You are not logged in.

Establishing trust relationships in OppNets using Merkle trees

Ahmad, Asma'a, Alajeely, Majeed and Doss, Robin 2016, Establishing trust relationships in OppNets using Merkle trees, in COMSNETS 2016 : Proceedings of the 8th International Conference on Communication Systems and Networks, IEEE, Piscataway, N.J., pp. 1-6, doi: 10.1109/COMSNETS.2016.7440025.

Attached Files
Name Description MIMEType Size Downloads

Title Establishing trust relationships in OppNets using Merkle trees
Author(s) Ahmad, Asma'a
Alajeely, Majeed
Doss, RobinORCID iD for Doss, Robin orcid.org/0000-0001-6143-6850
Conference name Communication Systems and Networks. Conference (8th : 2016 : Bangalore, India)
Conference location Bangalore, India
Conference dates 5-10 Jan. 2016
Title of proceedings COMSNETS 2016 : Proceedings of the 8th International Conference on Communication Systems and Networks
Publication date 2016
Start page 1
End page 6
Total pages 6
Publisher IEEE
Place of publication Piscataway, N.J.
Keyword(s) opportunistic networks
OppNets
security
trust
selective packet dropping attack
Merkle tree
malicious node detection
Summary Opportunistic Networks (OppNets) are exposed to a variety of attacks, among them are packet dropping attacks. The security challenges in OppNets is to effectively and securely forward data and guarantee their delivery without any loss. Security and trust in OppNets have gained popularity in research because of their inherent features, including frequent partitions, long delays and intermittent connectivity. This paper presents an efficient malicious path and malicious node detection technique against selective packet dropping attacks. In our algorithm we have developed a solid detection mechanism using the Merkle tree hashing technique. The result of malicious path detection is used to build trust by destination nodes for each path, the built trust value of nodes is then used to detect malicious nodes. Simulation results show that the technique accurately detects malicious paths. The results also show that with the increase of simulation time, node detection accuracy also increases as intermediate nodes have more time to establish trust with destination nodes.
ISBN 9781467396226
Language eng
DOI 10.1109/COMSNETS.2016.7440025
Field of Research 080303 Computer System Security
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category E1 Full written paper - refereed
ERA Research output type E Conference publication
Copyright notice ©2016, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30083249

Document type: Conference Paper
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 88 Abstract Views, 0 File Downloads  -  Detailed Statistics
Created: Thu, 05 May 2016, 14:37:16 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.