Skip to main content
Erschienen in: Wireless Personal Communications 1/2013

01.11.2013

Secure Multi-copy Routing in Compromised Delay Tolerant Networks

verfasst von: Eyuphan Bulut, Boeslaw K. Szymanski

Erschienen in: Wireless Personal Communications | Ausgabe 1/2013

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Routing in delay tolerant networks (DTNs) is challenging due to their unique characteristics of intermittent node connectivity. Different protocols (single-, multi-copy, erasure-coding-based etc.) utilizing store-carry-and-forward paradigm have been proposed to achieve routing of messages in such environments by opportunistic message exchanges between nodes that are in the communication range of each other. The sparsity and distributed nature of these networks together with the lack of stable connectivity between source destination pairs make these networks vulnerable to malicious nodes which might attempt to learn the content of the messages being routed between the nodes. In this paper, we study DTNs in which malicious nodes are present, to which we refer to as compromised DTNs. We discuss and analyze the effects of presence of malicious nodes on routing of messages in compromised DTNs. We propose a two period routing approach which aims at achieving the desired delivery ratio by a given delivery deadline in presence of malicious nodes. Our simulation results with both random networks and real DTN traces show that, with proper parameter setting, the proposed method can achieve delivery ratios which surpass those reached by other algorithms by a given delivery deadline.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
We use attacker and malicious node interchangeably throughout the paper.
 
2
In Sect. 5, we also discuss the application of proposed algorithm to real DTN traces where nodes have heterogeneous meeting behaviors.
 
3
We also show the results with no attacker for reference to the maximum achievable delivery ratios in a secure environment.
 
Literatur
1.
Zurück zum Zitat Juang, P., Oki, H., Wang, Y., Martonosi, M., Peh, L. S., & Rubenstein, D. (2002). Energy-efficient computing for wildlife tracking: Design tradeoffs and early experiences with zebranet. In Proceedings of the ACM ASPLOS. Juang, P., Oki, H., Wang, Y., Martonosi, M., Peh, L. S., & Rubenstein, D. (2002). Energy-efficient computing for wildlife tracking: Design tradeoffs and early experiences with zebranet. In Proceedings of the ACM ASPLOS.
3.
Zurück zum Zitat Ott, J., & Kutscher, D. (2005). A disconnection-tolerant transport for drive-thru internet environments. In Proceedings of the IEEE INFOCOM. Ott, J., & Kutscher, D. (2005). A disconnection-tolerant transport for drive-thru internet environments. In Proceedings of the IEEE INFOCOM.
4.
Zurück zum Zitat Burgess, J., Gallagher, B., Jensen, D., & Levine, B. N. (2006). Maxprop: Routing for vehicle-based disruption-tolerant networking. In Proceedings of the INFOCOM, pp. 1–11. Burgess, J., Gallagher, B., Jensen, D., & Levine, B. N. (2006). Maxprop: Routing for vehicle-based disruption-tolerant networking. In Proceedings of the INFOCOM, pp. 1–11.
5.
Zurück zum Zitat Bulut, E., Geyik, S., & Szymanski, B. (2010). Efficient routing in delay tolerant networks with correlated node mobility. In Proceedings of the 7th IEEE international conference on mobile ad-hoc and sensor systems (MASS). Bulut, E., Geyik, S., & Szymanski, B. (2010). Efficient routing in delay tolerant networks with correlated node mobility. In Proceedings of the 7th IEEE international conference on mobile ad-hoc and sensor systems (MASS).
6.
Zurück zum Zitat Daly, E., & Haahr, M. (2007). Social network analysis for routing in disconnected delay-tolerant manets. In Proceedings of the ACM MobiHoc. Daly, E., & Haahr, M. (2007). Social network analysis for routing in disconnected delay-tolerant manets. In Proceedings of the ACM MobiHoc.
7.
Zurück zum Zitat Bulut, E., & Szymanski, B. K. (2012). Exploiting friendship relations for efficient routing in mobile social networks. In Ivan Stojmenovic (Ed.), IEEE transactions on parallel and distributed systems (Vol. 23(12), pp. 2254–2265). New York: IEEE. Bulut, E., & Szymanski, B. K. (2012). Exploiting friendship relations for efficient routing in mobile social networks. In Ivan Stojmenovic (Ed.), IEEE transactions on parallel and distributed systems (Vol. 23(12), pp. 2254–2265). New York: IEEE.
8.
Zurück zum Zitat Lindgren, A., Doria, A., & Schelen, O. (2003). Probabilistic routing in intermittently connected networks. SIGMOBILE Mobile Computing and Communication Review, 7(3), 19–20. Lindgren, A., Doria, A., & Schelen, O. (2003). Probabilistic routing in intermittently connected networks. SIGMOBILE Mobile Computing and Communication Review, 7(3), 19–20.
9.
Zurück zum Zitat Vahdat, A., & Becker, D. (2000). Epidemic routing for partially connected ad hoc networks. Duke University, Tech. Rep. CS-200006. Vahdat, A., & Becker, D. (2000). Epidemic routing for partially connected ad hoc networks. Duke University, Tech. Rep. CS-200006.
10.
Zurück zum Zitat Spyropoulos, T., Psounis, K., & Raghavendra, C. S. (2008). Efficient routing in intermittently connected mobile networks: The multiple-copy case. IEEE/ACM Transactions on Networking, 16(1), 77–90. Spyropoulos, T., Psounis, K., & Raghavendra, C. S. (2008). Efficient routing in intermittently connected mobile networks: The multiple-copy case. IEEE/ACM Transactions on Networking, 16(1), 77–90.
11.
Zurück zum Zitat Wang, Y., Jain, S., Martonosi, M., & Fall, K. (2005). Erasure coding based routing for opportunistic networks. In Proceedings of the ACM SIGCOMM workshop on delay tolerant networking (WDTN). Wang, Y., Jain, S., Martonosi, M., & Fall, K. (2005). Erasure coding based routing for opportunistic networks. In Proceedings of the ACM SIGCOMM workshop on delay tolerant networking (WDTN).
12.
Zurück zum Zitat Bulut, E., Wang, Z., & Szymanski, B. (2010). Cost efficient erasure coding based routing in delay tolerant networks. In Proceedings of the ICC, South Africa. Bulut, E., Wang, Z., & Szymanski, B. (2010). Cost efficient erasure coding based routing in delay tolerant networks. In Proceedings of the ICC, South Africa.
13.
Zurück zum Zitat Lin, Y., Li, B., & Liang, B. (2008). Efficient network coded data transmissions in disruption tolerant networks. In Proceedings of the IEEE INFOCOM. Lin, Y., Li, B., & Liang, B. (2008). Efficient network coded data transmissions in disruption tolerant networks. In Proceedings of the IEEE INFOCOM.
14.
Zurück zum Zitat Burgess, J., Bissias, G. D., Comer, M. D., & Levine, B. N. (2007). Surviving attacks on disruption-tolerant networks without authentication. In Proceedings of the Mobihoc ’07, pp. 61–70. Burgess, J., Bissias, G. D., Comer, M. D., & Levine, B. N. (2007). Surviving attacks on disruption-tolerant networks without authentication. In Proceedings of the Mobihoc ’07, pp. 61–70.
15.
Zurück zum Zitat Choo, F. C., Chan, M. C., & Chang, E. (2010). Robustness of DTN against routing attacks. In Proceedings of the second international conference on communication systems and networks (COMSNETS), pp. 1–10. Choo, F. C., Chan, M. C., & Chang, E. (2010). Robustness of DTN against routing attacks. In Proceedings of the second international conference on communication systems and networks (COMSNETS), pp. 1–10.
16.
Zurück zum Zitat Li, F., & Wu, J. (2009). Thwarting blackhole attacks in disruption–tolerant networks using encounter tickets. In Proceedings of the INFOCOM, pp. 2428–2436. Li, F., & Wu, J. (2009). Thwarting blackhole attacks in disruption–tolerant networks using encounter tickets. In Proceedings of the INFOCOM, pp. 2428–2436.
17.
Zurück zum Zitat Nelson, S. C., Bakht, M., & Kravets, R. (2009). Encounter-based routing in DTNs. In Proceedings of the IEEE Infocom, Rio De Janeiro, Brazil, pp. 846–854. Nelson, S. C., Bakht, M., & Kravets, R. (2009). Encounter-based routing in DTNs. In Proceedings of the IEEE Infocom, Rio De Janeiro, Brazil, pp. 846–854.
18.
Zurück zum Zitat Ren, Y., Chuah, M. C., Yang, J., & Chen, Y. (2010). Muton: Detecting malicious nodes in disruption-tolerant networks. In Proceedings of the WCNC. Ren, Y., Chuah, M. C., Yang, J., & Chen, Y. (2010). Muton: Detecting malicious nodes in disruption-tolerant networks. In Proceedings of the WCNC.
19.
Zurück zum Zitat Ren, Y., Chuah, M. C., Yang, J., & Chen, Y. (2010). Detecting blackhole attacks in disruption-tolerant networks through packet exchange recording. In Proceedings of the 1st workshop on D-SPAN (colocated with WoWMoM). Ren, Y., Chuah, M. C., Yang, J., & Chen, Y. (2010). Detecting blackhole attacks in disruption-tolerant networks through packet exchange recording. In Proceedings of the 1st workshop on D-SPAN (colocated with WoWMoM).
20.
Zurück zum Zitat Li, Q., & Cao, G. (2012). Mitigating routing misbehavior in disruption tolerant networks. In IEEE transactions on information forensics and security (to appear). Li, Q., & Cao, G. (2012). Mitigating routing misbehavior in disruption tolerant networks. In IEEE transactions on information forensics and security (to appear).
21.
Zurück zum Zitat Dini, G., & Duca, A. L. (2010). A reputation-based approach to tolerate misbehaving carriers in delay tolerant networks. In Proceedings of the 15th IEEE symposium on computers and communications, Italy. Dini, G., & Duca, A. L. (2010). A reputation-based approach to tolerate misbehaving carriers in delay tolerant networks. In Proceedings of the 15th IEEE symposium on computers and communications, Italy.
22.
Zurück zum Zitat Li, N., & Das, S. K. (2010). RADON: Reputation-assisted data forwarding in opportunistic networks. In Proceedings of the MobiOpp, pp. 8–14. Li, N., & Das, S. K. (2010). RADON: Reputation-assisted data forwarding in opportunistic networks. In Proceedings of the MobiOpp, pp. 8–14.
23.
Zurück zum Zitat Chen, I. R., Bao, F., Chang, M. J., & Cho, J. H. (2010). Trust management for encounter-based routing in delay tolerant networks. In IEEE global communications conference, Miami, USA. Chen, I. R., Bao, F., Chang, M. J., & Cho, J. H. (2010). Trust management for encounter-based routing in delay tolerant networks. In IEEE global communications conference, Miami, USA.
24.
Zurück zum Zitat Adali, S., Escriva, R., Hayvanovych, M., Magdon-Ismail, M., Szymanski, B., Wallace, W., et al. (2010). Measuring behavioral trust in social networks.In IEEE innternational conference on intelligence and security informatics (ISI 2010), pp. 150–152, Vancouver, BC, May 23–26, 2010. Adali, S., Escriva, R., Hayvanovych, M., Magdon-Ismail, M., Szymanski, B., Wallace, W., et al. (2010). Measuring behavioral trust in social networks.In IEEE innternational conference on intelligence and security informatics (ISI 2010), pp. 150–152, Vancouver, BC, May 23–26, 2010.
25.
Zurück zum Zitat Bulut, E., Wang, Z., & Szymanski, B. (2010). Cost effective multi-period spraying for routing in delay tolerant networks. In IEEE/ACM transactions on networking, Vol. 18. Bulut, E., Wang, Z., & Szymanski, B. (2010). Cost effective multi-period spraying for routing in delay tolerant networks. In IEEE/ACM transactions on networking, Vol. 18.
26.
Zurück zum Zitat Spyropoulos, T., Psounis, K., & Raghavendra, C. S. (2006). Performance analysis of mobility-assisted routing. In MobiHoc. Spyropoulos, T., Psounis, K., & Raghavendra, C. S. (2006). Performance analysis of mobility-assisted routing. In MobiHoc.
27.
Zurück zum Zitat Srinivasa, S., & Krishnamurthy, S. (2009). CREST: An opportunistic forwarding protocol based on conditional residual time. In Proceedings of the SECON. Srinivasa, S., & Krishnamurthy, S. (2009). CREST: An opportunistic forwarding protocol based on conditional residual time. In Proceedings of the SECON.
30.
Zurück zum Zitat Tournoux, P. U., Leguay, J., Benbadis, F., Conan, V., Amorim, M., & Whitbeck, J. (2009). The accordion phenomenon: Analysis, characterization, and impact on DTN pouting. In Proceedings of the INFOCOM. Tournoux, P. U., Leguay, J., Benbadis, F., Conan, V., Amorim, M., & Whitbeck, J. (2009). The accordion phenomenon: Analysis, characterization, and impact on DTN pouting. In Proceedings of the INFOCOM.
31.
Zurück zum Zitat Chaintreau, A., Hui, P., Crowcroft, J., Diot, C., Gass, R., & Scott, J. (2006). Impact of human mobility on the design of opportunistic forwarding algorithms. In Proceedings of the INFOCOM. Chaintreau, A., Hui, P., Crowcroft, J., Diot, C., Gass, R., & Scott, J. (2006). Impact of human mobility on the design of opportunistic forwarding algorithms. In Proceedings of the INFOCOM.
32.
Zurück zum Zitat Zhang, X., Kurose, J. F., Levine, B., Towsley, D., & Zhang, H. (2007). Study of a bus-based disruption tolerant network: Mobility modeling and impact on routing. In Proceedings of the ACM MobiCom. Zhang, X., Kurose, J. F., Levine, B., Towsley, D., & Zhang, H. (2007). Study of a bus-based disruption tolerant network: Mobility modeling and impact on routing. In Proceedings of the ACM MobiCom.
33.
Zurück zum Zitat Pujol, J. M., Toledo, A. L., & Rodriguez, P. (2009). Fair routing in delay tolerant networks. In Proceedings of the IEEE INFOCOM. Pujol, J. M., Toledo, A. L., & Rodriguez, P. (2009). Fair routing in delay tolerant networks. In Proceedings of the IEEE INFOCOM.
34.
Zurück zum Zitat Bulut, E., & Szymanski, B. (2011). On secure multi-copy based routing in delay tolerant networks. In Proceedings of the first international workshop on privacy, security and trust in mobile and wireless systems (MobiPST 2011), in conjunction with ICCN. Bulut, E., & Szymanski, B. (2011). On secure multi-copy based routing in delay tolerant networks. In Proceedings of the first international workshop on privacy, security and trust in mobile and wireless systems (MobiPST 2011), in conjunction with ICCN.
Metadaten
Titel
Secure Multi-copy Routing in Compromised Delay Tolerant Networks
verfasst von
Eyuphan Bulut
Boeslaw K. Szymanski
Publikationsdatum
01.11.2013
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2013
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-012-0960-4

Weitere Artikel der Ausgabe 1/2013

Wireless Personal Communications 1/2013 Zur Ausgabe