Protocols for mitigating blackhole attacks in delay tolerant networks | Wireless Networks Skip to main content
Log in

Protocols for mitigating blackhole attacks in delay tolerant networks

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

High node mobility and infrequent connectivity in delay tolerant networks (DTNs) makes it challenging to implement traditional security algorithms for detecting malicious nodes. In DTN, most of the routing algorithms are based on the announcement of routing metrics like probability of delivery, contact strength or social group strength by the nodes in contact. Blackhole in DTN exploits these characteristics of routing protocols and either announces a high value of these metrics or tries to attain a high value for them by following fast, repeated movement patterns. Dynamic social grouping (DSG) based routing algorithm shows that social behavior of nodes helps to make better forwarding decisions and to achieve highest message delivery ratio amongst other existing routing algorithms. We examine the impact of blackholes, intermittent blackholes and tailgating attack on DSG. We propose a suit of three solutions. Our first solution detects blackholes and tailgating malicious nodes in the network, however, is not suitable for intermittent blackholes. Second solution handles intermittent blackholes and performs well when the nodes are well connected. The third and final solution handles intermittent blackholes in sparsely connected as well as in well-connected networks. In all proposed solutions, blackholes are not able to degrade the performance of the protocols by changing their geographical locations. We demonstrate through simulation that our protocols improve upon the message delivery ratio over the existing solutions. An appropriate protocol from the suit may be used depending upon an application.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Burgess, J., Gallagher, B., Jensen, D., & Levine, B. N. Maxprop: Routing for vehicle-based disruption-tolerant networks. In INFOCOM 2006. 25th IEEE international conference on computer communications. Proceedings, (pp. 1–11), April (2006).

  2. Cabaniss, R., Vulli, S., & Madria, S. (2013). Social group detection based routing in delay tolerant networks. Wireless Networks, 19(8), 1979–1993.

    Article  Google Scholar 

  3. Caini, C., Cruickshank, H., Farrell, S., & Marchese, M. (2011). Delay- and disruption-tolerant networking (dtn): An alternative solution for future satellite networking applications. Proceedings of the IEEE, 99(11), 1980–1997.

    Article  Google Scholar 

  4. Dini, G., & Duca, A. L. A reputationbased approach to tolerate misbehaving carriers in delay tolerant networks. In Proceedings of the the IEEE symposium on computers and communications, (pp. 772–777), (2010).

  5. Keranen, A., Ott, J., & inen, T. K. The one simulator for dtn protocol evaluation. In Proceedings of the 2nd international conference on simulation tools and techniques, SIMUTools 09, (2009).

  6. Laoutaris, N., Smaragdakis, G., Rodriguez, P., & Sundaram, R. (2009). Delay tolerant bulk data transfers on the internet. SIGMETRICS Performance Evaluation Review, 37(1), 229–238.

    Google Scholar 

  7. Li, F., Wu, J., & Srinivasan, A. Thwarting blackhole attacks in disruption-tolerant networks using encounter tickets. In INFOCOM 2009, IEEE, (pp. 2428–2436), April (2009).

  8. Li, Q., & Cao, G. (2012). Mitigating routing misbehavior in disruption tolerant networks. Information Forensics and Security, IEEE Transactions on, 7(2), 664–675.

    Article  Google Scholar 

  9. Lindgren, A., Doria, A., & Schelen, O. (2003). Probabilistic routing in intermittently connected networks. SIGMOBILE Mobile Computing and Communications Review, 7, 19–20.

    Article  Google Scholar 

  10. Lu, Z., & Fan, J. Delay/disruption tolerant network and its application in military communications. In Computer design and applications (ICCDA), 2010 international conference on, vol. 5, (pp. V5-231–V5-234), (2010).

  11. Musolesi, M., & Mascolo, C. (2009). Car: Context-aware adaptive routing for delay-tolerant mobile networks. Mobile Computing, IEEE Transactions on, 8(2), 246–260.

    Article  Google Scholar 

  12. Li, N., & Das, S. (2013). A trust-based framework for data forwarding in opportunistic networks. Ad hoc Networks, 11(4), 1497–1509.

    Article  Google Scholar 

  13. Scott, J., Gass, R., Crowcroft, J., Hui, P., Diot, C., & Chaintreau, A. Crawdad data set cambridge/haggle (v. 2009-05-29). In Downloaded from http://crawdad.cs.dartmouth.edu/cambridge/haggle May 2009, (2009).

  14. Vahdat, A., & Becker, D. Epidemic routing for partially connected ad hoc networks. In Technical Report CS-200006 Duke University, (2000).

  15. Guo, J.M.Y., Schildt, S., & Wolf, L. A misbehavior detection system for vehicular delay tolerant networks. In Proceedings of the INFORMATIK 2012, Braunschweig, Germany, September (2012).

  16. Guo, Y., Schildt, S., & Wolf, L. (2013). Detecting blackhole and greyhole attacks in vehicular delay tolerant networks. In Communication Systems and Networks (COMSNETS), 2013 Fifth International Conference on IEEE (pp. 1–7).

  17. Ren, Y., Chuah, M., Yang, J., & Chen, Y. (2010). Muton: Detecting malicious nodes in disruption-tolerant networks. In Wireless Communications and Networking Conference (WCNC), 2010 IEEE (pp. 1–6).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sanjay Madria.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Nagrath, P., Aneja, S., Gupta, N. et al. Protocols for mitigating blackhole attacks in delay tolerant networks. Wireless Netw 22, 235–246 (2016). https://doi.org/10.1007/s11276-015-0959-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-015-0959-3

Keywords

Navigation