Design, implementation and analysis of routing based attack model for delay tolerant networks for prophet routing protocol Online publication date: Wed, 06-Nov-2019
by Swati Bansal; Jagtar Singh Sivia; Harminder Singh Bindra
International Journal of Sensor Networks (IJSNET), Vol. 31, No. 4, 2019
Abstract: Delay tolerant network (DTN) is an evolution of mobile adhoc network (MANET). In computing, network security is the main issue as the attacks by malicious and selfish nodes are increasing on the network day by day. This paper defines an attack model in which malicious nodes (in DTN with Prophet Routing Protocol) receive the data from genuine nodes. It is done by falsifying their routing information (Delivery Predictability). Later malicious nodes spoof their identity and receive messages as destination nodes. The Legitimate messages are deleted by malicious nodes and also from the source node buffer as the source node treats the message being delivered to the final destination. Delivery Probability, Overhead Ratio, Average Latency and Average Buffer time metrics are evaluated using ONE simulator. In simulated network, 126 nodes are considered and by making only 3% nodes malicious, performance of the network is decreased by approximately 40-50%.
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Sensor Networks (IJSNET):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email subs@inderscience.com