Novel Technique for Virtual ID Generation to Isolate Selective Forward Attack in Opportunistic Network
Abstract
Mobile opportunistic network is a delay tolerant network. They are specially characterized by their intermittent connectivity. End to end connectivity is not available. They use store-carry-forward technique for transmission of data. Opportunistic network has various privacy and security challenges. The aim of the implementing privacy in the opportunistic network is to attract more users to use this network. As the main concern in this network is privacy and, there is not a fixed infrastructure present and the message is forwarded through many intermediate nodes, so, there may be a selfish node which is not interested to forward the message to a particular destination, or the user does not want to show its identity when it wants to communicate or send message to a particular destination, then it is a risk or threat to the privacy of user or the packet is dropped by the selfish node. In this paper we have discussed various attacks which can be triggered in opportunistic networks. Selective Forwarding attack is the main focus of this research. Due to this attack network performance degrades. A novel technique has been proposed based on the basis of virtual ID’s. Network performance is also evaluated on the basis of packet loss, throughput, energy loss, and delay.
Keywords
Full Text:
PDFReferences
Costantino G, Martinelli F, Santi P. Privacy-preserving interest-casting in opportunistic networks. 2012 IEEE Wireless Communications and Networking Conference, Shanghai. 2012. pp. 2829-2834.
Parris I, Henderson T. The impact of location privacy on opportunistic networks. International Symposium on World of Wireless, Mobile and Multimedia Networks, Lucca. 2011. pp. 1-6.
Dora L, Holczer T. Hide-and-lie: enhancing application-level privacy in opportunistic networks. International Workshop on Mobile Opportunistic Networking, 2010. pp. 135-142. DOI: 10.1145/1755743.1755767.
Parris I, Bigwood G, Henderson T. Privacy-enhanced social network routing in opportunistic networks. International Conference on Pervasive Computing and Communications Workshops, Mannheim. 2010. pp. 624-629.
Boldrini C, Conti M, Passarella A. impact of social mobility on routing protocols for opportunistic networks. International Symposium on a World of Wireless, Mobile and Multimedia Networks, Espoo, Finland. 2007. pp. 1-6.
Poonguzharselvi B, Vetriselvi V. Trust framework for data forwarding in opportunistic networks using mobile traces. International Journal of Wireless and Mobile Networks 2012; 4: 115-26.
Shikfa A, Onen M, Molva R. Local key management in opportunistic networks. International Journal of Communication Networks and Distributed Systems 2012; 9(1/2): 97-116.
Shikfa A, Onen M, Molva R. Privacy in context-based and epidemic forwarding. International Symposium on World of Wireless, Mobile and Multimedia Networks and Workshops, Greece. 2009. pp. 1-6.
Shikfa A, Onen M, Molva R. Privacy in content-based opportunistic networks. International Conference on Advanced Information Networking and Applications Workshops, UK. 2009. pp. 832-837. DOI: 10.1109/WAINA.2009.73.
Gunasekaran M, Premalatha K. SPAWN: a secure privacy-preserving architecture in wireless mobile ad hoc networks. EURASIP Journal on Wireless Communications and Networking 2013: 220.
Ren J, Li Y, Li T. Providing source privacy in mobile ad hoc networks. International Conference on Mobile Ad hoc and Sensor Systems, Macau. 2009. pp. 332-341.
Zhu B, Wan Z, Kankanhalli M, et al. Anonymous secure routing in mobile ad-hoc networks. International Conference on Local Computer Networks, USA. pp. 102-108. DOI: 10.1109/LCN.2004.21.
Defrawy K, Tsudik G. Privacy-preserving location-based on-demand routing in MANETs. Journal on Selected Areas in Communications 2011; 29(10): 1926-34.
Li X, Li H, Ma J, et al. An efficient anonymous routing protocol for mobile ad hoc networks. International Conference on Information Assurance and Security, China. DOI: 10.1109/IAS.2009.267.
Bakar A, Ismail R, Ahmad A, et al. Ensuring data privacy and security in MANET: case in emergency rescue mission. International Conference on Information and Knowledge Management, Singapore. 2012.
Ghinita G, Azarmi M, Bertino E. Privacy-aware location-aided routing in mobile ad hoc networks. International Conference on Mobile Data Management, Kansas City, USA. 2010. pp. 65-74.
Wu B, Wu J, Fernandez E, et al. Secure and efficient key management in mobile ad hoc networks. International Parallel and Distributed Processing Symposium, 2015. DOI: 10.1109/IPDPS.2005.393.
Narula P, Dhurandher S, Misra S, et al. Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing. Computer Communications 2008; 31(4): 760-9.
Arboit G, Crepeau C, Davis C, et al. A localized certificate revocation scheme for mobile ad hoc networks. Ad Hoc Networks 2008; 6(1): 17-31.
Trifunovic S, Legendre F, Anastasiades C. Social trust in opportunistic networks. Conference on Computer Communications Workshops, San Diego, USA. 2010. pp. 1-6.
Vahdat A, Becker D. Epidemic routing for partially-connected ad hoc networks. Department of Computer Science, Duke University, 2000. Available from: https://kelehers.me/others/epidemicRouting.pdf.
Lilien L, Kamal ZH, Bhuse V, et al. Opportunistic networks: the concept and research challenges in privacy and security. Department of Computer Science, Western Michigan University, Kalamazoo, USA. Available from: https://pdfs.semant icscholar.org/f040/f7688a05d118d72f8fe8769795 51560b2df8.pdf.
Pelusi L, Passarella A, Conti M. Opportunistic networking: data forwarding in disconnected mobile ad hoc networks. Communications Magazine 2006; 44(11): 134-41.
Gupta S, Woungang I, Dhurandher SK, et al. Trust-based security protocol against black hole attacks in
opportunistic networks. International Conference on Wireless and Mobile Computing, Networking and Communications, Lyon. 2013. pp. 724-729.
Singh J, Dhiman N. A review paper on introduction to mobile ad hoc networks. International Journal of Latest Trends in Engineering and Technology 2013; 2(4): 143-9.
Crowcroft J, Yoneki E, Hui P. Promoting tolerance for delay tolerant network research. ACM SIGCOMM Computer Communication Review 2008; 38(5): 63-8.
Refbacks
- There are currently no refbacks.