MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks

被引:0
|
作者
Ren, Yanzhi [1 ]
Chuah, Mooi Choo [2 ]
Yang, Jie [1 ]
Chen, Yingying [1 ]
机构
[1] Stevens Inst Technol, Dept ECE, Hoboken, NJ 07030 USA
[2] Lehigh Univ, Dept CSE, Bethlehem, PA 18015 USA
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Disruption Tolerant Networks (DTNs) are vulnerable to insider attacks, in which the legitimate nodes are compromised and the adversary modifies the delivery metrics of the node to launch harmful attacks in the networks. The traditional detection approaches of secure routing protocols can not address such kind of insider attacks in DTNs. In this paper, we propose a mutual correlation detection scheme (MUTON) for addressing these insider attacks. MUTON takes into consideration of the transitive property when calculating the packet delivery probability of each node and correlates the information collected from other nodes. We evaluated our approach through extensive simulations using both Random Way Point and Zebranet mobility models. Our results show that MUTON can detect insider attacks efficiently with high detection rate and low false positive rate.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Hierarchical Link-state Routing in Disruption-Tolerant Networks
    Jarvinen, Risto
    Jaakkola, Antti
    Maatta, Juho
    Liuhto, Lauri
    Luostarinen, Riku
    Manner, Jukka
    Luoma, Marko
    2015 2ND WORLD SYMPOSIUM ON WEB APPLICATIONS AND NETWORKING (WSWAN), 2015,
  • [22] Benefits of Network Coding for Unicast Application in Disruption-Tolerant Networks
    Zhang, Xiaolan
    Neglia, Giovanni
    Kurose, Jim
    Towsley, Don
    Wang, Haixiang
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2013, 21 (05) : 1407 - 1420
  • [23] Performance of disruption-tolerant network mechanisms applied to airborne networks
    Ganguly, Bishwaroop
    Subramanian, Vijay
    Kalyanararnan, Shiv
    Rarnakrishnan, K. K.
    2007 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-8, 2007, : 2115 - +
  • [24] Design Challenges in Contact Plans for Disruption-Tolerant Satellite Networks
    Fraire, Juan A.
    Finochietto, Jorge M.
    IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (05) : 163 - 169
  • [25] Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
    Hur, Junbeom
    Kang, Kyungtae
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2014, 22 (01) : 16 - 26
  • [26] An Efficient Prediction-Based Routing in Disruption-Tolerant Networks
    Yuan, Quan
    Cardei, Ionut
    Wu, Jie
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (01) : 19 - 31
  • [27] Average Operation Time of Bundle Protocol in Delay/Disruption-Tolerant Networks
    Cao, Lei
    Viswanathan, Ramanarayanan
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2022, 21 (08) : 5801 - 5813
  • [28] A Framework for Extending Contact Opportunities in Delay-and Disruption-Tolerant Networks
    Yasmeen, Farzana
    Huda, Nurul
    Uyen Trang Nguyen
    Yamada, Shigeki
    Borcea, Cristian
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION WORKSHOP (ICCW), 2015, : 1551 - 1556
  • [29] Delay- and Disruption-Tolerant Networking
    McMahon, Alex
    Farrell, Stephen
    IEEE INTERNET COMPUTING, 2009, 13 (06) : 82 - 87
  • [30] ProgDTN: Programmable Disruption-Tolerant Networking
    Sommer, Markus
    Hoechst, Jonas
    Sterz, Artur
    Penning, Alvar
    Freisleben, Bernd
    NETWORKED SYSTEMS, NETYS 2022, 2022, 13464 : 184 - 200