The Community for Technology Leaders
2015 IEEE International Conference on Data Science and Data Intensive Systems (DSDIS) (2015)
Sydney, Australia
Dec. 11, 2015 to Dec. 13, 2015
ISBN: 978-1-5090-0214-6
pp: 147-152
ABSTRACT
Security is a major challenge in Opportunistic Networks because of its characteristics, such as open medium, dynamic topology, no centralized management and absent clear lines of defense. A packet dropping attack is one of the major security threats in OppNets since neither source nodes nor destination nodes have the knowledge of where or when the packet will be dropped. In this paper, we present a malicious nodes detection mechanism against a special type of packet dropping attack where the malicious node drops one or more packets and then injects new fake packets instead. Our novel detection and traceback mechanism is very powerful and has very high accuracy. Each node can detect and then traceback the malicious nodes based on a solid and powerful idea that is, Merkle tree hashing technique. In our defense techniques we have two stages. The first stage is to detect the attack, and the second stage is to find the malicious nodes. We have compared our approach with the acknowledgement based mechanisms and the networks coding based mechanism which are well known approaches in the literature. Simulation results show this robust mechanism achieves a very high accuracy and detection rate.
INDEX TERMS
Security, Routing, Network coding, Information technology, Australia, Electronic mail, Wireless communication
CITATION

M. Alajeely, A. Ahmad and R. Doss, "Malicious Node Traceback in Opportunistic Networks Using Merkle Trees," 2015 IEEE International Conference on Data Science and Data Intensive Systems (DSDIS), Sydney, Australia, 2015, pp. 147-152.
doi:10.1109/DSDIS.2015.86
93 ms
(Ver 3.3 (11022016))