An energy efficient flexible delay tolerant network with adaptive secured framework (ASF-DTN)

  • Authors

    • Dhanabal S Karpagam academy higher education
    • Dr Amudhavalli P Karpagam academy higher education
    • Dr Prasanna Venkatesan G. K. D
    • Dr Prasanna Venkatesan G. K. D
    2018-07-04
    https://doi.org/10.14419/ijet.v7i3.12485
  • ASF-DTN, Black-Hole, Collusion Attack, Gray Hole Attack, Kalman Filtering, Node Optimization, Subjective Capability, Wireless Sensor Networks
  • Delay tolerant networks are widely used in mobile communications because of network withstanding capability of delay. However, when the connectivity of nodes increases, data loss may occur while transmission. Due to the malicious behavior of nodes the data may get permanently lost, which is known as black hole attacks and there is a chance to partial data loss because of the lower energy level of a node, which is known as a gray hole attack. In existing work, the data capacity of a node is not limited, so most of the highly energy efficient node contains a huge amount of data, when compared to other nodes which may lead to random attack. To overcome this, we propose a subjective capability model (SCM) for each and every node to limit the capacity of each node. ASF-DTN prevents collision attack and injection attack by implementing Kalman filtering, which can statistically analyze the behavior of nodes while each and every transmission. Here, we propose an effective node optimization scheme using genetic algorithm with a fitness function to find out energy efficient nodes among the optimal path for effective communication and its performance.

     

     

  • References

    1. [1] Sarawagya Singh, Elayaraja.K,†a survey of misbehaviors of node and routing attack in delay tolerant network†International Journal of Science, Engineering and Technology Research (IJSETR), Volume 4, Issue 2, February 2015.

      [2] PreetiNagrath, SandhyaAneja, G.N.PurohiInformation Networking (ICOIN), 2015 International Conference on†Defending Flooding Attack in Delay Tolerant Networksâ€published in IEEE.

      [3] Alberto Lopez Toledo, Josep M. Pujol, Pablo Rodriguez,†Fair Routing in Delay Tolerant Networks†published in infocom 2009, ieee.

      [4] Atul Sharma,, Dr. Dinesh Singh ,Poonam Sharma, Dr. SanjeevDhawan, “Selfish Nodes Detection in Delay Tolerant Networks “2015 1st International Conference on Futuristic trend in Computational Analysis and Knowledge Management (ABLAZE-2015).

      [5] Aysha Al Hinai, Haibo Zhang and Yawen Chen,“Mitigating Blackhole Attacks in Delay Tolerant Networksâ€2012 13th International Conference on Parallel and Distributed Computing, Applications and Technologies,â€.

      [6] SriramBharaniS Ms. Savitha Saranya , Tissin “Detecting and Eliminating Grey Hole Attack in Delay Tolerant Networkâ€, Imperial Journal of Interdisciplinary Research (IJIR) Vol-2, Issue-12, 2016 ISSN: 2454-1362, http://www.onlinejournal.in.

      [7] ErmanAyday,Hanseung Lee, FaramarzFekri†Trust Management and Adversary Detection for Delay Tolerant Networksâ€.

      [8] Rupali Sharma†Gray-hole Attack in Mobile Ad-hoc Networks: A Survey†(IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 7 (3) 2016, 1457-1460.

      [9] X. Huang, J. Gao, S. V. Buldyrev, S. Havlin, and H. E. Stanley,“Robustness of interdependent networks under targeted attack,â€Phys. Rev. E, Stat. Phys. Plasmas Fluids Relat. Interdiscip. Top.,vol. 83, no. 6,p. 065101(R), 2011.

      [10] R. H. Li, J. X. Yu, X. Huang, H. Cheng, and Z. Shang, “Measuring robustness of complex networks under MVC attack,†in Proc. 21st ACM Int. Conf. Inf. Knowl. Manage. , New York, NY, USA, Oct. /Nov. 2012, pp. 1512–1516.

      [11] Marco Dorigo and Gianni Di Caro “Ant Algorithms for Discrete Optimizationâ€.

      [12] S. Sivakumar, Dr. C.Chandrasekar “Modified Dijkstra’s Shortest Path Algorithm†Vol. 2, Issue 11, November 2014.

      [13] N. Li and S. K. Das, “A trust-based framework for data forwarding in opportunistic networks,â€Elsevier J. Ad Hoc Netw., vol. 14, pp. 1497–1509, 2013 https://doi.org/10.1016/j.adhoc.2011.01.018.

      [14] F. Li, J. Wu, and A. Srinivasan,, Thwarting blackhole attacks in disrupt-tolerant networks using encounter tickets,†in Proc. INFOCOMM 2009, pp. 2428–2436.

      [15] Tie Qiu, Senior, AoyangZhao,Student,Xia,Weisheng Si,Dapeng Oliver Wu,†ROSE: Robustness Strategy for Scale-Free Wireless Sensor Networks“2017,IEEE Transactions on ACM/networking.

      [16] Z. Gao, H. Zhu, S. Du, C. Xiao, and R. Lu, “PMDS: A probabilisticmisbehavior detection scheme toward efficient trust establishment in Delay-tolerant networks,â€IEEE Trans. Parallel Distrib.Syst., vol. 25, no. 1, pp. 22–32, Jan. 2014 https://doi.org/10.1109/TPDS.2013.36.

      [17] Thi Ngoc Diep Pham and Chai Kiat Yeo “Detecting Colluding Blackhole and GreyholeAttacks in Delay Tolerant Networks,“IEEE Transactions on mobile computing,may-2016.

      [18] KarthikeyanBhargavan, GaetanLeurent “Transcript Collision Attacks:Breaking authentication in TLS, IKE, and SSH“NDSS ’16, 21-24 February 2016.

      [19] S.Bhargavi&Vishnu Prasad Goranthala, “The Impact of Collusion Attacks in WSN withSecure Data Aggregation System†International Journal of ResearchVolume 2, Issue 08, August-2015.

      [20] Kalaivanan M. and K. Vengatesan.: Recommendation system based on statistical analysis of ranking from user. International Conferenceon Information Communication and Embedded Systems (ICICES), pp.479-484, IEEE, (2013).

      [21] J.W. Ho, M. Wright, and S.K. Das, “Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testingâ€, IEEE Transaction on Mobile Computing, June 2011.

  • Downloads

  • How to Cite

    S, D., Amudhavalli P, D., Prasanna Venkatesan G. K. D, D., & Prasanna Venkatesan G. K. D, D. (2018). An energy efficient flexible delay tolerant network with adaptive secured framework (ASF-DTN). International Journal of Engineering & Technology, 7(3), 1299-1303. https://doi.org/10.14419/ijet.v7i3.12485