Skip to main content

Using Cluster Analysis to Detect Attackers in Vehicular Delay Tolerant Networks

  • Conference paper
  • First Online:
Ad Hoc Networks (ADHOCNETS 2013)

Abstract

Delay- and Disruption-Tolerant Networks (DTNs) are a suitable technology for many applications when the network suffers from intermittent connections and significant delays. However, the characteristics of a DTN make most traditional strategies of detecting attackers infeasible. In this paper, we propose a Misbehavior Detection System (MDS) to defend a DTN against blackhole and greyhole attackers without the need of an initial learning phase. We evaluate our method in two scenarios using different DTN routing protocols. We show that the proposed MDS has a fast reaction time and can efficiently detect evil nodes with varying drop probabilities under different scenarios yielding a high detection and low false positive rate while saving resources in the system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Asokan, N., Kostiainen, K., Ginzboorg, P., Ott, J., Luo, C.: Applicability of identity-based cryptography for disruption-tolerant networking. In: Proceedings of the 1st International MobiSys Workshop on Mobile Opportunistic Networking, New York, USA, pp. 52–56, June 2007

    Google Scholar 

  2. Buchegger, S., Le Boudec, J.-Y.: Performance analysis of the confidant protocol. In: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing, Lausanne, Switzerland, pp. 226–236, June 2002

    Google Scholar 

  3. Burgess, J., Gallagher, B., Jensen, D., Levine, B.N.: Maxprop: routing for vehicle-based disruption-tolerant networks. In: Proceedings of the IEEE INFOCOM, Barcelona, Spain, April 2006

    Google Scholar 

  4. Cerf, V., Burleigh, S., Hooke, A., Torgerson, L., Durst, R., Scott, K., Fall, K., Weiss, H.: Delay-tolerant networking architecture. RFC 4838 (Informational), April 2007

    Google Scholar 

  5. Chuah, M., Yang, P., Han, J.: A ferry-based intrusion detection scheme for sparsely connected ad hoc networks. In: Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking Services, Philadelphia, PA, USA, pp. 1–8, August 2007

    Google Scholar 

  6. Guo, Y., Schildt, S., Morgenroth, J., Wolf, L.: A misbehavior detection system for vehicular delay tolerant networks. In: Proceedings of the INFORMATIK 2012, Braunschweig, Germany, September 2012

    Google Scholar 

  7. Guo, Y., Schildt, S., Wolf, L.: Detecting blackhole and greyhole attacks in vehicular delay tolerant networks. In: Fifth International Conference on Communication Systems and Networks, Bangalore, India, pp. 1–7, January 2013

    Google Scholar 

  8. Jain, A.K.: Data clustering: 50 years beyond k-means. Pattern Recogn. Lett. 31(8), 651–666 (2010). (Award winning papers from the 19th International Conference on Pattern Recognition (ICPR))

    Article  Google Scholar 

  9. Jain, A.K., Dubes, R.C.: Algorithms for Clustering Data. Prentice-Hall Inc., Upper Saddle River (1988)

    MATH  Google Scholar 

  10. Kaufman, L., Rousseeuw, P.J.: Finding Groups in Data: An Introduction to Cluster Analysis. Wiley-Interscience, New York (1990)

    Book  Google Scholar 

  11. Keränen, A., Ott, J., Kärkkäinen, T.: The one simulator for dtn protocol evaluation. In: Proceedings of the 2nd International Conference on Simulation Tools and Techniques, Rome, Italy, pp. 55:1–55:10, March 2009

    Google Scholar 

  12. Li, F., Wu, J., Srinivasan, A.: Thwarting blackhole attacks in disruption-tolerant networks using encounter tickets. In: IEEE INFOCOM 2009, Rio de Janeiro, Brazil, pp. 2428–2436, April 2009

    Google Scholar 

  13. Li, Q., Cao, G.: Mitigating routing misbehavior in disruption tolerant networks. IEEE Trans. Inf. Forensics Secur. 7(2), 664–675 (2012)

    Article  Google Scholar 

  14. Lindgren, A., Doria, A., Schelén, O.: Probabilistic routing in intermittently connected networks. SIGMOBILE Mob. Comput. Commun. Rev. 7(3), 19–20 (2003)

    Article  Google Scholar 

  15. Marti, S., Giuli, T.J. , Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, Boston, USA, pp. 255–265, August 2000

    Google Scholar 

  16. Piorkowski, M., Sarafijanovic-Djukic, N. , Grossglauser, M.: CRAWDAD data set epfl/mobility (v. 2009–02-24). http://crawdad.cs.dartmouth.edu/epfl/mobility, February 2009

  17. Ren, Y., Chuah, M.C., Yang, J., Chen, Y.: Muton: Detecting malicious nodes in disruption-tolerant networks. In: IEEE 2010 Wireless Communications and Networking Conference, Sydney, Australia, pp. 1–6, April 2010

    Google Scholar 

  18. Spyropoulos, T., Psounis, K., Raghavendra, C.S.: Spray and wait: an efficient routing scheme for intermittently connected mobile networks. In: Proceedings of the 2005 ACM SIGCOMM Workshop on Delay-tolerant Networking, Philadelphia, USA, pp. 252–259, August 2005

    Google Scholar 

  19. Vahdat, A., Becker, D.: Epidemic routing for partially-connected ad hoc networks. Duke University, Technical report (2000)

    Google Scholar 

  20. Zhu, H., Lin, X., Lu, R., Fan, Y., Shen, X.: Smart: a secure multilayer credit-based incentive scheme for delay-tolerant networks. IEEE Trans. Veh. Technol. 58(8), 4628–4639 (2009)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yinghui Guo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Guo, Y., Schildt, S., Wolf, L. (2014). Using Cluster Analysis to Detect Attackers in Vehicular Delay Tolerant Networks. In: Sherif, M., Mellouk, A., Li, J., Bellavista, P. (eds) Ad Hoc Networks. ADHOCNETS 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 129. Springer, Cham. https://doi.org/10.1007/978-3-319-04105-6_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-04105-6_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-04104-9

  • Online ISBN: 978-3-319-04105-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics