Research on Robustness of Typically Opportunistic Network Routing Algorithm under Flooding Attack

Article Preview

Abstract:

This paper designed the evaluation method and the index system. Through simulating behavior of pedestrian with mobile intelligent Bluetooth devices in the real city scene and did a quantitative analysis about the effects of flooding attacks to opportunity network in the three aspects of transmission capacity, transmission efficiency and energy consumption of nodes , in order to evaluate Direct Delivery, Spray and Wait and MaxProp the three opportunity network routing algorithm’s robustness under the flooding attack results showed that Direct Deliven algorithm robustness is best, it can withstand flooding attacks completely, robustness of the Spray and Wait algorithm is the worst, their performance will decline more than 80% in some scenarios, the performance of MaxProp algorithm under flood attacks will decrease remarkably.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 989-994)

Pages:

2227-2231

Citation:

Online since:

July 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Huang C H,Lank C,Tsaic Z. A survey of opportunistic networks (2008)1672-1677.

Google Scholar

[2] Farrell S, Symington S,Weiss Het al. Delay-tolerant networkingSecurity overview draftirtfdtnrg-sec-overview-06[EB/OL]. http:/tools. ietf. org/html/draft-irtf-dtnrg-sec-overview-06.

Google Scholar

[3] Kate A,Zaverucha G M,Hengartner U. Anonymity and securityin delay tolerant networks ( 2007)504-513.

Google Scholar

[4] Asokan N,Kostianinen K,Ginzboorg P,et al. Towards securingDisruption-tolerant networking,Tech Rep NRC-TR-2007-007. (2007).

Google Scholar

[5] Burgess J,Bissias G D,Corner M D. Surviving attacks on disruption-tolerant networks without authentication (2007).

DOI: 10.1145/1288107.1288116

Google Scholar

[6] Fawal A,Boudec J Y,Salamatian K. Vulnerabilities in epidemicForwarding (2007).

Google Scholar