Malicious Packet Loss Identification in Disruption Tolerant Network
DOI:
https://doi.org/10.51983/ajcst-2014.3.1.1727Keywords:
DTN, MN, Packet Loss, Misbehaving Node, Malicious Packet Loss, Packet life timeAbstract
In recent days network is suffering serious problems with the packet loss. Dropping of received packets, even it has adequate buffers is very common in Disruption Tolerant Network. The DTN node facilitates communication between mobile nodes. Sometimes the mobile node selects the DTN with lowest reputation that affects packet delivery ratio. If there is a malicious node in the route, the data packet does not reach its destination. Repeatedly the misbehaving nodes may forge some records to avoid being spotted. To solve these issues we propose a scheme to limit the packet rolling in the direction of misbehaving node. The contact record preserves the previous performance of DTN and the mobile nodes select the best rated DTN for its communication. The record handler is maintained to keep track of incoming and outgoing packets. The witness nodes identify the real misbehaving node. The malicious node needs to be identified and is barred. The genuine packet loss, malicious packet loss are differentiated.
References
Qinghua Li and Guohong Cao ,”Mitigating Routing Misbehavior in Disruption Tolerant Networks”, IEEE Transactions On Information Forensics And Security, Vol. 7, No. 2, April 2012.
Sergio Marti, T.J. Giuli, Kevin Lai, and Mary Baker ,”Mitigating Routing Misbehavior in Mobile Ad Hoc Networks”, in Proc. ACM MobiCom,2010.
Kejun Liu, Jing Deng, Pramod K. Varshney, and KashyapBalakrishnan ,”An Acknowledgment-based Approach for the Detection of Routing Misbehavior in MANETs”, in Proc. ACM MobiHoc, Sep 2006.
Hao Yang, James Shu, XiaoqiaoMeng, Songwu Lu,” SCAN: Self- Organized Network-Layer Security in Mobile Ad Hoc Networks” ,in Proc.IEEE INFOCOM Aug 2005.
Kevin Fall,”A Delay-Tolerant Network Architecture for Challenged Internets”, in ACM, SIGCOMM’03, August 25-29, 2003,
Wei Gao and GuohongCao,”User-Centric Data Dissemination in Disruption Tolerant Networks”, IEEE 2009.
Seungjoon Lee, Bohyung Han, Minho Shin,”Robust Routing in Wireless Ad Hoc Networks”, in Proc. ACM MobiCom, 2009.
Radhika Saini, Manju Khari,”Defining Malicious Behavior of a Node and its Defensive Methods in Ad Hoc Network”, in IJCA, April 2011.
John Burgess, George Dean Bissias, Mark Corner, Brian Neil Levine,” Surviving Attacks on Disruption-Tolerant Networks without Authentication”, in MobiHoc’07.
Qiyan Wang, Long Vu, Klara Nahrstedt, Himanshu Khurana,”Identifying Malicious Nodes in Network-Coding-Based Peer-to-Peer Streaming Networks”, IEEE INFOCOM, 2007.
Alper T. Mzrak, Stefan Savage, Keith Marzullo,” Detecting Malicious Packet Losses” IEEE transactions on parallel and distributed systems, Feb 2009.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2014 The Research Publication
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.