Open Access   Article Go Back

Black Hole Attack in Delay Tolerant Networks: A Survey

S. Jain1

Section:Survey Paper, Product Type: Journal Paper
Volume-2 , Issue-4 , Page no. 172-175, Apr-2014

Online published on Apr 30, 2014

Copyright © S. Jain . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S. Jain, “Black Hole Attack in Delay Tolerant Networks: A Survey,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.4, pp.172-175, 2014.

MLA Style Citation: S. Jain "Black Hole Attack in Delay Tolerant Networks: A Survey." International Journal of Computer Sciences and Engineering 2.4 (2014): 172-175.

APA Style Citation: S. Jain, (2014). Black Hole Attack in Delay Tolerant Networks: A Survey. International Journal of Computer Sciences and Engineering, 2(4), 172-175.

BibTex Style Citation:
@article{Jain_2014,
author = {S. Jain},
title = {Black Hole Attack in Delay Tolerant Networks: A Survey},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2014},
volume = {2},
Issue = {4},
month = {4},
year = {2014},
issn = {2347-2693},
pages = {172-175},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=132},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=132
TI - Black Hole Attack in Delay Tolerant Networks: A Survey
T2 - International Journal of Computer Sciences and Engineering
AU - S. Jain
PY - 2014
DA - 2014/04/30
PB - IJCSE, Indore, INDIA
SP - 172-175
IS - 4
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
3440 3302 downloads 3452 downloads
  
  
           

Abstract

Delay-Tolerant Network is a network above networks having unique characteristics like intermittent connectivity, longer delays and constraints on resources. DTN have the capability to survive long delays to achieve interoperability between the regional networks. Since nodes are intermittently connected with each other some new future prediction based routing protocols like Prophet, MaxProp have been proposed in this emerging areas for communication purposes. These future prediction based routing protocols depends on some easily modifiable metrics; attackers can easily forge these parameters to attack the network. This paper discusses one such popular Black-Hole attack on these routing protocols and some of the proposed solutions to mitigate their effect in the network.

Key-Words / Index Term

Wireless Networks, Delay Tolerant Networks, Security, Black Hole Attack

References

[1] F. Warthman. �Delay-tolerant networks (dtns): A tutorial�, 2003.
[2] Amin Vahdat and David Becker. �Epidemic routing for partially connected ad hoc networks�, Technical Report CS-2000-06, Department of Computer Science, Duke University, April 2000.
[3] Shikha Jain, Sandhya Aneja. �Spread and Erase: Efficient Routing Algorithm Based on Anti-Message Info Relay Hubs for Delay Tolerant Networks�, In Computer Networks & Communications (NetCom), Vol. 131 (2013), pp. 643-651.
[4] Guoliang Liu; Krishnamani, J.; Sunderraman, R.; Yingshu Li, "Prediction-based routing with packet scheduling under temporal constraint in delay tolerant networks," Performance Computing and Communications Conference (IPCCC), 2013 IEEE 32nd International , vol., no., pp.1,7, 6-8 Dec. 2013
[5] J.Burgess, B.Gallagher, D.Jensen and B.N.Levine, �Maxprop: Routing for vehicle-based disruption-tolerant networking,� in Proceedings of IEEE Infocom, April 2006.
[6] A. Lindgren, A. Doria, and O. Schelen, �Probabilistic routing in intermittently connected networks,� in Mobile Computing and Communications Review, 2003.
[7] A. Balasubramanianm, B. Levine, and A. Venkataramani. �DTN routing as a resource allocation problem�, In Proc. of ACM SIGCOMM, 2007.
[8] S. C. Nelson, M. Bakht and R. Kravets, �Encounter-based Routing in DTNs�, in Proceedings of IEEE Infocom, Rio De Janeiro, Brazil, pp.846-854, Apr. 2009.
[9] http://www.netlab.tkk.fi/tutkimus/dtn/theone
[10] Yanzhi Ren, Mooi Choo CHuah, Jie Yang, Yingying Chen, �MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks�.
[11] M. Chuah, P. Yang, and J. Han, "A ferry-based intrusion detection scheme for sparsely connected adhoc networks," in Proceedings of first workshop on security for emerging ubiquotous computing, 2007.
[12] http://www.isi.edu/nsnam/ns
[13] Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Chen, �Detecting Blackhole attacks in Disruption-Tolerant Networks through packet exchange recording�.
[14] M. E. Mahmoud, M. Barua, X. Shen, �SATS: Secure Data-Forwarding Scheme for Delay-Tolerant Wireless Networks.�