File(s) under permanent embargo
Malicious node detection in OppNets using hash chain technique
conference contribution
posted on 2016-06-13, 00:00 authored by Majeed AlajeelyMajeed Alajeely, Asma'a Ahmad, Robin Ram Mohan DossRobin Ram Mohan DossOpportunistic Networks aim to set a reliable networks where the nodes has no end-To-end connection and the communication links often suffer from frequent disruption and long delays. The design of the OppNets routing protocols is facing a serious challenges such as the protection of the data confidentiality and integrity. OppNets exploit the characteristics of the human social, such as similarities, daily routines, mobility patterns and interests to perform the message routing and data sharing. Packet dropping attack is one of the hardest attacks in Opportunistic Networks as both the source nodes and the destination nodes have no knowledge of where or when the packet will be dropped. In this paper, we present a new malicious nodes detection technique against packet faking attack where the malicious node drops one or more packets and instead of them injects new fake packets. We have called this novel attack in our previous works a packet faking attack. Each node in Opportunistic Networks can detect and then traceback the malicious nodes based on a solid and powerful idea that is, hash chain techniques. In our hash chain based defense techniques we have two phases. The first phases is to detect the attack, and the second phases is to find the malicious nodes. We have compared our approach with the acknowledgement based mechanisms and the networks coding based mechanism which are well known approaches in the literature. In our simulation, we have achieved a very high node detection accuracy and low false negative rate.
History
Event
Computer Science and Network Technology. International Conference (4th : 2015 : Harbin, China)Series
Computer Science and Network Technology International ConferencePagination
925 - 930Publisher
IEEELocation
Harbin, ChinaPlace of publication
Piscataway, N.J.Publisher DOI
Start date
2015-12-19End date
2015-12-20ISBN-13
9781467381727Language
engPublication classification
E Conference publication; E1 Full written paper - refereedCopyright notice
2015, IEEEEditor/Contributor(s)
[Unknown]Title of proceedings
ICCSNT 2015 : Proceedings of 2015 4th International Conference on Computer Science and Network TechnologyUsage metrics
Categories
No categories selectedKeywords
Licence
Exports
RefWorks
BibTeX
Ref. manager
Endnote
DataCite
NLM
DC