Routing Algorithm Based on Nash Equilibrium against Malicious Attacks for DTN Congestion Control

نویسندگان

  • Chengjun Wang
  • Baokang Zhao
  • Wanrong Yu
  • Chunqing Wu
  • Zhenghu Gong
چکیده

In Delay-Tolerant Network(DTN), certain malicious node might generate congestion in attack to reduce the overall performance of the whole network, especially the target of message successful delivery ratio. In this paper, a novel Nash equilibrium based congestion control routing algorithm with the function of security defense (NESD) is proposed. In the process of message delivery, node can use Nash equilibrium to compute the largest proportion of transfer messages occupancy to node memory capacity. This mechanism constrains the attack from malicious node and guarantees the message transfer of regular node. This congestion control routing algorithm for security defense is evaluated by experiment. It is important application in the field of homeland defense. The results show that related key parameters are significantly improved in DTN scenario.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Intrusion Detection in Wireless Sensor Networks using Genetic Algorithm

Wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. Routing attacks on the networks, where a malicious node from sending data to the base station is perceived. In this article, a method that can be used to transfer the data securely to prevent attacks...

متن کامل

Trust Integrated Congestion Aware Energy Efficient Routing forWireless Multimedia Sensor Networks (TCEER)

Congestion control and energy consumption in Wireless Multimedia Sensor Network is a new research subject which has been ushered in through the introduction of multimedia sensor nodes that are capable of transmitting large volume of high bit rate heterogeneous multimedia data. Most of the existing congestion control algorithms for Wireless Sensor Networks do not discuss the impact of security a...

متن کامل

A Secure Routing Algorithm for Underwater Wireless Sensor Networks

Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...

متن کامل

Thwarting Blackhole Attacks in Distruption-Tolerant Networks using Encounter Tickets

Nodes in disruption-tolerant networks (DTNs) usually exhibit repetitive motions. Several recently proposed DTN routing algorithms have utilized the DTNs’ cyclic properties for predicting future forwarding. The prediction is based on metrics abstracted from nodes’ contact history. However, the robustness of the encounter prediction becomes vital for DTN routing since malicious nodes can provide ...

متن کامل

Malicious Bayesian Congestion Games

In this paper, we introduce malicious Bayesian congestion games as an extension to congestion games where players might act in a malicious way. In such a game each player has two types. Either the player is a rational player seeking to minimize her own delay, or with a certain probability the player is malicious in which case her only goal is to disturb the other players as much as possible. We...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012