Secure Group Communication in Delay Tolerant Mobile Ad-Hoc Network

  • Prachi Tiwari Radharaman Institute of Technology and Science, Bhopal, M.P, India
Keywords: DTN, Blackhole, Jamming, Vampire, Multicasting, Routing

Abstract

Delay-tolerant networks (DTNs) are well-known for delivering various types of information from different senders in a multicast manner, both in centralised and decentralised networks. Wireless mobile nodes form small networks in which one or more senders transmit data to one or more destinations through intermediate nodes. DTN routing protocols differ from traditional wireless routing protocols. There are security threats in DTNs, such as blackhole attackers dropping data, jamming attacks consuming bandwidth, and Vampire attacks depleting battery power and available bandwidth. This paper proposes a prevention scheme to detect and mitigate all three types of attackers in multicast communication. These attackers can impact performance by generating false replies, flooding with redundant information, and wasting communication power. The primary focus of this paper is on security issues related to DTN routing protocols. In order to counter malicious nodes, a blacklist is maintained, and if a neighbour identifies a node as malicious, it excludes packets from that node. Meanwhile, the neighbour continues sending packets to the malicious node, except for broadcast packets, which are dropped. If a node is found to forward no packets or only some packets by all its neighbours, any reply it gives to route requests is disregarded, and any request it initiates is ignored. Successful data reception at the destination indicates that hop-based data delivery maintains a record of successful transmissions. The proposed security scheme demonstrates improved performance.

Downloads

Download data is not yet available.

References

[1]. Savita, Prof. D.K. Lobiyal, “Location Information and Inter-Contact based Routing approach for Delay Tolerant Networks” Elsevier Procedia Computer Science 57 (2015) 1367 – 1375.
[2]. Seung Deok Han and Yun Won Chung “An Improved PRoPHET Routing Protocol in Delay Tolerant Network” Hindawi Publishing Corporation Scientific World Journal Volume 2015.
[3]. Yuxin Mao, Chenqian Zhou, Yun Ling, et al. “An Optimised Probabilistic Delay Tolerant Network (DTN) Routing Protocol Based on Scheduling Mechanism for Internet of Things (IoT)” Sensors (Basel). 19(2): 243. 2019 Jan;
[4]. Vandana Kushwaha, Ratneshwer Gupta, “Delay Tolerant Networks Architecture, Routing, Congestion, and Security Issues” Research gate April 06 2019.
[5]. Qaisar Ayub, Asri Ngadi, Sulma Rashid, et al.“Priority Queue Based Reactive Buffer Management Policy for Delay Tolerant Network under City Based Environments” Research Article. February 13, 2018.
[6]. Tuan Le, Mario Gerla, “Contact Duration-Aware Routing in Delay Tolerant Networks” 2017 IEEE.
[7]. Xiangyu Meng, Gaochao Xu, Tingting Guo, et al.” A Novel Routing Method for Social Delay-Tolerant Networks” Volume 24, Number 1, February 2019.
[8]. Kyung Min Baek , Dong Yeong Seo,et. al.” An Improved Opportunistic Routing Protocol Based on Context Information of Mobile Nodes” August 08 2018; Published: August 10 2018.
[9]. El Arbi ABDELLAOUI ALAOUI et al. “DTN Routing Hierarchical Topology for the Internet of Things” Elsevier Computer Science pp. 490–497 (2020).
[10]. R. Amirthavalli, S. Thanga Ramya [10] “Machine Learning in Delay Tolerant Networks: Algorithms, Strategies, and Applications” (IJITEE) Volume-9 Issue-1S, November 2019.
[11]. Kevin Fall. “A Delay-Tolerant Network Architecture for Challenged Internets,” February 2003.
[12]. David (Bong Jun) Choi BBCR Lab., “A Tutorial y Challenges and Applications of Delay Tolerant Networks,” ECE, University of Waterloo,
[13]. Evan P. C. Jones, Lily Li, Jakub K. Schmidtke, Paul A. S. Ward, “Practical Routing in Delay-Tolerant Networks,” in IEEE Trans. Mob. Comput. , 2007.
[14]. J. Shen, S. Moh, and I. Chung, “Routing Protocols in Delay Tolerant. Networks: A Comparative Survey”, 23rd International Conference on Circuits/system, Computer and Communication (ITC-CSCC 2008), Aug 2007.
[15]. L. Pelusi, A.Passarella, and M.Conti, “Opportunistic Networking: Data Forwarding in Disconnected Mobile Ad Hoc Networks,” IEEE Commun. Mag., 2006.
[16]. Haris, Abdullah, “A DTN study analysis of implementations and tools,” Master`s Thesis, TKK / Informaatio- ja luonnontieteiden tiedekunta, 2010.
[17]. Evan P.C. Jones and Paul A.S. Ward, “Routing Strategies for Delay-Tolerant Networks”, 2006.
[18]. Haojin Zhu,” Security in Delay Tolerant Networks,” Doctor of Philosophy Thesis, Electrical and Computer Engineering Waterloo, Ontario, Canada, 2009.
[19]. Network Simulator Official Site for Package Distribution, web reference, http://www.isi.edu/nsnam/ns
Published
2023-09-07
How to Cite
Tiwari, P. (2023). Secure Group Communication in Delay Tolerant Mobile Ad-Hoc Network. International Journal of Advanced Computer Technology, 12(5), 1-10. Retrieved from http://www.ijact.org/index.php/ijact/article/view/135