You are not logged in.

Malicious node detection in OppNets using hash chain technique

Alajeely, Majeed, Ahmad, Asma'a Nasser and Ram Mohan Doss, Robin 2016, Malicious node detection in OppNets using hash chain technique, in ICCSNT 2015 : Proceedings of 2015 4th International Conference on Computer Science and Network Technology, IEEE, Piscataway, New Jersey, pp. 925-930, doi: 10.1109/ICCSNT.2015.7490890.

Attached Files
Name Description MIMEType Size Downloads

Title Malicious node detection in OppNets using hash chain technique
Author(s) Alajeely, Majeed
Ahmad, Asma'a Nasser
Ram Mohan Doss, Robin
Conference name Computer Science and Network Technology. International Conference (4th : 2015 : Harbin, China)
Conference location Harbin, China
Conference dates 19-20 Dec. 2015
Title of proceedings ICCSNT 2015 : Proceedings of 2015 4th International Conference on Computer Science and Network Technology
Editor(s) [Unknown]
Publication date 2016
Series Computer Science and Network Technology International Conference
Start page 925
End page 930
Total pages 6
Publisher IEEE
Place of publication Piscataway, New Jersey
Keyword(s) opportunistic networks
OppNets
security
packet dropping attacks
denial-of-service
malicious node detection
Summary Opportunistic Networks aim to set a reliable networks where the nodes has no end-To-end connection and the communication links often suffer from frequent disruption and long delays. The design of the OppNets routing protocols is facing a serious challenges such as the protection of the data confidentiality and integrity. OppNets exploit the characteristics of the human social, such as similarities, daily routines, mobility patterns and interests to perform the message routing and data sharing. Packet dropping attack is one of the hardest attacks in Opportunistic Networks as both the source nodes and the destination nodes have no knowledge of where or when the packet will be dropped. In this paper, we present a new malicious nodes detection technique against packet faking attack where the malicious node drops one or more packets and instead of them injects new fake packets. We have called this novel attack in our previous works a packet faking attack. Each node in Opportunistic Networks can detect and then traceback the malicious nodes based on a solid and powerful idea that is, hash chain techniques. In our hash chain based defense techniques we have two phases. The first phases is to detect the attack, and the second phases is to find the malicious nodes. We have compared our approach with the acknowledgement based mechanisms and the networks coding based mechanism which are well known approaches in the literature. In our simulation, we have achieved a very high node detection accuracy and low false negative rate.
ISBN 9781467381727
Language eng
DOI 10.1109/ICCSNT.2015.7490890
Field of Research 080303 Computer System Security
080503 Networking and Communications
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category E1 Full written paper - refereed
ERA Research output type E Conference publication
Copyright notice ©2015, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30085636

Document type: Conference Paper
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 46 Abstract Views, 0 File Downloads  -  Detailed Statistics
Created: Wed, 24 Aug 2016, 10:24:49 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.