{"title":"Analysis of malicious activity in delay tolerant networks","authors":"P. Nagrath, Ashish Kumar","doi":"10.1109/ICICCS.2016.7542331","DOIUrl":null,"url":null,"abstract":"Delay Tolerant Network (DTN) is basically a disconnected mobile ad hoc Network. It is intermittent and sparsely connected because of limited transmission range and mobility. It is characterized by intermittent connectivity, long or variable delay, asymmetric data rate and high error rates. Many malicious nodes misbehave to hamper the network. Shielding algorithms for adhoc networks cannot be directly applied to DTNs due to dis-connectivity between DTN nodes. DTN nodes are energy constraint nodes and these malicious nodes degrade the energy and hampers message delivery in the network. So there exists the need to devise efficient defending mechanisms for preventing the Delay Tolerant Networks from such nodes. The paper has analyzed the impact of black holes on the network and proposed a defending model to isolate it from the network.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICCS.2016.7542331","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8
Abstract
Delay Tolerant Network (DTN) is basically a disconnected mobile ad hoc Network. It is intermittent and sparsely connected because of limited transmission range and mobility. It is characterized by intermittent connectivity, long or variable delay, asymmetric data rate and high error rates. Many malicious nodes misbehave to hamper the network. Shielding algorithms for adhoc networks cannot be directly applied to DTNs due to dis-connectivity between DTN nodes. DTN nodes are energy constraint nodes and these malicious nodes degrade the energy and hampers message delivery in the network. So there exists the need to devise efficient defending mechanisms for preventing the Delay Tolerant Networks from such nodes. The paper has analyzed the impact of black holes on the network and proposed a defending model to isolate it from the network.