Black Hole Attack in Delay Tolerant Networks: A Survey
S. Jain1
Section:Survey Paper, Product Type: Journal Paper
Volume-2 ,
Issue-4 , Page no. 172-175, Apr-2014
Online published on Apr 30, 2014
Copyright © S. Jain . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: S. Jain, “Black Hole Attack in Delay Tolerant Networks: A Survey,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.4, pp.172-175, 2014.
MLA Style Citation: S. Jain "Black Hole Attack in Delay Tolerant Networks: A Survey." International Journal of Computer Sciences and Engineering 2.4 (2014): 172-175.
APA Style Citation: S. Jain, (2014). Black Hole Attack in Delay Tolerant Networks: A Survey. International Journal of Computer Sciences and Engineering, 2(4), 172-175.
BibTex Style Citation:
@article{Jain_2014,
author = {S. Jain},
title = {Black Hole Attack in Delay Tolerant Networks: A Survey},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2014},
volume = {2},
Issue = {4},
month = {4},
year = {2014},
issn = {2347-2693},
pages = {172-175},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=132},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=132
TI - Black Hole Attack in Delay Tolerant Networks: A Survey
T2 - International Journal of Computer Sciences and Engineering
AU - S. Jain
PY - 2014
DA - 2014/04/30
PB - IJCSE, Indore, INDIA
SP - 172-175
IS - 4
VL - 2
SN - 2347-2693
ER -
VIEWS | XML | |
3510 | 3312 downloads | 3481 downloads |
Abstract
Delay-Tolerant Network is a network above networks having unique characteristics like intermittent connectivity, longer delays and constraints on resources. DTN have the capability to survive long delays to achieve interoperability between the regional networks. Since nodes are intermittently connected with each other some new future prediction based routing protocols like Prophet, MaxProp have been proposed in this emerging areas for communication purposes. These future prediction based routing protocols depends on some easily modifiable metrics; attackers can easily forge these parameters to attack the network. This paper discusses one such popular Black-Hole attack on these routing protocols and some of the proposed solutions to mitigate their effect in the network.
Key-Words / Index Term
Wireless Networks, Delay Tolerant Networks, Security, Black Hole Attack
References
[1] F. Warthman. �Delay-tolerant networks (dtns): A tutorial�, 2003.
[2] Amin Vahdat and David Becker. �Epidemic routing for partially connected ad hoc networks�, Technical Report CS-2000-06, Department of Computer Science, Duke University, April 2000.
[3] Shikha Jain, Sandhya Aneja. �Spread and Erase: Efficient Routing Algorithm Based on Anti-Message Info Relay Hubs for Delay Tolerant Networks�, In Computer Networks & Communications (NetCom), Vol. 131 (2013), pp. 643-651.
[4] Guoliang Liu; Krishnamani, J.; Sunderraman, R.; Yingshu Li, "Prediction-based routing with packet scheduling under temporal constraint in delay tolerant networks," Performance Computing and Communications Conference (IPCCC), 2013 IEEE 32nd International , vol., no., pp.1,7, 6-8 Dec. 2013
[5] J.Burgess, B.Gallagher, D.Jensen and B.N.Levine, �Maxprop: Routing for vehicle-based disruption-tolerant networking,� in Proceedings of IEEE Infocom, April 2006.
[6] A. Lindgren, A. Doria, and O. Schelen, �Probabilistic routing in intermittently connected networks,� in Mobile Computing and Communications Review, 2003.
[7] A. Balasubramanianm, B. Levine, and A. Venkataramani. �DTN routing as a resource allocation problem�, In Proc. of ACM SIGCOMM, 2007.
[8] S. C. Nelson, M. Bakht and R. Kravets, �Encounter-based Routing in DTNs�, in Proceedings of IEEE Infocom, Rio De Janeiro, Brazil, pp.846-854, Apr. 2009.
[9] http://www.netlab.tkk.fi/tutkimus/dtn/theone
[10] Yanzhi Ren, Mooi Choo CHuah, Jie Yang, Yingying Chen, �MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks�.
[11] M. Chuah, P. Yang, and J. Han, "A ferry-based intrusion detection scheme for sparsely connected adhoc networks," in Proceedings of first workshop on security for emerging ubiquotous computing, 2007.
[12] http://www.isi.edu/nsnam/ns
[13] Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Chen, �Detecting Blackhole attacks in Disruption-Tolerant Networks through packet exchange recording�.
[14] M. E. Mahmoud, M. Barua, X. Shen, �SATS: Secure Data-Forwarding Scheme for Delay-Tolerant Wireless Networks.�