You are on page 1of 6

CHANTS Session 1 CHANTS’18, October 29, 2018, New Delhi, India.

An Approach for Black-hole Attack Mitigation


in Disruption-tolerant Ad-hoc Smartphone Networks
Manuel Weißbach Marius Feldmann
Technische Universität Dresden, Germany Technische Universität Dresden, Germany
manuel.weissbach@tu-dresden.de marius.feldmann@tu-dresden.de
ABSTRACT 1 INTRODUCTION
When cellular networks collapse (e.g. due to disaster scenar- The concept of Disruption-tolerant Networks allows network
ios), it is vital to quickly establish new communication chan- nodes to communicate with each other, even though no di-
nels. The worldwide spread of smartphones, which support rect end-to-end path exists between them. The core principle
multiple communication standards, offers a great potential hereby is that messages are passed via an overlay store-and-
to solve this problem with commodity hardware. On the soft- forward network from node to node until they reach the recip-
ware side, Disruption-tolerant Network technologies may ient. If some or all nodes change their physical location over
be leveraged to transmit messages between devices, even if time, the moving nodes get into radio range of further nodes.
there is no direct connection between them. However, DTNs During such contact phases, messages can be exchanged, then
are vulnerable to black-hole attacks. Therefore, mechanisms buffered by the nodes and later forwarded to other contacts
have to be available to address this problem in order to pro- until they finally reach the target node. This concept was
vide reliable networks. In this paper, we present a concept for already used in the past for several challenged networking
an ad-hoc smartphone-based DTN which is robust against solutions including mobile ad-hoc networks [3, 12, 13].
packet drop attacks as network nodes are able to identify Contacts between individual DTN nodes are often difficult
attackers and exclude them from the network. The overall to predict. To increase the likelihood of delivery, messages
concept has been practically evaluated using an implemen- in DTNs are often replicated so that multiple copies of the
tation for the Android platform. Our results show that the same message are in transit. However, since resources such as
approach is capable to mitigate black-hole attacks effectively bandwidth, message buffer size and contact duration are usu-
with high detection rate and short convergency time. ally limited, it is mostly necessary to find a trade-off between
the probability of delivery and resource consumption. Mes-
KEYWORDS sage delivery should consume a small amount of resources,
but still deliver the messages reliably. Several routing meth-
Disruption-tolerant Networking; black-hole attacks; ad-hoc
ods solve this problem in different ways. Some require nodes
networks; security
to exchange status information to better estimate contact
ACM Reference Format: probabilities. As a result, fewer duplicates of a message need
Manuel Weißbach and Marius Feldmann. 2018. An Approach for to be created to deliver it with a high probability. However,
Black-hole Attack Mitigation in Disruption-tolerant Ad-hoc Smart- the strength of these methods is also their weakness when
phone Networks. In 13th Workshop on Challenged Networks (CHANTS it comes to security. The fewer duplicates of a message exist,
’18), October 29, 2018, New Delhi, India. ACM, New York, NY, USA, the easier it is for attackers to disturb or prevent successful
6 pages. https://doi.org/10.1145/3264844.3264853 message delivery. Attackers who intentionally drop messages
instead of forwarding them are called black-hole attackers as
they behave like a black-hole in the network that swallows
Permission to make digital or hard copies of all or part of this work for all messages. When it comes to disaster scenarios or wars,
personal or classroom use is granted without fee provided that copies
there may be parties that benefit from broken communication
are not made or distributed for profit or commercial advantage and that
copies bear this notice and the full citation on the first page. Copyrights channels. Therefore it is very important to secure DTN-based
for components of this work owned by others than the author(s) must ad-hoc networks against black-hole attacks.
be honored. Abstracting with credit is permitted. To copy otherwise, or Depending on the existing network structure, there may be
republish, to post on servers or to redistribute to lists, requires prior specific cases in which it is not possible to stop an attacker from influ-
permission and/or a fee. Request permissions from permissions@acm.org.
encing the network. This is usually the case when the attacker
CHANTS ’18, October 29, 2018, New Delhi, India
node is the only one in the network that has (or just claims to
© 2018 Copyright held by the owner/author(s). Publication rights licensed
to ACM. have) a connection to the message recipient. In other topolo-
ACM ISBN 978-1-4503-5926-9/18/10. . . $15.00 gies, alternative routes can be used to bypass the attacker. The
https://doi.org/10.1145/3264844.3264853 prerequisite for this is that the other network nodes are able to

19
CHANTS Session 1 CHANTS’18, October 29, 2018, New Delhi, India.

• Propagating fake connections: The attacker claims


to have (good) connections to all or certain other nodes
to motivate his neighbors to forward messages via him.
Combinations of these attack patterns can be used to define
different types of attacker models, from a “simple” attacker
Figure 1: Example of a network topology who drops all messages without interacting with other nodes,
identify the attacker nodes. In this context, we have developed to a “sneaky” attacker who only drops specific messages and
a concept for DTN-based mobile ad-hoc networks in which sends faked status information to other nodes. A reliable ad-
black-hole attackers can be detected and finally excluded hoc network must be able to detect the attacker and exclude
from message delivery by the routing algorithm. It should him from the network, regardless of the attacker model used.
be mentioned again that our work focuses exclusively on ad-
hoc mobile networks. Our system architecture was explicitly 3 STATE OF THE ART
designed for such networks and not for general use in DTNs.
Several papers have addressed the mitigation of black-hole at-
The rest of the paper is organized as follows. Firstly, an
tacks [2, 4, 6, 9, 10, 14, 18], and some have even developed con-
exemplary use case and the considered attacker model are
cepts suitable for mobile ad-hoc networks [1, 5, 7, 8, 11, 15, 16].
described to clarify the system requirements. Section 3 sum-
The methods presented in [1, 8, 11, 15] follow the idea that
marizes related work. Section 4 introduces the overall system
all or certain nodes can monitor the network traffic of the
design as well as the strategy for black-hole attack mitigation.
neighboring nodes within their radio range to identify mali-
Section 5 presents our evaluation and Section 6 concludes the
cious behavior in different ways. All these approaches have in
paper with a summary and an outlook for future work.
common that they only provide good detection results when
the mobile ad-hoc network has a high node density, which can-
2 USE CASE AND ATTACKER MODEL
not be guaranteed in real-world scenarios. Furthermore, some
The following scenario is considered: After an earthquake, of them do not take into account that the nodes monitoring
all communication networks in the city of Agloe have failed. the network could themselves be attackers or behave selfishly.
As long as the cellular network does not work, the popula- In [16] “Combined Faith Values” have been introduced and
tion communicates via a DTN-based mobile ad-hoc network. later revised in [5] to form a collaborative evaluation system.
Fortunately, no one was hurt during the earthquake, but Bob Before a node transmits a message to another node, it asks its
would like to know if his girlfriend Alice, who lives on the neighbors for their faith values for the target node in order to
other side of the city, is okay. Marvin, who is also in love assess its trustworthiness. This approach works only for the
with Alice and very jealous of Bob, wants to prevent that. He spray and wait routing protocol and does not include a concept
decides to cut off the communication between Alice and Bob to prevent nodes from giving fake ratings for their neighbors.
in order to contact Alice himself and to help her in this emer- Another extension of the spray and wait protocol is pre-
gency situation. He will be her hero while her boyfriend Bob sented in [7]. For each message sent, a number of allowed
doesn’t even contact her. To achieve his evil goal, Marvin is go- duplicates is specified, then these duplicates are distributed
ing to attack the ad-hoc network. Figure 1 shows the network only to those nodes from which one has received the most mes-
topology, in which Alice is referred to as node A, Bob as node sages. Using this concept, attackers who only drop messages
B and Marvin as node M. Obviously, there are several paths via selectively cannot be detected. According to [5], this is more
which node A can send messages to node B, but the path via suitable for stabilizing the network than for detecting attacks.
node M is the shortest. Depending on the routing algorithm All the concepts examined are limited to certain routing
used, there are different attack options that node M can use to methods, require a very high node density, ignore selfish
prevent the exchange of messages between the nodes A and B. nodes or address a single specific problem without consider-
Assuming that the nodes exchange information about their ing the whole attacker model. As a result, there remain gaps
contacts and successful message delivery, the malicious node that attackers can exploit to undermine the security concept.
M could use the following attack patterns to reach its target: Therefore, none of the approaches has been designed for the
• Dropping all messages: The attacker drops all mes- discussed scenario.
sages that are sent to him for forwarding.
• Dropping messages selectively: The attacker inten- 4 CONCEPT
tionally drops only certain messages, for example such
that are addressed to a specific recipient. 4.1 System Architecture and Functionality
• Sending fake delivery receipts: The attacker sends In order to establish an ad-hoc smartphone-based DTN which
the information that he has delivered the message suc- is robust against packet drop attacks, a specific system archi-
cessfully to the source node of the dropped message. tecture and data processing approach has been specified. The

20
CHANTS Session 1 CHANTS’18, October 29, 2018, New Delhi, India.

underlying design can be used as a blueprint for mobile appli- 4.2 Topology plan and Contact prediction
cations that allow the detection of blackhole attacks. Figure 2 The topological information is built from so called connec-
shows the overall system architecture as well as the assumed tion proofs. Every node establishing a connection with any
message and information processing flow.1 The architecture other node generates essential information about this connec-
is built upon five coarse-grained components: tion and broadcasts this information into the network. These
(1) GUI : Provides means to the user for creating and send- connection proof messages contain essentially: the MAC ad-
ing messages. dresses of the connected nodes, current timestamps from both
(2) Connection management: Discovers further nodes and nodes, the duration of former identical connections and the
exchanges contact information for deriving an up-to- amount of exchanged messages and acknowledgments, infor-
date overall topology plan. mation inconsistencies (such as different amount of transmit-
(3) Message processing: Routes and temporarily stores mes- ted messages) detected for former connections. Besides this,
sages sent or forwarded by the node. Provides methods a specific value counting security incidents assumed during
to track transmitted messages within the network. former connections between both nodes is exchanged. If both
(4) Security management: Handles management of public connecting peers agree on the same values during connection
and private keys and verifies messages and connections. establishment, they both sign the data and broadcast it to the
(5) Statistics: Tracks statistics about contact probabilities network. The other network nodes only add the propagated
and calculates a reliability value for each known node. connection to their topology plan if they receive the double-
To explain the interactions within this architecture, message signed connection proof from both nodes and only keep it in
transmission and reception is discussed in the following. the plan as long as both connected nodes broadcast the corre-
For the purpose of message and control data transmission, sponding connection proof in regular intervals. This prevents
each node owns a public/private key pair. The public key is attackers from claiming to have connections that do not exist.
made available to every further node, e.g. via broadcast. It is as- Besides the plain topological information, a scoring value
sumed that attacks on this key distribution approach can be de- sv is derived for each link to a known node that is currently not
tected due to inconsistencies in the provided public keys. The connected. This value is later on used to rank paths to or via not
overall communication in the network is specified as follows. connected nodes in an appropriate manner. As basis for calcu-
After the user has entered a message and selected a receiv- lating this value, connection proof data is analyzed. The node
ing node from the list of known nodes, the message is handed with the longest connection duration is selected and the link
over to the routing subsystem. Routing is done based on both between this node and the disconnected one is provided with
the known network topology plan and the calculated reliabil- sv =s M AX where s M AX is the maximal scoring value specified
ity values for the other network nodes. After selecting the best by configuration. Based on the determined longest connection
available route, which has the highest overall reliability and time, a linearly scaled value derived from the respective con-
contains only nodes with a reliability value above a specific nection duration is assigned to the links of the further nodes
threshold, the message is passed on to the security subsystem. that had been connected to the currently disconnected node.
Using the node’s private key, the message is signed and
transmitted via the contact management to the next node on 4.3 Message tracing
the calculated path. After receiving, the neighboring node If a message has not been acknowledged before a timeout
passes the message to its security subsystem, which checks is reached, a message tracing message is transmitted by the
the validity of the signatures from all the nodes that previ- node waiting for the acknowledgement to the neighbor it
ously forwarded and signed the message. Furthermore, the has previously passed the lost message to. Each node on the
statistics subsystem is informed about the new message. path to the message’s destination will answer this tracing
Before a node routes the incoming message to the next node, message with a confirmation if it has forwarded the message
it sends an acknowledgement to the neighbor that passed the successfully. Afterwards, it forwards the tracing message to
message over. All the nodes that forward the message sign the node to which it has previously passed the lost message.
it (including all existing signatures) and route it as described. The tracing message is thereby routed independently and can
The final recipient of the message not only sends an acknowl- be delivered on a different path than the original message. In
edgement to the transmitting neighbor, but also to the sender order to prove reception by the next node n+1 on the path, the
of the message, if that’s not the same node. This acknowledge- former acknowledgement of this node n+1 is embedded into
ment is routed through the network like a normal message. the confirmation message of node n. Due to this approach, ma-
Using the signatures and acknowledgements, message drop- licious behavior can be narrowed down within the network.
ping can be localized and verified all over the network. Thus, each node that can prove that it has passed the message
1 A more detailed description of our system architecture can be found in [17]. successfully to a neighbor is not assumed to be an attacker.

21
CHANTS Session 1 CHANTS’18, October 29, 2018, New Delhi, India.

Figure 2: System architecture and processing flow


If a node’s routing algorithm decides that a message should The three ratios are weighted using the factors fd , fi and fp
not be forwarded immediately but buffered, it sends a corre- with fd + fi + fp = 1. The overall score is reduced by the penalty
sponding notification to the sender of the message to let the values pn and ps for each medium criticality (pn ) and high criti-
sender know where the message is stored currently. Using the cality (ps ) security issue detected for the addressed node. Both
topology plan, the sender can then monitor when his message values have to be provided by configuration with ps >pn . The
could be forwarded and, if necessary, send a tracing message. penalty values are taken into account c n and c s times with
c n representing the amount of detected medium criticality
4.4 Node reliability score security issues and c s representing the amount of the high
Due to broadcasting of the connection proofs, each network criticality security issues, respectively. The detected security
node gets statistics about the communication for each estab- issues are associated with an assumed misbehavior of the
lished connection and calculates a reliability value for all other focused node. Considered misbehavior is an implementation
nodes based on three ratios derived from these statistic: matter. As medium criticality issues may be considered:
(1) qd : Ratio of the messages successfully transmitted di- • Message has been transmitted with wrong signature
rectly via a currently existing connection to the node. • Acknowledgement contains a wrong hashsum
(2) qp : Ratio of the messages successfully transmitted di- • Huge information difference value in a connection proof
rectly via former connections to the node. As highly criticality issues may be considered:
(3) qi : Ratio of the messages successfully transmitted indi- • Node is made responsible for dropping a message
rectly via other nodes to the node. • Node has changed a locally issued message signature
Thus, e.g. qd is calculated using the amount of messages
DMSGSENn sent directly to the neighboring node and the 4.5 Routing
amount of acknowledges DACKRECn received from this node The next hop for message delivery is determined as follows:
for these messages via formula 1. (1) All nodes having a reliability value below a specific
ÍN DAC K RECn
n=1 DM SGS E N n
threshold are removed from the overall set of nodes
qd = (1) taken into account during the further steps.
N
(2) The paths to the destination node are determined using
The further two ratios are calculated in the same manner.
the topology resulting from the first step.
Using these three ratios, a node’s reliability value is finally
(3) Using the product of the nodes’ reliability values and the
calculated using formula 2.
future contact probabilities of currently not connected
r = (fd ∗qd + fi ∗qi + fp ∗qp )∗(1−pn )c n ∗(1−ps )c s (2) nodes, an overall rank value is assigned to each path.

22
CHANTS Session 1 CHANTS’18, October 29, 2018, New Delhi, India.

connection proofs and node statistics have been broadcasted


every 5 seconds. Furthermore, pn used in formula 2 has been
set to 0.05 and ps has been set to 0.1. The three weighting
factors fd , fi and fp have been set to 13 . The only (critical) se-
curity issue considered in the scenario was message dropping.
The attacking node M has dropped all messages it received. In
our test, messages were generated randomly by every node
in an interval between 2 to 4 seconds.

5.2 Evaluation results and discussion


Figure 4 shows the reliability score calculated by node A for
the nodes C, E and M depending on the times in seconds since
the simulation started. The two nodes C and E have been se-
lected as exemplary neighbor nodes that may suffer from false-
positive penalties. Due to a step by step creation of the overall
network, node A has a path to node M after 11 seconds only.
As figure 4 shows, the attacking node has a rating of less than
0.4 after a bit more than 30 seconds of total simulation time
Figure 3: Screenshot of the Android application
(thus, 20 seconds after node A has learned about its existence).
(4) The first node of the highest ranked path is selected, and Though, the reliability rating of the attacker briefly fluctuates
the message is transmitted to this node as stated above. in the beginning, drops soon and stays on a low level after-
Due to this approach, links to currently connected nodes wards. Thus, the node is not considered during route selection
do not reduce the overall path rank because their validity has by node A anymore. Interesting to observe is the attacker’s
been confirmed bidirectionally by both participating nodes. impact on the ratings of the nodes C and E. As node E has four
direct neighbors in total, its reliability score is not constantly
5 EVALUATION influenced by the attacker’s malicious behavior. Though, the
score briefly drops, the node is directly rehabilitated again.
5.1 Evaluation approach and scenario
This shows the strength of the approach (even in small net-
The overall concept has been implemented as an Android ap- works) when there is solid connectivity of individual nodes.
plication and tested using Android 4.3 to 8.0 devices. The app However, it is also evident that node C is intensively penalized.
uses Bluetooth sockets for the direct communication between It has less neighbors than node E and is part of every path to
two nodes. Broadcasts are realized by transmitting (and for- node H. Due to these topological aspects, the behavior of the
warding) messages to all connected neighbors. Figure 3 shows attacker has a quite huge influence on its reliability rating.
a screenshot of the developed application. More precise, data It is planned to further investigate the effects of the attacks
provided by the statistics component (see 4.1) is displayed. on the attacker’s neighbouring nodes and to introduce mech-
The considered node has a rating of 0,71 due to six detected anisms to correct their reliability rating once an attacker has
security issues of normal criticality. Due to involvement in been identified. Based on the briefly described findings and
many regular message exchanges specifically with directly further experiments, the core contribution of the approach
connected nodes, the overall rating is not fully spoiled. presented here can be summarized as follows:
Besides the possibility to build ad-hoc networks between
physical devices, our application offers a simulation mode to (1) The approach is capable to detect malicious nodes after
simulate networks made of virtual nodes. For test purposes, only a few messages exchanges.
virtual nodes can act as attackers, with each individual node (2) It fulfills the core requirement to detect black-hole at-
having a concrete malicious behavior assigned. tacks (even in small networks). The solution can be
To analyze the effectiveness of the approach and the in- applied even if only nine or less nodes are present.
tensity of false-positive penalties, extensive tests were per- (3) False-positive penalties depend on the connectivity of
formed on the basis of various (dynamically changing) net- single nodes and if they are part of alternative paths.
work topologies. In doing so, both simulated networks and The third mentioned aspect can be easily avoided by a minor
networks of physical mobile devices were considered. extension to the discussed approach: As soon as the reliability
The results presented in the following have been gathered score of a node drops below a given threshold (e.g. 0.2), it is re-
using the topology shown in figure 1. In the discussed scenario, moved from the network. Thus, the reliability scores of all fur-
a timeout for acknowledgements of 5 seconds has been used, ther nodes will increase again as long as they behave correctly.

23
CHANTS Session 1 CHANTS’18, October 29, 2018, New Delhi, India.

[4] M. Chuah, P. Yang, and J. Han. 2007. A Ferry-based Intrusion


Detection Scheme for Sparsely Connected Ad Hoc Networks.
In 2007 Fourth Annual International Conference on Mobile and
Ubiquitous Systems: Networking Services (MobiQuitous). 1–8.
https://doi.org/10.1109/MOBIQ.2007.4451068
[5] A. K. Gupta, I. Bhattacharya, P. S. Banerjee, and J. K. Mandal. 2014.
A Co-operative Approach to Thwart Selfish and Black-Hole Attacks
in DTN for Post Disaster Scenario. In 2014 Fourth International
Conference of Emerging Applications of Information Technology. 113–118.
https://doi.org/10.1109/EAIT.2014.24
[6] Garima Gupta, Preeti Nagrath, Sandhya Aneja, and Neelima Gupta.
2012. Reference Based Approach to Mitigate Blackhole Attacks in
Delay Tolerant Networks. In Proceedings of the 8H ACM Symposium on
QoS and Security for Wireless and Mobile Networks (Q2SWinet ’12). ACM,
New York, NY, USA, 85–88. https://doi.org/10.1145/2387218.2387237
Figure 4: Reliability scores of node C, E and M
[7] A. A. Hinai, H. Zhang, and Y. Chen. 2012. Mitigating Blackhole Attacks
in Delay Tolerant Networks. In 2012 13th International Conference
6 SUMMARY AND OUTLOOK on Parallel and Distributed Computing, Applications and Technologies.
To provide a robust DTN-based ad-hoc network, it is essential 329–334. https://doi.org/10.1109/PDCAT.2012.95
to protect it against packet drop attacks. This requires not just [8] Yi-an Huang and Wenke Lee. 2003. A Cooperative Intrusion Detection
considering single attack patterns, but entire attacker models. System for Ad Hoc Networks. In Proceedings of the 1st ACM Workshop
on Security of Ad Hoc and Sensor Networks (SASN ’03). ACM, New York,
In this paper, we have presented a concept that leverages asym- NY, USA, 135–147. https://doi.org/10.1145/986858.986877
metric cryptography and is capable to detect the misbehaviour [9] F. Li, J. Wu, and A. Srinivasan. 2009. Thwarting Blackhole Attacks in
of network nodes, to identify attackers and exclude them from Disruption-Tolerant Networks using Encounter Tickets. In IEEE INFO-
the network. We evaluated the approach extensively with COM 2009. 2428–2436. https://doi.org/10.1109/INFCOM.2009.5062170
real and simulated networks. Our investigations have shown [10] Q. Li, S. Zhu, and G. Cao. 2010. Routing in Socially Selfish De-
lay Tolerant Networks. In 2010 Proceedings IEEE INFOCOM. 1–9.
that the concept effectively detects attacks and that attackers https://doi.org/10.1109/INFCOM.2010.5462138
can be identified after just a few dropped messages. If there [11] Sergio Marti, T. J. Giuli, Kevin Lai, and Mary Baker. 2000. Mitigating
are alternative routes available with nodes that have better Routing Misbehavior in Mobile Ad Hoc Networks. In Proceedings
reliability values than the attacker, the introduced routing of the 6th Annual International Conference on Mobile Computing
algorithm decides to abandon the attacker’s route immedi- and Networking (MobiCom ’00). ACM, New York, NY, USA, 255–265.
https://doi.org/10.1145/345910.345955
ately after the first dropped message. It is feasible to extend [12] Hervé Ntareme, Marco Zennaro, and Björn Pehrson. 2011. Delay
the concept with further security mechanisms to increase the Tolerant Network on Smartphones: Applications for Communication
stability of the network in certain situations. For example, the Challenged Areas. In Proceedings of the 3rd Extreme Conference on Com-
parameters used to rate the reliability could be dynamically munication: The Amazon Expedition (ExtremeCom ’11). ACM, New York,
adjusted at runtime. It is also conceivable to identify certain NY, USA, Article 14, 6 pages. https://doi.org/10.1145/2414393.2414407
[13] L. Pelusi, A. Passarella, and M. Conti. 2006. Opportunistic net-
patterns in the reliability values of neighboring nodes to iden- working: data forwarding in disconnected mobile ad hoc networks.
tify attackers even more precisely and to protect the reliability IEEE Communications Magazine 44, 11 (November 2006), 134–141.
values of their neighboring nodes from being downgraded. In https://doi.org/10.1109/MCOM.2006.248176
addition, the performance of the approach (especially with [14] Y. Ren, M. C. Chuah, J. Yang, and Y. Chen. 2010. MUTON: De-
regard to delay, delivery rate and overhead) is to be measured. tecting Malicious Nodes in Disruption-Tolerant Networks. In 2010
IEEE Wireless Communication and Networking Conference. 1–6.
https://doi.org/10.1109/WCNC.2010.5506574
REFERENCES [15] Ming-Yang Su, Kun-Lin Chiang, and Wei-Cheng Liao. 2010. Mitigation
[1] P. Asuquo, H. Cruickshank, C. P. A. Ogah, A. Lei, and Z. Sun. of Black-Hole Nodes in Mobile Ad Hoc Networks. In Proceedings of
2016. A collaborative trust management scheme for emergency the International Symposium on Parallel and Distributed Processing with
communication using delay tolerant networks. In 2016 8th Ad- Applications (ISPA ’10). IEEE Computer Society, Washington, DC, USA,
vanced Satellite Multimedia Systems Conference and the 14th Signal 162–167. https://doi.org/10.1109/ISPA.2010.74
Processing for Space Communications Workshop (ASMS/SPSC). 1–6. [16] Shuchita Upadhyaya and Karishma. [n. d.]. A Co-operative Mechanism
https://doi.org/10.1109/ASMS-SPSC.2016.7601469 to Contrast Black-hole Attacks in Delay Tolerant Networks. IOSR
[2] Abderrahmane Baadache and Ali Belmehdi. 2012. Fighting Against Journal of Computer Engineering.
Packet Dropping Misbehavior in Multi-hop Wireless Ad Hoc [17] Manuel Weißbach. 2017. Ein Ansatz für ad-hoc Disruption-tolerant
Networks. J. Netw. Comput. Appl. 35, 3 (May 2012), 1130–1139. Networks auf Android-Basis. Diploma thesis. Technische Universität
https://doi.org/10.1016/j.jnca.2011.12.012 Dresden, Germany.
[3] C. Caini, P. Cornice, R. Firrincieli, M. Livini, and D. Lacamera. 2010. [18] G. Wu, J. Wang, L. Yao, and C. Lin. 2013. A Secure Social-Aware
DTN meets smartphones: Future prospects and tests. In IEEE 5th Incentive Scheme for Delay Tolerant Networks. In 2013 12th IEEE
International Symposium on Wireless Pervasive Computing 2010. International Conference on Trust, Security and Privacy in Computing and
355–360. https://doi.org/10.1109/ISWPC.2010.5483772 Communications. 813–820. https://doi.org/10.1109/TrustCom.2013.99

24

You might also like