Skip to main content

Detection of Black Hole Attack in Delay-Tolerant Network

  • Conference paper
  • First Online:
Computational Advancement in Communication Circuits and Systems

Abstract

In spite of modernization of humanity, in emergency situations like after any natural calamity our infrastructure-based network backbone gets affected first. Disaster relief volunteers face the immense pain to set up a communication system, due to the failure of telecommunication infrastructure and long-standing power. Smartphones are the most preferable devices, operating and acting in delay-tolerant mode through Bluetooth/Wi-Fi, for setting up a peer-to-peer network enabling communication in post-disaster network. It is now popularly known as delay-/disruption-tolerant network (DTN). In this network, a node can misbehave and fail to establish a route or direct the data to neighbor node due to its malicious activity to decrease the performance of overall network. If a node suddenly drops messages after receiving, then it is known as black hole node. Black hole nodes do not forward any messages and can also destroy the message forever. A node may also act as a partially black hole node with the character of selective dropping. However, black hole nodes can hamper the overall performance of the network. In this paper, we have proposed a method to detect and avoid the malicious nodes forming black hole attack in DTN. We also evaluate the scheme using ONE simulator.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Image Source: https://www.jpinfotech.org/provest-provenance-based-trust-model-delay-tolerant-networks/

  2. C. Chakrabarti, S. Roy, Adapting mobility of observers for quick reputation assignment in a sparse post-disaster communication network, in IEEE Proceedings of AIMoC (2015), pp. 29–35

    Google Scholar 

  3. C. Chakrabarti, S. Roy, S. Basu, Intention aware misbehavior detection for post-disaster opportunistic communication over peer-to-peer DTN, in Peer to Peer Networking and Applications (Springer, 2018), pp. 1–19

    Google Scholar 

  4. C. Chakrabarti, A. Banerjee, S. Roy, An observer-based distributed scheme for selfish-node detection in a post-disaster communication environment using delay tolerant network, in Proceedings of AIMoC (2014), pp. 151–156

    Google Scholar 

  5. S. Banerjee, Detection/removal of cooperative black and gray hole attack in mobile ad-hoc networks, in World Congress on Engineering and Computer Science, October (2008), pp. 337–342

    Google Scholar 

  6. L. Tamilselvan, V. Sankaranarayanan, Prevention of co-operative black hole attack in MANET. J. Netw. 3(5), 13–20 (2008)

    Google Scholar 

  7. S. Kurosawa, Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method. Proc. Int. J. Netw. Secur. (2006)

    Google Scholar 

  8. A. Bhattacharyya, D. Bose, A. Banerjee, H. Saha, D. Bhattacharjee, Different types of attacks in Mobile ADHOC Network: prevention and mitigation techniques. Int. J. Commun. Netw. Syst. 22 Sep 2012

    Google Scholar 

  9. Bhattacharjee, S., Basu, S., Roy, S., Das Bit, S.: Best-effort delivery of emergency messages in post disaster scenario with content-based filtering and priority-enhanced Prophet over DTN, in 2016 8th International Conference on Communication Systems and Networks (2016)

    Google Scholar 

  10. S. Saha, V.K. Shah, R. Verma, R. Mandal, S. Nandi, Is it worth taking a planned approach to design ad hoc infrastructure for post disaster communication, in CHANTS’12, Istanbul, Turkey, 22 August 2012

    Google Scholar 

  11. S. Saha, S. Patra, A. Sheldekar, S. Nandi, Post disaster management using delay tolerant network, in 3rd International Conference on Wireless & Mobile Networks, Ankara, Turkey, 26–28 June 2011

    Google Scholar 

  12. R. Hegde, T.H. Sreenivas, Steganography in ad hoc networks. Int. J. Comput. Sci. Inf. Technol. 6(6), 5405–5408 (2015)

    Google Scholar 

  13. L. Delosières, S. Nadjm-Tehrani, BATMAN store-and-forward: the best of the two worlds, in IEEE (2012)

    Google Scholar 

  14. Y.S. Uddin, D.M. Nicol, T.F. Abdelzaher, R.H. Kravets, A post-disaster mobility model for delay tolerant networking, in Proceedings of WSC (2009), pp. 2785–2796

    Google Scholar 

  15. X. Zhang, X. Wang, A. Liu, Q. Zhang, C. Tang, Reputation-based scheme for delay tolerant networks, in 2011 International Conference on Computer Science and Network Technology (2011)

    Google Scholar 

  16. Z. Gao, H. Zhu, S. Du, C. Xiao, R. Lu, PMDS: A probabilistic misbehavior detection scheme in DTN, in IEEE ICC 2012—Wireless Networks Symposium

    Google Scholar 

  17. H. Zhu, S. Du, Z. Gao, M. Dong, Z. Cao, A secure user centric and social-aware reputation based incentive scheme for DTNs, In final form 12 March (2012)

    Google Scholar 

  18. R. Lu, X. Lin, H. Zhu, X. Shen, B. Preiss, Pi: a practical incentive protocol for delay tolerant networks. IEEE Trans. Wireless Commun. 9(4), April (2010)

    Google Scholar 

  19. H. Zhu, S. Du, Z. Gao, M. Dong, Z. Cao, A probabilistic misbehavior detection scheme toward efficient trust establishment in delay-tolerant networks. IEEE Trans. Parallel Distrib. Syst. 25(1), 22–32 (2014)

    Article  Google Scholar 

  20. M. Asplund, S. Nadjm-Tehrani, J. Sigholm, Emerging Information Infrastructures: Cooperation in Disasters, Lecture Notes in Computer Science, vol. 5508 (Springer, Berlin, 2009)

    Google Scholar 

  21. A. Keranen, J. Ott, T. Karkkainen, The ONE simulator for DTN protocol evaluation, in Proceedings of SIMUTools (2009), Article No. 55

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chandrima Chakrabarti .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chakrabarti, C. et al. (2020). Detection of Black Hole Attack in Delay-Tolerant Network. In: Maharatna, K., Kanjilal, M., Konar, S., Nandi, S., Das, K. (eds) Computational Advancement in Communication Circuits and Systems. Lecture Notes in Electrical Engineering, vol 575. Springer, Singapore. https://doi.org/10.1007/978-981-13-8687-9_19

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-8687-9_19

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-8686-2

  • Online ISBN: 978-981-13-8687-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics