Detecting misbehavior routing and attacks in disruption tolerant network using itrm

K. Devi, P. Damodharan
{"title":"Detecting misbehavior routing and attacks in disruption tolerant network using itrm","authors":"K. Devi, P. Damodharan","doi":"10.1109/ICCTET.2013.6675979","DOIUrl":null,"url":null,"abstract":"In DTN selfish node or malicious node may drop received packets such reduces the packet delivery ratio and system resources. Routing misbehavior can be caused by selfish node because it drops packets even it has a sufficient buffer space. One serious problem in this paper is routing misbehavior and black whole attack. The router act as an attacker and drops the packet continuously and will not forwards the packet to receiver node. The another problem in this paper is black whole attack, it is caused by the black whole node, it advertise itself as a perfect node to all the destination but it drops the packet received from other node. To address this problem we propose a distributed scheme to detect such routing misbehavior in DTN. In this scheme a node is required to keep a few signed contact record of its previous contacts based on the next contacted node. The contact node contains when this contact happens, what packet they send and what packets they received during the data exchange so it is easy to identify which node has drops received packet. We also propose tracer routing to provide the efficient routing strategy that is designed to control routing. In this scheme the initiator appends the signature to the query. when an intermediate node x receives the packet first it verifies the packet and discard the forged one using the initiators public key. Then x forwards the packet it received to the next hop. At the same time it sends the acknowledgement to the initiator. We also propose an encryption algorithm to detect attacker and provide the security during the data exchange.","PeriodicalId":242568,"journal":{"name":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCTET.2013.6675979","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10

Abstract

In DTN selfish node or malicious node may drop received packets such reduces the packet delivery ratio and system resources. Routing misbehavior can be caused by selfish node because it drops packets even it has a sufficient buffer space. One serious problem in this paper is routing misbehavior and black whole attack. The router act as an attacker and drops the packet continuously and will not forwards the packet to receiver node. The another problem in this paper is black whole attack, it is caused by the black whole node, it advertise itself as a perfect node to all the destination but it drops the packet received from other node. To address this problem we propose a distributed scheme to detect such routing misbehavior in DTN. In this scheme a node is required to keep a few signed contact record of its previous contacts based on the next contacted node. The contact node contains when this contact happens, what packet they send and what packets they received during the data exchange so it is easy to identify which node has drops received packet. We also propose tracer routing to provide the efficient routing strategy that is designed to control routing. In this scheme the initiator appends the signature to the query. when an intermediate node x receives the packet first it verifies the packet and discard the forged one using the initiators public key. Then x forwards the packet it received to the next hop. At the same time it sends the acknowledgement to the initiator. We also propose an encryption algorithm to detect attacker and provide the security during the data exchange.
利用itrm检测容错网络中的错误路由和攻击
在DTN中,自私节点或恶意节点可能会丢弃接收到的数据包,从而降低数据包的传输率和系统资源。由于自私节点即使有足够的缓冲空间也会丢弃数据包,从而导致路由错误。本文研究的一个重要问题是路由错误和黑整攻击。路由器作为攻击者,不断丢弃报文,不将报文转发给接收节点。本文的另一个问题是黑整攻击,它是由黑整节点引起的,它向所有目标通告自己是完美节点,但却丢弃从其他节点收到的数据包。为了解决这个问题,我们提出了一种分布式方案来检测DTN中的这种路由错误行为。在该方案中,每个节点都需要根据下一个联系节点保留一些其前一个联系人的签名记录。接触节点包含这种接触发生的时间,它们在数据交换期间发送的数据包和接收的数据包,因此很容易识别哪个节点丢失了接收的数据包。我们还提出了跟踪路由,以提供有效的路由策略,旨在控制路由。在此方案中,发起者将签名附加到查询中。当中间节点x首先接收到数据包时,它会使用发起者的公钥验证数据包并丢弃伪造的数据包。然后x将收到的数据包转发到下一跳。同时,它向发起者发送确认。我们还提出了一种加密算法来检测攻击者并提供数据交换过程中的安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信