Deakin University

File(s) under permanent embargo

Malicious node detection in OppNets using hash chain technique

conference contribution
posted on 2016-06-13, 00:00 authored by Majeed AlajeelyMajeed Alajeely, Asma'a Ahmad, Robin Ram Mohan DossRobin Ram Mohan Doss
Opportunistic Networks aim to set a reliable networks where the nodes has no end-To-end connection and the communication links often suffer from frequent disruption and long delays. The design of the OppNets routing protocols is facing a serious challenges such as the protection of the data confidentiality and integrity. OppNets exploit the characteristics of the human social, such as similarities, daily routines, mobility patterns and interests to perform the message routing and data sharing. Packet dropping attack is one of the hardest attacks in Opportunistic Networks as both the source nodes and the destination nodes have no knowledge of where or when the packet will be dropped. In this paper, we present a new malicious nodes detection technique against packet faking attack where the malicious node drops one or more packets and instead of them injects new fake packets. We have called this novel attack in our previous works a packet faking attack. Each node in Opportunistic Networks can detect and then traceback the malicious nodes based on a solid and powerful idea that is, hash chain techniques. In our hash chain based defense techniques we have two phases. The first phases is to detect the attack, and the second phases is to find the malicious nodes. We have compared our approach with the acknowledgement based mechanisms and the networks coding based mechanism which are well known approaches in the literature. In our simulation, we have achieved a very high node detection accuracy and low false negative rate.



Computer Science and Network Technology. International Conference (4th : 2015 : Harbin, China)


Computer Science and Network Technology International Conference


925 - 930




Harbin, China

Place of publication

Piscataway, N.J.

Start date


End date






Publication classification

E Conference publication; E1 Full written paper - refereed

Copyright notice

2015, IEEE



Title of proceedings

ICCSNT 2015 : Proceedings of 2015 4th International Conference on Computer Science and Network Technology