Data Forwarding Mechanism with Blackhole Attack Detection in Intermittently Connected Wireless Networks
YANG Jing①② ZHAO Yanyan①② WANG Ruyan①② GONG Lingling①② XIE Yi③ XIE Jinfeng③
①(Optical Communication and Network Key Laboratory of Chongqing, Chongqing 400065, China) ②(School of Telecommunication and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing 400065, China) ③(Chongqing Institute of Telecommunications, Chongqing 401336, China)
Intermittently connected wireless networks transmit data through opportunities caused by nodes’ movements. But malicious nodes in the network can attack and delete data by falsifying information about their routings, in order to impact the performance of networks. A data forwarding mechanism with blackhole attacking detection in intermittently connected wireless networks is proposed in this paper. By evaluating 4 trust properties include value of honesty, credit, indirect trust, and data forwarding rate, characteristics of attackers’ are summarized directly behaviors. And using the theory of rough set to decrease the rate of mistakes caused by indeterminate information, so that to determine the reliability of nodes accurately, and choose relay nodes reasonably. Results show that, the proposed mechanism can effectively find out attackers while enhancing the reliability of data transmission, and it also can defense some other non-cooperative nodes in the networks. Thus, the utilization of network resource is improved.
WU Dapeng, ZHANG Puning, and WANG Ruyan. Adaptive buffer management strategy with message delivery probability estimating method in opportunistic networks[J]. Journal of Electronics & Information Technology, 2014, 36(2): 390-395.
WU Dapeng, BAI Na, and WANG Ruyan. Cache management mechanism with node status evaluation for intermittently connected wireless networks[J]. Journal of Electronics & Information Technology, 2015, 37(2): 443-448.
[4]
D’SOUZA R J and JOSE J. Routing approaches in delay tolerant networks: a survey[J]. International Journal of Computer Applications, 2010, 1(17): 8-14.
[5]
CAO Z, DONG M, GAO Z, et al. A probabilistic misbehavior detection scheme towards efficient trust establishment in delay-tolerant networks[J]. IEEE Transactions on Parallel & Distributed Systems, 2014, 25(1): 22-32.
[6]
JAIN S. Black hole attack in delay tolerant networks: a survey[J]. International Journal of Computer Science and Engineering, 2014, 2(4): 172-175.
[7]
DINI G and DUCA A L. Towards a reputation-based routing protocol to contrast blackholes in a delay tolerant network[J]. Ad Hoc Networks, 2012, 10(7): 1167-1178.
[8]
LI N and DAS S K. A trust-based framework for data forwarding in opportunistic networks[J]. Ad hoc Networks, 2013, 11(4): 1497-1509.
[9]
LI F, WU J, and SRINIVASAN A. Thwarting blackhole attacks in disruption-tolerant networks using encounter tickets[C]. IEEE International Conference on Computer Communications 2009, Rio de Janeiro, Brazil, 2009: 2428-2436.
[10]
REN Y, CHUAH M C, YANG J, et al. Detecting blackhole attacks in disruption-tolerant networks through packet exchange recording[C]. 2010 IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM), Montreal, QC, Canada, 2010: 1-6.
[11]
GUO Y, SCHILDT S, and WOLF L. Detecting blackhole and greyhole attacks in vehicular delay tolerant networks[C]. Fifth International Conference on Communication Systems and Networks (COMSNETS), Bangalore, India, 2013: 1-7.
[12]
SAINI K K, SAINI A, and MEHAK. Nature based trust security protocol against greyhole attacks in opportunistic networks[J]. International Journal of Engineering Research & Management Technology, 2014, 1(3): 21-28.
[13]
JULIER S J, UHLMANN J K, and DURRANT-WHYTE H F. A new approach for filtering nonlinear systems[C]. Proceedings of the 1995 American Control Conference, Seattle, WA, USA, 1995, 3: 1628-1632.
[14]
BAADACHE A and BELMEHDI A. Struggling against simple and cooperative black hole attacks in multi-hop wireless Ad hoc networks[J]. Computer Networks, 2014, 73(1): 173-184.
[15]
LI F and WU J. Mobility reduces uncertainty in MANETs[C]. 26th IEEE International Conference on Computer Communications, Anchorage, AK, USA, 2007: 1946-1954.
[16]
PAWLAK Z and SOWINSKI R. Rough set approach to multi- attribute decision analysis[J]. European Journal of Operational Research, 1994, 72(3): 443-459.
[17]
LINDGREN A, DORIA A, and SCHEL?N O. PROPHET: probabilistic routing in intermittently connected networks[J]. Moble Computing and Communications Review, 2003, 7(3): 1246-1250.
[18]
RAMANA K S, CHARI A A, and KASIVISWANTH N. A survey on trust management for mobile Ad hoc networks[J]. International Journal of Network Security and Its Applications, 2010, 13(4): 562-583.