固定目标类型体系结构的Spray&Wait(S&W)DTN路由协议上进行了测试,以证明其有效性。发现可以避免恶意节点并增加网络和数据通信的可靠性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号