Abstract

Delay tolerant networks (DTNs), such as sensor networks with scheduled intermittent connectivity, vehicular DTNs that disseminate location-dependent information, and pocket-switched networks that allow humans to communicate without network infrastructure, are highly partitioned networks that may suffer from frequent disconnectivity. In DTNs, the in-transit messages, also named bundles, can be sent over an existing link and buffered at the next hop until the next link in the path appears. This message propagation process is usually referred to as the “store-carry-and-forward” strategy, and the routing is decided in an “opportunistic” fashion. We aim to evaluate the added effect of the presence of malicious nodes on ad hoc network performance, and determine appropriate measures to detect malicious nodes. A malicious node advertising itself as having a valid route to the destination. With this intension the attacker consumes or intercepts the packet without any forwarding. An attacker can completely modify the packet and generate fake information, this cause the network traffic diverted or dropped. Let H be a malicious node. When H receives a Route Request, it sends back a Route Reply immediately, which constructs the data and can be transmitted by itself with the shortest path. So S receives Route Reply and it is replaced by H->S. then H receives all the data from S. In this research we propose a new assesment based scheme for detection of Malicious Nodes in DTN. And examine different strategies for prevention to malicious nodes as well as Compare out come proposed scheme with the earliest established schemes.

Highlights

  • The routers are responsible for forwarding packets in the network and hosts may be sources or sinks of data flows

  • Wireless networks allow hosts to roam without the constraints of wired connections

  • Notebook computer connectivity, vehicle and ship networks, and rapidly deployed emergency networks are all applications of this kind of network

Read more

Summary

Introduction

The routers are responsible for forwarding packets in the network and hosts may be sources or sinks of data flows. Traditional routing protocols used for wired networks cannot be directly applied to most wireless networks because some common assumption are not valid in this kind of dynamic network. May not be true for nodes in a wireless mobile network The bandwidth in this kind of network is usually limited. This network model introduces great challenges for routing protocols

Objectives
Methods
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call