Security-aware ad hoc routing for wireless networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
An on-demand secure routing protocol resilient to byzantine failures
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
A delay-tolerant network architecture for challenged internets
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
Rushing attacks and defense in wireless ad hoc network routing protocols
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Pocket switched networks and human mobility in conference environments
Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking
Spray and wait: an efficient routing scheme for intermittently connected mobile networks
Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking
DTN routing as a resource allocation problem
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
Surviving attacks on disruption-tolerant networks without authentication
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
Struggling against selfishness and black hole attacks in MANETs
Wireless Communications & Mobile Computing
Practical security for disconnected nodes
NPSEC'05 Proceedings of the First international conference on Secure network protocols
Routing security in wireless ad hoc networks
IEEE Communications Magazine
Resilience and security of opportunistic communications for emergency evacuation
Proceedings of the 7th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks
CRISP: collusion-resistant incentive-compatible routing and forwarding in opportunistic networks
Proceedings of the 15th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems
Secure Multi-copy Routing in Compromised Delay Tolerant Networks
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
In this work, we study robustness of DTN routing in the absence of authentication. We identify conditions for an attack to be effective and present an attack based on a combination of targeted flooding and acknowledgement counterfeiting that is highly effective even with only a small number of attackers. Simulation results show that delivery ratio decrease by 30% to 50% using only 2 attackers for the two mobility patterns studied (Haggle and DieselNet). We observe that minimum hop count for packet delivery has a strong influence on the robustness of the DTN routing protocols. Generally, attacks become increasingly effective when the minimum hop count required increases. Further, use of global routing metadata in the routing protocol also increases attack effectiveness. Our study provides insights to the robustness of routing attacks in different DTNs settings and can be useful to DTN designers who want to choose the appropriate level of security that is needed for their respective scenarios.