Abstract
Delay- and Disruption-Tolerant Networks (DTNs) are a suitable technology for many applications when the network suffers from intermittent connections and significant delays. However, the characteristics of a DTN make most traditional strategies of detecting attackers infeasible. In this paper, we propose a Misbehavior Detection System (MDS) to defend a DTN against blackhole and greyhole attackers without the need of an initial learning phase. We evaluate our method in two scenarios using different DTN routing protocols. We show that the proposed MDS has a fast reaction time and can efficiently detect evil nodes with varying drop probabilities under different scenarios yielding a high detection and low false positive rate while saving resources in the system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Asokan, N., Kostiainen, K., Ginzboorg, P., Ott, J., Luo, C.: Applicability of identity-based cryptography for disruption-tolerant networking. In: Proceedings of the 1st International MobiSys Workshop on Mobile Opportunistic Networking, New York, USA, pp. 52–56, June 2007
Buchegger, S., Le Boudec, J.-Y.: Performance analysis of the confidant protocol. In: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing, Lausanne, Switzerland, pp. 226–236, June 2002
Burgess, J., Gallagher, B., Jensen, D., Levine, B.N.: Maxprop: routing for vehicle-based disruption-tolerant networks. In: Proceedings of the IEEE INFOCOM, Barcelona, Spain, April 2006
Cerf, V., Burleigh, S., Hooke, A., Torgerson, L., Durst, R., Scott, K., Fall, K., Weiss, H.: Delay-tolerant networking architecture. RFC 4838 (Informational), April 2007
Chuah, M., Yang, P., Han, J.: A ferry-based intrusion detection scheme for sparsely connected ad hoc networks. In: Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking Services, Philadelphia, PA, USA, pp. 1–8, August 2007
Guo, Y., Schildt, S., Morgenroth, J., Wolf, L.: A misbehavior detection system for vehicular delay tolerant networks. In: Proceedings of the INFORMATIK 2012, Braunschweig, Germany, September 2012
Guo, Y., Schildt, S., Wolf, L.: Detecting blackhole and greyhole attacks in vehicular delay tolerant networks. In: Fifth International Conference on Communication Systems and Networks, Bangalore, India, pp. 1–7, January 2013
Jain, A.K.: Data clustering: 50 years beyond k-means. Pattern Recogn. Lett. 31(8), 651–666 (2010). (Award winning papers from the 19th International Conference on Pattern Recognition (ICPR))
Jain, A.K., Dubes, R.C.: Algorithms for Clustering Data. Prentice-Hall Inc., Upper Saddle River (1988)
Kaufman, L., Rousseeuw, P.J.: Finding Groups in Data: An Introduction to Cluster Analysis. Wiley-Interscience, New York (1990)
Keränen, A., Ott, J., Kärkkäinen, T.: The one simulator for dtn protocol evaluation. In: Proceedings of the 2nd International Conference on Simulation Tools and Techniques, Rome, Italy, pp. 55:1–55:10, March 2009
Li, F., Wu, J., Srinivasan, A.: Thwarting blackhole attacks in disruption-tolerant networks using encounter tickets. In: IEEE INFOCOM 2009, Rio de Janeiro, Brazil, pp. 2428–2436, April 2009
Li, Q., Cao, G.: Mitigating routing misbehavior in disruption tolerant networks. IEEE Trans. Inf. Forensics Secur. 7(2), 664–675 (2012)
Lindgren, A., Doria, A., Schelén, O.: Probabilistic routing in intermittently connected networks. SIGMOBILE Mob. Comput. Commun. Rev. 7(3), 19–20 (2003)
Marti, S., Giuli, T.J. , Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, Boston, USA, pp. 255–265, August 2000
Piorkowski, M., Sarafijanovic-Djukic, N. , Grossglauser, M.: CRAWDAD data set epfl/mobility (v. 2009–02-24). http://crawdad.cs.dartmouth.edu/epfl/mobility, February 2009
Ren, Y., Chuah, M.C., Yang, J., Chen, Y.: Muton: Detecting malicious nodes in disruption-tolerant networks. In: IEEE 2010 Wireless Communications and Networking Conference, Sydney, Australia, pp. 1–6, April 2010
Spyropoulos, T., Psounis, K., Raghavendra, C.S.: Spray and wait: an efficient routing scheme for intermittently connected mobile networks. In: Proceedings of the 2005 ACM SIGCOMM Workshop on Delay-tolerant Networking, Philadelphia, USA, pp. 252–259, August 2005
Vahdat, A., Becker, D.: Epidemic routing for partially-connected ad hoc networks. Duke University, Technical report (2000)
Zhu, H., Lin, X., Lu, R., Fan, Y., Shen, X.: Smart: a secure multilayer credit-based incentive scheme for delay-tolerant networks. IEEE Trans. Veh. Technol. 58(8), 4628–4639 (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Guo, Y., Schildt, S., Wolf, L. (2014). Using Cluster Analysis to Detect Attackers in Vehicular Delay Tolerant Networks. In: Sherif, M., Mellouk, A., Li, J., Bellavista, P. (eds) Ad Hoc Networks. ADHOCNETS 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 129. Springer, Cham. https://doi.org/10.1007/978-3-319-04105-6_12
Download citation
DOI: https://doi.org/10.1007/978-3-319-04105-6_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-04104-9
Online ISBN: 978-3-319-04105-6
eBook Packages: Computer ScienceComputer Science (R0)