Deakin University
Browse

File(s) under permanent embargo

Packet integrity defense mechanism in OppNets

journal contribution
posted on 2018-05-01, 00:00 authored by Asma'a Ahmad, Robin Ram Mohan DossRobin Ram Mohan Doss, Majeed AlajeelyMajeed Alajeely, S F Al Rubeaai, D Ahmad
In an Opportunistic network, as data gets transferred from node to node, with the existence of malicious nodes in the network, it is possible that the data gets modified. To make sure that data remains in its original format, we propose a technique that allows nodes to authenticate packets as they receive them by constructing hash trees, also referred to as Merkle trees. Merkle trees are used to check and authenticate all the packets. As a result of this, direct trust is formed. Direct trust is updated based on the authenticity of the packets and the encounter rate with the node. As nodes come into contact with each other during the packet transmission period, they share feedback on how much they trust other nodes. This feedback, in addition to the formed direct trust with a node is used to derive a reputation value. The reputation value allows nodes to make the correct packet transmission decisions when meeting with nodes. Using an OppNet simulator that embeds OppNet protocols, we have tested the proposed reputation-based system. The results show the effectiveness of the reputation system as malicious nodes and modified packets are detected. As a result, the performance of the network improves, and with time, the packet modification rates decrease as malicious nodes are caught.

History

Journal

Computers and security

Volume

74

Pagination

71 - 93

Publisher

Elsevier

Location

Amsterdam, The Netherlands

ISSN

0167-4048

Language

eng

Publication classification

C Journal article; C1 Refereed article in a scholarly journal

Copyright notice

2018, Elsevier Ltd.