Abstract
Opportunistic Mobile Social Networks (OMSN) are prone to data integrity attacks that jeopardize the integrity of the routing data inside the network. Among the several techniques that cope with these attacks in OMSN, tree-based approaches have proven to be the most effective due to its ease of data verification and ensurance in data integrity. This paper evaluates two tree-based data structures, Merkle tree and Verkle tree in terms of their effectiveness in detecting and preventing such attacks. The evaluation considers tree-generation time and proof-checking time, and the results demonstrate that the Verkle tree is a bandwidth-efficient solution and have lower proof-checking time, with a reduction of 98.33% than Merkle tree. This makes Verkle tree a good choice for handling data integrity attacks in OMSN. A Verkle tree-based approach, named VADIA, is proposed to handle data integrity attacks such as packet dropping, packet modification and pollution attack in OMSN. The proposed approach is implemented in the Opportunistic Network Environment (ONE) simulator and is shown to be effective in detecting malicious nodes and paths, reducing false negative rates, and improving accuracy in detecting malicious activities. The results demonstrate a 47%, 84% and 69% improvement in malicious node, malicious path and malicious activity detection over a period of time. Furthermore, the approach achieves an 80% reduction in false negative rates.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.