Detecting blackhole attacks in disruption-tolerant networks through packet exchange recording

Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Chen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

20 Citations (Scopus)

Abstract

The Disruption Tolerant Networks (DTNs) are especially useful in providing mission critical services such as in emergency networks or battlefield scenarios. However, DTNs are vulnerable to insider attacks, in which the legitimate nodes are compromised and the adversary nodes launch blackhole attacks by dropping packets in the networks. The traditional approaches of securing routing protocols can not address such insider attacks in DTNs. In this paper, we propose a method to secure the history records of packet delivery information at each contact so that other nodes can detect insider attacks by analyzing these packet delivery records. We evaluated our approach through extensive simulations using both Random Way Point and Zebranet mobility models. Our results show that our method can detect insider attacks efficiently with high detection rate and low false positive rate.

Original languageEnglish (US)
Title of host publication2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2010 - Digital Proceedings
DOIs
StatePublished - Aug 27 2010
Externally publishedYes
Event2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2010 - Montreal, QC, Canada
Duration: Jun 14 2010Jun 17 2010

Publication series

Name2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2010 - Digital Proceedings

Other

Other2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2010
CountryCanada
CityMontreal, QC
Period6/14/106/17/10

Fingerprint

Routing protocols

All Science Journal Classification (ASJC) codes

  • Software
  • Computer Networks and Communications

Cite this

Ren, Y., Choo Chuah, M., Yang, J., & Chen, Y. (2010). Detecting blackhole attacks in disruption-tolerant networks through packet exchange recording. In 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2010 - Digital Proceedings [5534944] (2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2010 - Digital Proceedings). https://doi.org/10.1109/WOWMOM.2010.5534944
Ren, Yanzhi ; Choo Chuah, Mooi ; Yang, Jie ; Chen, Yingying. / Detecting blackhole attacks in disruption-tolerant networks through packet exchange recording. 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2010 - Digital Proceedings. 2010. (2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2010 - Digital Proceedings).
@inproceedings{c2cd94d840734129bd45002563a552b8,
title = "Detecting blackhole attacks in disruption-tolerant networks through packet exchange recording",
abstract = "The Disruption Tolerant Networks (DTNs) are especially useful in providing mission critical services such as in emergency networks or battlefield scenarios. However, DTNs are vulnerable to insider attacks, in which the legitimate nodes are compromised and the adversary nodes launch blackhole attacks by dropping packets in the networks. The traditional approaches of securing routing protocols can not address such insider attacks in DTNs. In this paper, we propose a method to secure the history records of packet delivery information at each contact so that other nodes can detect insider attacks by analyzing these packet delivery records. We evaluated our approach through extensive simulations using both Random Way Point and Zebranet mobility models. Our results show that our method can detect insider attacks efficiently with high detection rate and low false positive rate.",
author = "Yanzhi Ren and {Choo Chuah}, Mooi and Jie Yang and Yingying Chen",
year = "2010",
month = "8",
day = "27",
doi = "https://doi.org/10.1109/WOWMOM.2010.5534944",
language = "English (US)",
isbn = "9781424472659",
series = "2010 IEEE International Symposium on {"}A World of Wireless, Mobile and Multimedia Networks{"}, WoWMoM 2010 - Digital Proceedings",
booktitle = "2010 IEEE International Symposium on {"}A World of Wireless, Mobile and Multimedia Networks{"}, WoWMoM 2010 - Digital Proceedings",

}

Ren, Y, Choo Chuah, M, Yang, J & Chen, Y 2010, Detecting blackhole attacks in disruption-tolerant networks through packet exchange recording. in 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2010 - Digital Proceedings., 5534944, 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2010 - Digital Proceedings, 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2010, Montreal, QC, Canada, 6/14/10. https://doi.org/10.1109/WOWMOM.2010.5534944

Detecting blackhole attacks in disruption-tolerant networks through packet exchange recording. / Ren, Yanzhi; Choo Chuah, Mooi; Yang, Jie; Chen, Yingying.

2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2010 - Digital Proceedings. 2010. 5534944 (2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2010 - Digital Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Detecting blackhole attacks in disruption-tolerant networks through packet exchange recording

AU - Ren, Yanzhi

AU - Choo Chuah, Mooi

AU - Yang, Jie

AU - Chen, Yingying

PY - 2010/8/27

Y1 - 2010/8/27

N2 - The Disruption Tolerant Networks (DTNs) are especially useful in providing mission critical services such as in emergency networks or battlefield scenarios. However, DTNs are vulnerable to insider attacks, in which the legitimate nodes are compromised and the adversary nodes launch blackhole attacks by dropping packets in the networks. The traditional approaches of securing routing protocols can not address such insider attacks in DTNs. In this paper, we propose a method to secure the history records of packet delivery information at each contact so that other nodes can detect insider attacks by analyzing these packet delivery records. We evaluated our approach through extensive simulations using both Random Way Point and Zebranet mobility models. Our results show that our method can detect insider attacks efficiently with high detection rate and low false positive rate.

AB - The Disruption Tolerant Networks (DTNs) are especially useful in providing mission critical services such as in emergency networks or battlefield scenarios. However, DTNs are vulnerable to insider attacks, in which the legitimate nodes are compromised and the adversary nodes launch blackhole attacks by dropping packets in the networks. The traditional approaches of securing routing protocols can not address such insider attacks in DTNs. In this paper, we propose a method to secure the history records of packet delivery information at each contact so that other nodes can detect insider attacks by analyzing these packet delivery records. We evaluated our approach through extensive simulations using both Random Way Point and Zebranet mobility models. Our results show that our method can detect insider attacks efficiently with high detection rate and low false positive rate.

UR - http://www.scopus.com/inward/record.url?scp=77955892916&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=77955892916&partnerID=8YFLogxK

U2 - https://doi.org/10.1109/WOWMOM.2010.5534944

DO - https://doi.org/10.1109/WOWMOM.2010.5534944

M3 - Conference contribution

SN - 9781424472659

T3 - 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2010 - Digital Proceedings

BT - 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2010 - Digital Proceedings

ER -

Ren Y, Choo Chuah M, Yang J, Chen Y. Detecting blackhole attacks in disruption-tolerant networks through packet exchange recording. In 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2010 - Digital Proceedings. 2010. 5534944. (2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2010 - Digital Proceedings). https://doi.org/10.1109/WOWMOM.2010.5534944