A Co-operative Mechanism to Contrast Black-hole Attacks in Delay Tolerant Networks
نویسنده
چکیده
DTNs are designed to work in post disaster scenario where partitions between nodes are large. To transfer messages in this situation DTN uses intermediate nodes to forward messages. The mechanism used here is store, carry and forward. But here, securely transferring messages from one node to other node is quite challenging task because an intermediate node may behaves maliciously. A malicious node may be a black hole, selfish node or sinkhole. This paper focuses on black hole attack. In this paper a cooperative mechanism is described in literature [6] that helps in prevention of network from black hole attack. A review of this proposition has led to an identification of modifications that can be incorporate to yield better results. These modifications are enlisted in the paper.
منابع مشابه
Securing AODV routing protocol against the black hole attack using Firefly algorithm
Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...
متن کاملA New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کاملA Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks
In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...
متن کاملRouting Protocols for Delay Tolerant Networks: Survey and Performance Evaluation
Delay Tolerant Networking (DTN) is a promising technology that aims to provide efficient communication between devices in a network with no guaranteed continuous connectivity. Most existing routing schemes for DTNs exploit the advantage of message replication to achieve high message delivery rate. However, these schemes commonly suffer from large communication overhead due to the lack of effici...
متن کاملPreventive Mechanism against Simple and Cooperative Black Hole Attacks in Multi-hop Wireless Ad Hoc Networks
This paper focuses on the issues related to the simple and cooperative black hole attacks in multihop wireless ad hoc networks. In multi-hop wireless ad hoc networks, nodes not in direct range rely on intermediate nodes to communicate. In order to preserve its limited resources or to launch a DoS attack, an intermediate node drops packets going through it instead to forward them to its successo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016