Abstract:In this work, security threats posed by selfish, blackhole and wormhole attacks in a delay tolerant network (DTN) are addressed. A cooperative approach has been proposed as a solution where malicious behaviour of a node is tested whenever another node tries to send a message to it. Performance parameters, like received and sent messages to neighbouring nodes have been used along with calculated faith values (CFV) to derive latest CFVs. The process is repeated for each communication instance. In addition, a simple yet efficient credibility-based cryptographic encryption technique is applied to encrypt message contents that works by appending the signatures and CFV values of each encountered nodes. The method has been tested, by implementing it over the spray and wait DTN protocol, in the ONE simulator. The proposed strategy is able to avoid the three types of malicious nodes effectively and increases the trustworthiness of communication process greatly.Keywords: selfish node; blackhole; wormhole; delay tolerant network; DTN security; cooperative; combined faith value; CFV.Reference to this paper should be made as follows: Gupta, A.K., Mandal, J.K. Biographical notes: Amit Kumar Gupta is a PhD research scholar from the University of Kalyani, West Bengal, India. His areas of interest include delay tolerant networks, wireless networks, sensor networks, security in wireless networks, social networks data analysis, and data management in wireless transmission. He has completed his Master's in Computer Applications and in Information Technology from the University of Calcutta. He carries a teaching experience of four years of teaching Master's students.
Mitigating selfish, blackhole and wormhole attacks in DTN
131Jyotsna Kumar Mandal is a Professor at the Computer Science and Engineering Department of The University of Kalyani, West Bengal, India. He has been an ex-Dean to the Faculty of Engineering, Technology & Management at the University of Kalyani. He has an active academic carrier with more than 30 years of teaching and research activities in various reputed institutes and Universities. He is an active member of more than ten professional bodies like IEEE, ACM, to name a few. He has frequent involvement with organising international and national seminars in different areas of computer science and allied subjects. His fields of interests include coding theory, data and network security, remote sensing and GIS based applications, data compression error corrections, watermarking, steganography and document authentication, image processing, visual cryptography, MANET, wireless and mobile computing, unified computing, chaos theory and applications. He leads various government and non-government projects in his computing laboratory.