An Approach to Mitigate Blackhole Attack on Delay Tolerant Networks using Multiple Paths
DOI:
https://doi.org/10.33448/rsd-v9i8.5535Keywords:
Delay and tolerant networks; Blackhole attack; Mitigation.Abstract
Delay and Tolerant Networks (DTNs) are networks that do not need infrastructure and use their nodes to communicate. However Blackhole attacks (Blackhole) constitute a threat to the functioning of these networks by dropping packets from legitimate users. There are attempts in the literature to solve the blackhole attack on DTNs. However, the implemented forms consume a large amount of network resources because they work by generating copies of the message. This paper presents a Mitigation approach that uses Mojette and multiple paths to fragment, send and retrieve data without high network wear. The approach was developed using the Eclipse IDE in conjunction with The Opportunistic Network Environment Simulator. In this environment two scenarios with different situations were developed in order to perform three simulations, aiming to evaluate the approach that aims to transmit and retrieve the package even if there are discards. Simulation results show that the approach has a re-assembly rate of at least 75%, even though the lost packet rate is 62.50%.
References
Al-Shurman, M., Yoo, S. M., & Park, S. (2004). Black hole attack in mobile ad hoc networks. In: Proceedings of the 42Nd Annual Southeast Regional Conference, ACM-SE 42, 96–97, New York, NY, USA. ACM. Disponível em: https://doi.org/10.1145/986537.986560. Acesso em agosto, 2019.
Alves Júnior, J., & Albini, L. C. P. (2012). Um protocolo de roteamento resistente a ataques blackhole sem detecção de nós maliciosos. In Simpósio Brasileiro de Telecomunicações. Disponível em: http://sbrt.org.br/sbrt2012/publicacoes/97960_1.pdf. Acesso em agosto, 2019.
Baburaj, C., & Alagarsamy, K. (2015). An efficient secure routing mechanism for preventing wormhole and black hole attacks in a trusted DTN environment. 9, 140–147. Disponível em: https://www.researchgate.net/publication/284601517_An_efficient_secure_routing_mechanism_for_preventing_wormhole_and_black_hole_attacks_in_a_trusted_DTN_environment. Acesso em setembro, 2019.
Cao, Y., & Sun, Z. (2013). Routing in delay/disruption tolerant networks: a taxonomy, survey and challenges. IEEE Communications Surveys Tutorials, 15(2),654–677. Disponível em: https://ieeexplore.ieee.org/document/6196145. Acesso em agosto, 2019.
Campos, C. A. V., Fernandes, R. M. S., & Moraes, L. F. M. (2009). Uma avaliação das redes tolerantes a atrasos e desconexões através de traces reais de mobilidade humana. Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Disponível em: http://ce-resd.facom.ufms.br/sbrc/2009/055.pdf. Acesso em outubro, 2019.
Cerf, V., & Burleigh, S. H. (2002). Delay-tolerant network architecture: The evolving interplanetary internet. Disponível em: https://tools.ietf.org/html/draft-irtf-ipnrg-arch-01. Acesso em agosto, 2019.
Fall, K. (2010). A delay-tolerant network architecture for challenged internets. In Proceeding of annual conference of the special Internet Group on Data Communication ACM Siggomm ’03, pages 27–34. Disponível em: https://dl.acm.org/doi/10.1145/863955.863960. Acesso em agosto, 2019.
Guedon, J., & Normand, N. (2005). The Mojette transform: The first ten years. In Andres, E.; Damiand, G.; Lienhardt, P. Discrete Geometry for Computer Imagery, volume 3429 of Lecture Notes in Computer Science, 79–91. Disponível em: https://link.springer.com/chapter/10.1007/978-3-540-31965-8_8. Acesso em maio, 2019.
Gupta, D. D., & Sharma, R. (2016). Blackhole detection and prevention strategies in DTN. International Journal of Engineering and Computer Science, 5(8). Disponível em: http://www.ijecs.in/index.php/ijecs/article/view/2091. Acesso em maio, 2019.
Hao-Min, L., Ge Y., Pang, A., & Pathmasuntharam, J. S. (2010). Performance study on delay tolerant networks in maritime communication environments. In Oceans’10 IEEE Sydney, 1–6. Disponível em: https://ieeexplore.ieee.org/document/5603627. Acesso em agosto, 2019.
Hinai, A. A., Zhang, H., Chen, Y. (2012). Mitigating blackhole attacks in delay tolerant networks. In 2012 13th International Conference on Parallel and Distributed Computing, Applications and Technologies, pages 329–334. Disponível em: https://ieeexplore.ieee.org/document/6589301. Acesso em junho, 2019.
Khadar, F., & Razafindralambo, T. (2007). Performance evolution of gradient routing strategy for wireless sensor network. In Proceeding of annual conference of the special Internet Group on Data Communication (ACM Siggomm ’03, 5550, 535–547. Disponível em: https://www.researchgate.net/publication/43107635_Performance_Evaluation_of_Gradient_Routing_Strategies_for_Wireless_Sensor_Networks. Acesso em outubro, 2019.
Lou, W., Liu, W., Zhang, Y., & Fang, Y. (2003). Spread: improving network security by multi-path routing. In IEEE Military Communications Conference, 2003. MILCOM 2003, 2, 808–813. Disponível em: https://link.springer.com/article/10.1007/s11276-007-0039-4. Acesso em setembro, 2019.
Mangrulkar, R. S., & Atique, M. (2010). Routing protocol for delay tolerant network: A survey and comparison. In 2010 International Conference on Communication Control and Computing Technologies, pages 210–215. Disponível em: https://ieeexplore.ieee.org/document/5670553. Acesso em setembro, 2019.
Mendes, D. R. (2007). Redes de Computadores: Teoria e prática. Rio de Janeiro: Novatec.
Navaz, A. S. S., Rex, J., & Mary, P. (2015). An efficient intrusion detection scheme for mitigating nodes using data aggregation in delay tolerant network. International Journal of Scientific and Engineering Research 6(9),421-428. Disponível em:
https://www.researchgate.net/publication/282331850_An_Efficient_Intrusion_Detection_Scheme_for_Mitigating_Nodes_Using_Data_Aggregation_in_Delay_Tolerant_Network. Acesso em outubro, 2019.
Nunes, C. M., & Dotti, F. L. (2009). Uma nova estratégia de roteamento para redes tolerantes a atrasos. In Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Disponível em: https://pdfs.semanticscholar.org/02bb/c6c16b37b7bb30446cec80ffd6a8d63908ef.pdf. Acesso em agosto, 2019.
Oliveira, C. T., Taveira, D. M., Braga, R. B., & Duarte, O. C. M. B. (2008). Uma proposta de roteamento probabilístico para redes tolerantes a atrasos e desconexões. In 26 Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Disponível em: http://ce-resd.facom.ufms.br/sbrc/2008/052.pdf. Acesso em outubro, 2019.
Oliveira, C. T., Moreira, M. D. D., Rubinstein, M. G., Costa; L; H. M. K., & Duarte, O. C. M. B. (2007) Redes Tolerantes a Atrasos e Desconexões. Capítulo 5, Minicurso. 25.o Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Disponível em: https://www.gta.ufrj.br/ftp/gta/TechReports/OlDu07.pdf. Acesso em junho, 2020.
Pham, D., & Yeo, C. K. (2015). Detecting colluding blackhole and greyhole attack in delay tolerant networks. IEEE Transactions on Mobile Computing 15(5):1-1. Disponível em: https://www.researchgate.net/publication/282544907_Detecting_Colluding_Blackhole_and_Greyhole_Attack_in_Delay_Tolerant_Networks. Acesso em outubro, 2019.
Ren, Y., Chuah, M. C., Yang, J., & Chen, Y. (2010). Detecting blackhole attacks in disruption-tolerant networks through packet exchange recording. In 2010 IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), 1–6. Disponível em: https://ieeexplore.ieee.org/document/5534944. Acesso em outubro, 2019.
Ross, J. (2013). Redes de computadores. Rio de Janeiro: Antenna Edicões Técnicas.
Serfozo, P., Vasarhelyi, J., & Turán, J. (2007). Application of mojette transform in internet distributed databases. 65 – 70. Disponível em: https://www.researchgate.net/publication/4266052_Application_of_Mojette_Transform_in_Internet_Distributed_Databases. Acesso em outubro, 2019.
Soundaravalli, D. (2017). Identify intrigue blackhole and greyhole attacks in prorogation sophisticated networks. In 2017 International Conference on Technical Advancements in Computers and Communications (ICTACC), 160–162. Disponível em: https://ieeexplore.ieee.org/document/8067599. Acesso em maio, 2019.
Tanenbaum, A. S. (2003). Redes de computadores. Rio de Janeiro: Campus.
Tsai, J., & Moors, T. (2006). A review of multipath routing protocols: From wireless adhoc to mesh networks. Disponível em: http://www2.ee.unsw.edu.au/~timm/pubs/06acorn/published.pdf. Acesso em maio, 2019.
Vieira, A., Filho, C. J., & Patel, A. (2013). Vdtn-tod: Routing protocol vanet/dtn ba-sed on trend of delivery. Advanced International Conference on Telecommunications, AICT, 2013, 135–141. Disponível em: https://www.researchgate.net/publication/288727744_VDTN-ToD_Routing_protocol_VANETDTN_based_on_trend_of_delivery. Acesso em agosto, 2019.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
1) Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2) Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3) Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.