2016
DOI: 10.1109/tmc.2015.2456895
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Colluding Blackhole and Greyhole Attacks in Delay Tolerant Networks

Abstract: Delay Tolerant Network (DTN) is developed to cope with intermittent connectivity and long delay in wireless networks. Due to the limited connectivity, DTN is vulnerable to blackhole and greyhole attacks in which malicious nodes intentionally drop all or part of the received messages. Although existing proposals could accurately detect the attack launched by individuals, they fail to tackle the case that malicious nodes cooperate with each other to cheat the defense system. In this paper, we suggest a scheme ca… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
23
0
1

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 51 publications
(24 citation statements)
references
References 20 publications
0
23
0
1
Order By: Relevance
“…However, these routing schemes are inefficient in the DTNs environment with malicious or selfish nodes. To mitigate the impact of selfish or malicious nodes on DTNs, some detection attacks schemes are proposed in [3,6,7], which make use of the history forwarding evidences and encounter records of each node to analyze its forwarding behavior. However, these detection schemes are independent of specific routing protocols and require more computing capability, network bandwidth, and storage resources to work well.…”
Section: Security and Communication Networkmentioning
confidence: 99%
See 3 more Smart Citations
“…However, these routing schemes are inefficient in the DTNs environment with malicious or selfish nodes. To mitigate the impact of selfish or malicious nodes on DTNs, some detection attacks schemes are proposed in [3,6,7], which make use of the history forwarding evidences and encounter records of each node to analyze its forwarding behavior. However, these detection schemes are independent of specific routing protocols and require more computing capability, network bandwidth, and storage resources to work well.…”
Section: Security and Communication Networkmentioning
confidence: 99%
“…(1) if node meets node then (2) node triggers Algorithm 2 and detects behavior of node ; (3) get detection result of node from Algorithm 2; (4) end (5) if node is a well-behavior node and ̸ = then (6) sorts messages by the remaining TTL; (7) for each message ∈ do (8) get destination node from head field of ; (9) get ⋅ , ⋅ of node and node from = ( 1 , 2 , 3 , . .…”
Section: Security and Efficient Routing Based On Trtmentioning
confidence: 99%
See 2 more Smart Citations
“…No changes to the packets configurations are required, so the overhead is a little measure of computation at nodes and no additional correspondence. Thi and Yeo (2016) for identifying the individual bad conduct, they characterized sending proportion metrics that can recognize the behaviors of assailants from typical nodes. According to us in this the malevolent nodes may abstain from being distinguished by conniving to control their sending proportion metrics.…”
Section: Detection Techniquesmentioning
confidence: 99%