Abstract

Delay tolerant networks are widely used in mobile communications because of network withstanding capability of delay. However, when the connectivity of nodes increases, data loss may occur while transmission. Due to the malicious behavior of nodes the data may get permanently lost, which is known as black hole attacks and there is a chance to partial data loss because of the lower energy level of a node, which is known as a gray hole attack. In existing work, the data capacity of a node is not limited, so most of the highly energy efficient node contains a huge amount of data, when compared to other nodes which may lead to random attack. To overcome this, we propose a subjective capability model (SCM) for each and every node to limit the capacity of each node. ASF-DTN prevents collision attack and injection attack by implementing Kalman filtering, which can statistically analyze the behavior of nodes while each and every transmission. Here, we propose an effective node optimization scheme using genetic algorithm with a fitness function to find out energy efficient nodes among the optimal path for effective communication and its performance.

Highlights

  • A Delay tolerant network is a collection of nodes, but most of all the characteristics of each node are different due to the energy level, distance and circumstances [1]

  • Due to the malicious behavior of nodes the data may get permanently lost, which is known as black hole attacks and there is a chance to partial data loss because of the lower energy level of a node, which is known as a gray hole attack

  • ASF-DTN prevents collision attack and injection attack by implementing Kalman filtering, which can statistically analyze the behavior of nodes while each and every transmission

Read more

Summary

Introduction

A Delay tolerant network is a collection of nodes, but most of all the characteristics of each node are different due to the energy level, distance and circumstances [1]. The DTN networks are widely used due to its outstanding performance. Delay tolerant networks are vulnerable to malicious attacks such as collision attack or data injecting attack, black hole attack and gray hole attack [2]. Due to the malicious behaviors of node, the network architecture may misbehave [3]. There arises a lack of communication between the nodes in DTN architecture due the following reasons [4]. 1) Attacks or malicious behavior of nodes 2) Non Optimized Data path Here we describe the brief explanation about both two scenarios

Attacks or malicious behaviors of node
Non optimized data path
Related work
Proposed work
ASF-KF against data injection
ASF-KF against black whole and gray whole attack
Secured node authentication mechanism
Architecture of ASF-DTN
ASF-DTN against various attacks
Node initialization-optimization
Performance analysis of ASF-DTN
Findings
Conclusion and scope for future work
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.