MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks
Open Access
- 1 April 2010
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
The Disruption Tolerant Networks (DTNs) are vulnerable to insider attacks, in which the legitimate nodes are compromised and the adversary modifies the delivery metrics of the node to launch harmful attacks in the networks. The traditional detection approaches of secure routing protocols can not address such kind of insider attacks in DTNs. In this paper, we propose a mutual correlation detection scheme (MUTON) for addressing these insider attacks. MUTON takes into consideration of the transitive property when calculating the packet delivery probability of each node and correlates the information collected from other nodes. We evaluated our approach through extensive simulations using both Random Way Point and Zebranet mobility models. Our results show that MUTON can detect insider attacks efficiently with high detection rate and low false positive rate.Keywords
This publication has 5 references indexed in Scilit:
- MaxProp: Routing for Vehicle-Based Disruption-Tolerant NetworksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- Erasure-coding based routing for opportunistic networksPublished by Association for Computing Machinery (ACM) ,2005
- A cooperative intrusion detection system for ad hoc networksPublished by Association for Computing Machinery (ACM) ,2003
- Probabilistic routing in intermittently connected networksACM SIGMOBILE Mobile Computing and Communications Review, 2003
- Mitigating routing misbehavior in mobile ad hoc networksPublished by Association for Computing Machinery (ACM) ,2000