Advanced Search
Volume 38 Issue 2
Feb.  2016
Turn off MathJax
Article Contents
Data Forwarding Mechanism with Blackhole Attack Detection in Intermittently Connected Wireless Networks[J]. Journal of Electronics & Information Technology, 2016, 38(2): 310-317. doi: 10.11999/JEIT150459
Citation: Data Forwarding Mechanism with Blackhole Attack Detection in Intermittently Connected Wireless Networks[J]. Journal of Electronics & Information Technology, 2016, 38(2): 310-317. doi: 10.11999/JEIT150459

Data Forwarding Mechanism with Blackhole Attack Detection in Intermittently Connected Wireless Networks

doi: 10.11999/JEIT150459
Funds:

The National Natural Science Foundation of China (61371097), Chongqing Natural Science Foundation (CSTC2013JJB40001, CSTC2013JJB40006), Youth Talents Training Project of Chongqing Science Technology Commission (cstc2014kjrc-qnrc40001)

  • Received Date: 2015-04-22
  • Rev Recd Date: 2015-09-02
  • Publish Date: 2016-02-19
  • Intermittently connected wireless networks transmit data through opportunities caused by nodes movements. But malicious nodes in the network can attack and delete data by falsifying information about their routings, in order to impact the performance of networks. A data forwarding mechanism with blackhole attacking detection in intermittently connected wireless networks is proposed in this paper. By evaluating 4 trust properties include value of honesty, credit, indirect trust, and data forwarding rate, characteristics of attackers are summarized directly behaviors. And using the theory of rough set to decrease the rate of mistakes caused by indeterminate information, so that to determine the reliability of nodes accurately, and choose relay nodes reasonably. Results show that, the proposed mechanism can effectively find out attackers while enhancing the reliability of data transmission, and it also can defense some other non-cooperative nodes in the networks. Thus, the utilization of network resource is improved.
  • loading
  • BOLDRINI C, LEE K, ONEN M, et al. Opportunistic networks[J]. Computer Communications, 2014, 48(14): 1-4.
    吴大鹏, 张普宁, 王汝言. 带有消息投递概率估计的机会网络自适应缓存管理策略[J]. 电子与信息学报, 2014, 36(2): 390-395.
    WU Dapeng, ZHANG Puning, and WANG Ruyan. Adaptive buffer management strategy with message delivery probability estimating method in opportunistic networks[J]. Journal of Electronics Information Technology, 2014, 36(2): 390-395.
    吴大鹏, 白娜, 王汝言. 带有节点状态估计的间断连接无线网络缓存管理策略[J]. 电子与信息学报, 2015, 37(2): 443-448.
    WU Dapeng, BAI Na, and WANG Ruyan. Cache management mechanism with node status evaluation for intermittently connected wireless networks[J]. Journal of Electronics Information Technology, 2015, 37(2): 443-448.
    DSOUZA R J and JOSE J. Routing approaches in delay tolerant networks: a survey[J]. International Journal of Computer Applications, 2010, 1(17): 8-14.
    CAO Z, DONG M, GAO Z, et al. A probabilistic misbehavior detection scheme towards efficient trust establishment in delay-tolerant networks[J]. IEEE Transactions on Parallel Distributed Systems, 2014, 25(1): 22-32.
    JAIN S. Black hole attack in delay tolerant networks: a survey[J]. International Journal of Computer Science and Engineering, 2014, 2(4): 172-175.
    DINI G and DUCA A L. Towards a reputation-based routing protocol to contrast blackholes in a delay tolerant network[J]. Ad Hoc Networks, 2012, 10(7): 1167-1178.
    LI N and DAS S K. A trust-based framework for data forwarding in opportunistic networks[J]. Ad hoc Networks, 2013, 11(4): 1497-1509.
    LI F, WU J, and SRINIVASAN A. Thwarting blackhole attacks in disruption-tolerant networks using encounter tickets[C]. IEEE International Conference on Computer Communications 2009, Rio de Janeiro, Brazil, 2009: 2428-2436.
    REN Y, CHUAH M C, YANG J, et al. Detecting blackhole attacks in disruption-tolerant networks through packet exchange recording[C]. 2010 IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM), Montreal, QC, Canada, 2010: 1-6.
    GUO Y, SCHILDT S, and WOLF L. Detecting blackhole and greyhole attacks in vehicular delay tolerant networks[C]. Fifth International Conference on Communication Systems and Networks (COMSNETS), Bangalore, India, 2013: 1-7.
    SAINI K K, SAINI A, and MEHAK. Nature based trust security protocol against greyhole attacks in opportunistic networks[J]. International Journal of Engineering Research Management Technology, 2014, 1(3): 21-28.
    JULIER S J, UHLMANN J K, and DURRANT-WHYTE H F. A new approach for filtering nonlinear systems[C]. Proceedings of the 1995 American Control Conference, Seattle, WA, USA, 1995, 3: 1628-1632.
    BAADACHE A and BELMEHDI A. Struggling against simple and cooperative black hole attacks in multi-hop wireless Ad hoc networks[J]. Computer Networks, 2014, 73(1): 173-184.
    LI F and WU J. Mobility reduces uncertainty in MANETs[C]. 26th IEEE International Conference on Computer Communications, Anchorage, AK, USA, 2007: 1946-1954.
    PAWLAK Z and SOWINSKI R. Rough set approach to multi- attribute decision analysis[J]. European Journal of Operational Research, 1994, 72(3): 443-459.
    LINDGREN A, DORIA A, and SCHEL?N O. PROPHET: probabilistic routing in intermittently connected networks[J]. Moble Computing and Communications Review, 2003, 7(3): 1246-1250.
    RAMANA K S, CHARI A A, and KASIVISWANTH N. A survey on trust management for mobile Ad hoc networks[J]. International Journal of Network Security and Its Applications, 2010, 13(4): 562-583.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1451) PDF downloads(306) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return