A Novel IDS Security Scheme for Multicast Communication in DTN

  • Shivali Pandey I.E.S. Collage of Technology, Bhopal, India
  • Prof. Anshul Sarawagi I.E.S. Collage of Technology, Bhopal, India
Keywords: Malicious Attacker, routing, Security, DTN, IDS, Nodes

Abstract

This DTN routing should naturally support unicast and multicast routing strategies. A network node can register itself to any receiver group by setting the corresponding destination. In this research we proposed a new security algorithm with multi cast routing against malicious packet dropping attack in DTN. The proposed security method of finding attacker is based on the link detection method for data forwarding in between sender to receiver. The packet dropping on link through node is detected and prevented by IDS security system. This method not only identified the black hole and grey hole but also prevent from routing misbehavior of malicious nodes. The attacker is identified by data dropping of packets in excessive quantity and their prevention is possible by selecting the next possible route where attacker does not exist in connected link between senders to receivers. The intermediate nodes are identified the attacker through confirm positive reply of malicious node or nodes in dynamic network. The proposed secure IDS (Intrusion Detection and prevention) is securing the DTN and improves the network performance after blocking black hole and grey hole in network. The network performance in presence of attack and secure IDS is measures through performance metrics like throughput, routing packets flooding and proposed secures routing is improves data receiving and minimizes dropping data network.

Downloads

Download data is not yet available.

References

[1] A. Lindgren, A. Doria, and O. Schelen, “Probabilistic routing in intermittently connected networks,” SIGMOBILE Mobile Computing and Communications Review, vol. 7, 2003.
[2] Wenrui Zhao, Mostafa Arnrnar and Ellen Zegura, "Multicasting in Delay Tolerant Networks: Semantic Models and Routing Algorithms," in Proceeding of SIGCOMM'05 Workshops, Aug 2005.
[3] K. Fall, “A Delay-Tolerant Network Architecture for Challenged Internets,” Proceeding of Annual Conference ofthe Special Interest Group on Data Communication (ACM SIGCOMM’03), pp. 27-34, Aug. 2003.
[4] Haojin Zhu, Suguo Du, Zhaoyu Gao, Mianxiong Dong, Zhenfu Cao, “A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in delay-Tolerant Networks,” IEEE transactions on Parallel and Distributed systems, vol. 25, No. 1, pp.22-32, January 2014.
[5] E. P. C. Jones and P. A. S. Ward, “Routing Strategies for Delay-Tolerant Networks,” Submitted to Computer Communication Review (under review), 2008.
[6] A. Balasubramanian, Brian N. Levine and A. Venkatramani, "DTN Routing a Resource Allocation Problem," in Proceeding of ACM, 2007,pp .373-384,2007.
[7] Rongxing Lu, Xiaoding Lin, Haojin Zhu, Xuemin Shen, Bruno Preiss, “Pi: A Practical Incentive Protocol for Delay Tolerant networks,” IEEE Transaction on wireless communications, vol. 9, No. 4, pp. 1483-1493, April 2010. [8] F. Templin, Ed, S. Burleigh, "DTN Security Key Management - Requirements and Design", April 2016. draft-templin-dtn-dtnskmreq-00.txt.
[9] D Sarawagya Singh, Elayaraja.K, "Survey Of Misbehaviors Of Node And Routing Attack In Delay Tolerant Network", International Journal of Science, Engineering and Technology Research (TJSETR), Volume 4, Issue 2, February 2015.
[10] Ardra. P. S, A. Viswanathan, " A Survey On Detection And Mitigation Of Misbehavior In Disruption Tolerant Networks", IRACST - International Journal of Computer Networks and Wireless Communications (TJCNWC), Vo1.2, No6, December 2012.
[11] Afroze Ansari, Dr.Mohammed Abdul Waheed, "Novel technique for Black-hole Gray-Hole Detection under DTN, A Protocol Design Study", International Conference on Intelligent Computing and Control Systems ICICCS 2017.
[12] Shou-Chih Lo, Nai-Wun Luo, Jhih-Siao Gao, Chih-Cheng Tseng "Quota-Based Multicast Routing in Delay-Tolerant Networks" Wireless Personal Communication, 2014.
[13] William D. Ivancic, "Security Analysis of DTN Architecture and Bundle Protocol Specification for Space-Based Networks" IEEE, 2010.
[14] Lie Li, Hefei, Qiyue Li, "A price-based interactive data queue management approach for delay-tolerant mobile sensor networks" Wireless Communications and Networking Conference Workshops (WCNCW), IEEE, 2013.
Published
2019-06-06
How to Cite
Pandey, S., & Sarawagi, P. A. (2019). A Novel IDS Security Scheme for Multicast Communication in DTN. International Journal of Advanced Computer Technology, 8(3), 01-05. Retrieved from http://ijact.org/index.php/ijact/article/view/15
Section
Articles