作者
Sujoy Saha, Rohit Verma, Satadal Sengupta, Vineet Mishra, Subrata Nandi
发表日期
2012
研讨会论文
Advances in Computing and Information Technology: Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India-Volume 1
页码范围
159-169
出版商
Springer Berlin Heidelberg
简介
This paper deals with the aspect of security in Delay Tolerant Networks (DTN). DTNs are characterized with decentralized control. Network performance and trustworthiness of transmitted information in DTNs depend upon the level of co-operation among participating nodes. As a result, DTNs are vulnerable towards untoward activities arising out of node selfishness as well as malicious intentions. In this paper, we limit our focus to the Black Hole Denial-of-Service attack. We develop a table-based strategy to record network history and use this information to detect discrepancies in the behavior of nodes, followed by elimination of those detected as malicious. We explain our detection mechanism considering Spray & Focus routing protocol as the representative routing scheme. The detection mechanism has been described in detail with examples pertaining to various case scenarios. Furthermore, we study the …
引用总数
201420152016201720181111
学术搜索中的文章
S Saha, R Verma, S Sengupta, V Mishra, S Nandi - Advances in Computing and Information Technology …, 2012