Deakin University
Browse

File(s) under permanent embargo

Defense against packet dropping attacks in opportunistic networks

conference contribution
posted on 2023-10-26, 03:23 authored by Asma'a Ahmad, Majeed AlajeelyMajeed Alajeely, Robin Ram Mohan DossRobin Ram Mohan Doss
Opportunistic networks (OppNets) are an interesting topic that are seen to have a promising future. Many protocols have been developed to accommodate the features of OppNets such as frequent partitions, long delays, and no end-to-end path between the source and destination nodes. Embedding security into these protocols is challenging and has taken a lot of attention in research. One of the attacks that OppNets are exposed to is the packet dropping attack, where the malicious node attempts to drop some packets and forwards an incomplete number of packets which results in the distortion of the message. To increase the security levels in OppNets, this paper presents an algorithm developed to detect packet dropping attacks, and finds the malicious node that attempted the attack. The algorithm detects the attack by using an indicative field in the header section of each packet; the indicative field has 3 sub fields - the identification field, the flag field, and the offset field. These 3 fields are used to find if a node receives the complete original number of packets from the previous node. The algorithm will have the advantage of detecting packets dropped by each intermediate node, this helps solve the difficulties of finding malicious nodes by the destination node only.

History

Pagination

1608 - 1613

Location

Delhi, India

Start date

2014-09-24

End date

2014-09-27

ISBN-13

9780000000000.0

Language

eng

Publication classification

E Conference publication; E1 Full written paper - refereed

Copyright notice

2014, IEEE

Editor/Contributor(s)

[Unknown]

Title of proceedings

ACCI 2014 : Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics