An Implication of Finding Routing Attack Malicious Node Detection in Delay Tolerance Network

Authors

  • Dr. Kuldeep Kumar  Assistant Professor, Department of CSE, CDLU, Sirsa, Haryana, India
  • Neha Arora  M.Tech. Scholar, Department of CSE, CDLU, Sirsa, Haryana, India

Keywords:

Delay Tolerant Networks, Network Traffic

Abstract

Delay tolerant networks (DTNs), such as sensor networks with scheduled intermittent connectivity, vehicular DTNs that disseminate location-dependent information, and pocket-switched networks that allow humans to communicate without network infrastructure, are highly partitioned networks that may suffer from frequent disconnectivity. In DTNs, the in-transit messages, also named bundles, can be sent over an existing link and buffered at the next hop until the next link in the path appears. This message propagation process is usually referred to as the “store-carry-and-forward” strategy, and the routing is decided in an “opportunistic” fashion. We aim to evaluate the added effect of the presence of malicious nodes on ad hoc network performance, and determine appropriate measures to detect malicious nodes. A malicious node advertising itself as having a valid route to the destination. With this intension the attacker consumes or intercepts the packet without any forwarding. An attacker can completely modify the packet and generate fake information, this cause the network traffic diverted or dropped. Let H be a malicious node. When H receives a Route Request, it sends back a Route Reply immediately, which constructs the data and can be transmitted by itself with the shortest path. So S receives Route Reply and it is replaced by H->S. then H receives all the data from S. In this research we propose a new assessment based scheme for detection of Malicious Nodes in DTN. And examine different strategies for prevention to malicious nodes as well as Compare outcome proposed scheme with the earliest established schemes.

References

  1. https://www.techopedia.com/definition/26186/wireless-network.
  2. http://searchnetworking.techtarget.com/feature/Introduction-to-wireless-networks- from-The-book-of-wireless
  3. https://www.techopedia.com/definition/26186/wireless-network
  4. http://computernetworkingnotes.com/wireless-networking-on-cisco-router/types- of-wireless-networks.html
  5.  http://searchnetworking.techtarget.com/definition/disruption-tolerant-network
  6. https://en.wikipedia.org/wiki/History_of_delay-tolerant_networking
  7. http://cse.unl.edu/~wsun/DTNapp.pdf
  8. https://www.techopedia.com/definition/25927/routing-protocol
  9. http://www.ijcaonline.org/journal/number17/pxc387557.pdf
  10. http://www.ijcaonline.org/volume20/number4/pxc3873251.pdf

Downloads

Published

2023-10-30

Issue

Section

Research Articles

How to Cite

[1]
Dr. Kuldeep Kumar, Neha Arora, " An Implication of Finding Routing Attack Malicious Node Detection in Delay Tolerance Network" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 9, Issue 5, pp.83-86, September-October-2023.