Detecting Misbehavior Nodes Using Secured Delay Tolerant Network

Page 1

International Research Journal of Engineering and Technology (IRJET) Volume: 04 Issue: 03 | Mar -2017

www.irjet.net

e-ISSN: 2395 -0056 p-ISSN: 2395-0072

DETECTING MISBEHAVIOR NODES USING SECURED DELAY TOLERANT NETWORK S.Aiswarya1, G.Vanitha2 , C.B. LogaPreethi3, A.Monica4 1Assistant 2,3,4UG

Professor, Department of Computer Science and Engineering, Velammal Institute of technology, Chennai.

Student, Department of Computer Science and Engineering, Velammal Institute of technology, Chennai.

----------------------------------------------------------------------------------------------------------------------------------------------------ABSTRACT - Delay Tolerant Networks (DTN) assumes that the network nodes voluntarily cooperate in order to work properly. This cooperation is a cost-intensive activity and some nodes can refuse to cooperate, leading to a selfish node behavior. Normally nodes are required to exchange their encounter data, in which malicious nodes are intentionally drop all or part.Thus the overall network performance could be seriously affected. Thus, we propose Statistical-based Detection of Blackhole and Greyhole attackers (SDBG to address

both individual and collusion attacks. To detect the individual misbehavioring nodes As shown in the paper, detect the attacker node at a time and increases the precision when detecting selfish nodes. Extensive simulation shows that our solution can work with various dropping probabilities and different number of attackers per collusion at high accuracy and low false positive.

1. INTRODUCTION

ratio is the ratio between the total number of sent messages and receive messages. This method will work if attackers tend to drop received messages instead of sending them. If attackers cooperate with each other node and creates the forged encounter records by boosting the forwarding ratio. So, this kind of cooperative attacks can be detected by this method. This type of attack is called as collusion attack. In the proposed method, Statistical-based Detection of Blackhole and Greyhole (SDBG), which can detect both individual and collusion attacks with high accuracy is used. SDBG is designed based on the following observations. Forwarding ratio is used to find individual attack, attackers tend to send out their own messages rather than messages of other nodes. The individual detection accuracy can be improved by observing the number of self-sent messages. In collusion attacks, since attackers need to frequently create fake encounter records to boost the forwarding ratio metric, their number of sent messages can be high. This observation enables us to detect collusion attack.

Keywords used: Delay Tolerant Network, Blackhole attack and Greyhole attack

DTN makes use of hop-by-hop routing and the store-and-forward paradigm to overcome the lack of endto-end paths. DTN is threatened by various attacks, including black- hole and greyhole. Blackhole attackers drops all the received messages even if they have enough buffer storage. Greyhole attackers drops received messages partially. The malicious nodes will decrease the overall message delivery and waste the resources of intermediate nodes. [1], [2] require trusted ferries to check if nodes arbitrarily increase their delivery probabilities to absorb more data, which is preliminary to the dropping attack. [3] depends on a trusted authority to investigate nodes based on the evidences of forwarding tasks, contact opportunities and actual forwarding behaviors. [4] designs a trust-based framework in which the message forwarding behavior is acknowledged and rewarded with reputation. [5], [6], and [7] make use of node’s encounter records to detect or mitigate the impact of the attack. In the above methods, only individual attackers can be found, they cannot handle multiple attackers. For example, in an individual detection method, is for each nodes, histories of encounters will be evaluated with other nodes, i.e., encounter records. A node is suspected as malicious if it’s forwarding ratio is lower than a threshold. Forwarding

© 2017, IRJET

|

Impact Factor value: 5.181

2. RELATED WORK Zhaoyu Gaoy experimented with malicious and selfish behaviors represent a serious threat against routing in Delay or Disruption Tolerant Networks (DTNs). Due to the unique network characteristics, designing a misbehavior

|

ISO 9001:2008 Certified Journal

|

Page 1723


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network by IRJET Journal - Issuu