Comparative analysis of attack detection methods in Delay Tolerant Network

Authors

Keywords:

Delay Tolerant Network, Blackhole attack, Greyhole attack, security, Flooding attack

Abstract

Delay Tolerant Network is a new kind of wireless network which includes Radio Frequency (RF) and acoustic (sonar) technologies. DTN developed for an interplanetary network where the speed of light is slow. DTN is derived from deep space communication. DTN is distinguished as long delay and intermittent connectivity. The Delay Tolerant Network is more vulnerable to different kinds of attacks like flooding attack, blackhole and greyhole attacks, due to limited connectivity. There is no end-to-end connectivity between source & destination in DTN. So that it uses a store, carry and forward mechanism to transfer the data from one node to another node. The Delay Tolerant Network was developed to solve technical problems in the end-to-end network. DTN is becoming more and more important because communication networks are ubiquitous today. It provides automotive communication solutions. DTN is a decentralized and self-managed system with unique network attributes; however, attributes such as high mobility nodes, network uplinks and downlinks, and separate routing can cause network vulnerabilities. These vulnerabilities include the host being compromised, which in turn will bring security risks, because the compromised host may destroy the routing protocol in the network. This article analyses the various types of attack detection methods.

Downloads

Download data is not yet available.

References

Thi Ngoc Diep Pham, Chai Kiat Yeo, Naoto Yanai, Toru Fujiwara,"Detecting Flooding Attack and Accommodating Burst Traffic in Delay Tolerant Networks,"IEEE Transactions on Vehicular Technology, pp.1-14, 2017

Zhaoxu Wang, Huachun Zhou, Bohao Feng, Wei Quan and Shui Yu"MTF: Mitigating Link Flooding Attacks in Delay Tolerant Network, "IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, cloud & Big Data Computing, Internet of People and Smart City Innovations, pp. 1532-1539,2018

Pham Thi Ngoc Diep, Chai Kiat Yeo,"Detecting Flooding Attack in Delay Tolerant Networks by Piggybacking Encounter Records, " IEEE, 2015

Preeti Nagrath, Sandhya Aneja, G.N.Purohit,"Defending Flooding Attack in Delay Tolerant Networks, " IEEE, ICOIN 2015, Vol. 15, pp. 40-45, 2015

D.S.Delphin Hepsiba, S.Prabhu,"Enhanced Techniques to Strengthening DTN against Flood Attacks, "IEEE,2014

Feng Cheng Lee, Weihan Goh, Chai Kiat Yeo,"A Queuing Mechanism to Alleviate Flooding Attacks in Probabilistic Delay Tolerant Networks," Sixth Advanced International Conference on Telecommunications, Vol.78,pp. 329-334, 2010

Keisuke Arai, Shuichiro Haruta, Hiromu Asahina, Iwao Sasase,"Encounter Record Reduction Scheme based on Theoretical Contact Probability for Flooding Attack Mitigation in DTN," 24th Asia-Pacific Conference on Communications (APCC), Nov.2018

Zhicheng Liu and Junxing Zhang,"OSO: Mitigating Data Flooding Attack in Wi-Fi Offloading," 6th International Conference on Computer Science and Network Technology (ICCSNT),IEEE. pp.400-404,Oct 2017

Divya Kuriakose, D. Daniel,"Effective defending against flood attack using stream-check method in tolerant network," 2014 International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE) ,Oct 2014

Takuya Idezuka, Tomotaka Kim Ura, And Masahiro Muraguchi,"Behavior Analysis of Flooding Attacks in Sparse Mobile Ad-Hoc Networks,"IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW),2018

Qinghua Li, Wei Gao, Sencun Zhu, and Guohong Cao,"To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks, "IEEE Transactions on Dependable and Secure Computing, VOL. 10, NO. 3, pp, 168-182, May/June 2013

Manghui Tu, Kyle W. Riordan, Geyang Xie , Shuhui Yang , "A Secure Contact Protocol for Delay Tolerant Networks, " IEEE ICIS 2017, Vol. 17, pp.5-11, May 2017

Shuang Ding, Xin He, Jicheng Wang, And Junan Liu,"Pre-Decoding Recovery Mechanism for Network Coding Opportunistic Routing in Delay Tolerant Networks, " IEEE Access, Vol.6, pp.14130-14140, March 2018

Hezhe Wang, Huiqiang Wang, Jing Tan, Hongwu Lv, And Meijin Zhu,"A Delay Tolerant Network Routing Policy Based on Optimized Control Information Generation Method, " IEEE Access, Vol. 6, pp.51791-51803, Oct 2018

WANG Rong, WU Yahui, HUANG Hongbin, and DENG Su,"Cooperative transmission in delay tolerant network, " Journal of Systems Engineering and Electronics, Vol. 30, No. 1, pp.30 – 36, February 2019

Ayub, Q., Rashid, S. “Energy Efficient Inactive Node Detection Based Routing Protocol for Delay Tolerant Network”. Wireless Personal Communications, vol. 116, pp. 227–248 (2021).

Dhiraj kr. Mishra, Dr. Meenu Chawla, "Minimax Theory Based Scheme to Detect Selfish Node and Reduce Latency in Delay Tolerant Network", Conference on Advances in Communication and Control Systems, pp. [78-82],2013.

Thi Ngoc Diep Pham and Chai Kiat Yeo, "Detecting Colluding Blackhole and Greyhole Attacks in Delay Tolerant Networks," in IEEE Transactions on Mobile Computing, vol. 15, no. 5, pp. 1116-1129, 1 May 2016

(2014, february) ijareeie. [Online]. https://www.ijareeie.com/upload/2014/february/13l.html

M. Chuah, J. Yang, Y. Chen, Y. Ren, "MUTON: Detecting malicious nodes in disrupt-tolerant networks," in Proceeding IEEE Wireless Communication Networking Conference, 2010, pp. 1-6.

W. Khalid, N. Ahmed, M. Khalid, A. Ud Din, A. Khan and M. Arshad, "FRID: Flood Attack Mitigation Using Resources Efficient Intrusion Detection Techniques in Delay Tolerant Networks," in IEEE Access, vol. 7, pp. 83740-83760, 2019

J. Cho and I. Chen, "PROVEST: Provenance-Based Trust Model for Delay Tolerant Networks," in IEEE Transactions on Dependable and Secure Computing, vol. 15, no. 1, pp. 151-165, 1 Jan.-Feb. 2018

Gideon Rajan and Gihwan Cho, "Applying Security Architecture with Key Management Framework to the Delay/Disruption Tolerant Networks", IJSIA, Vol-9, pp [327-336], 2015.

Mythili M., Renuka K., “An Efficient Black Hole and Gray Hole Detection Using Fuzzy Probabilistic Detection Scheme in DTN”, International Journal of Advanced Research in Computer and Communication Engineering, vol. 5, no. 10, pp. 123-127, Oct. 2016

Downloads

Published

2021-09-25

How to Cite

[1]
R. Chaudhari and M. Deshpande, “Comparative analysis of attack detection methods in Delay Tolerant Network”, Int J Eng and Appl Phys, vol. 1, no. 3, pp. 272–277, Sep. 2021.

Issue

Section

Articles