A Solution for Prevention of Selective Dropping and Selfish Attacks in Opportunistic Networks

Samaneh Rashidibajgan

Abstract

Opportunistic Networks (OppNet) are based on routing messages from a node to another node, from a source to the destination. There is not a connection to the Internet in these networks and nodes play routers role, So it is important that all of the nodes participate in the routing protocol. These networks have high potential to vulnerable against ”Dropping and Selective Dropping Attacks” and ”Selfish attacks”. Some nodes may prefer to discard some messages in order to save their Battery life, memory space and so on, while they use the network services. It causes an interruption in the network and makes a high delay for messages. In this paper, we propose a new method based on Game Theory to prevent these attacks against OppNet, and we will prove that our strategy is a Nash equilibrium. Also we will discuss that our algorithm is resistance against various attacks

References

  1. Alajeely, M., Doss, R., and Ahmad, A. (2015). Security and trust in opportunistic networks-a survey. In IETE Technical Review, pages 1-13. Taylor & Francis.
  2. Hoang, T. H. and Huh, E. (2008). Detecting selective forwarding attacks in wireless sensor networks using two-hops neighbor knowledge. In Seventh IEEE International Symposium on Network Computing and Applications, 2008. NCA'08, pages 325-331. IEEE.
  3. Jo, M., Han, L., Kim, D., and In, H. (2013). Selfish attacks and detection in cognitive radio ad-hoc networks. In IEEE network, volume 27, pages 46-50. IEEE.
  4. Kargl, F., Klenk, A., Schlott, S., and Weber, M. (2004). Advanced detection of selfish or malicious nodes in ad hoc networks. In Security in Ad-hoc and Sensor Networks, pages 152-165. Springer.
  5. Kumari, S. and Paramasivan, B. (2015). Ant based defense mechanism for selective forwarding attack in manet. In 31st IEEE International Conference on Data Engineering Workshops (ICDEW), 2015, pages 92-97. IEEE.
  6. Liao, H. and Ding, S. (2015). Mixed and continuous strategy monitor-forward game based selective forwarding solution in wsn. In International Journal of Distributed Sensor Networks, pages 1-13. Hindawi.
  7. Mittal, S. (2015). Identification technique for all passive selfish node attacks in a mobile network. In International Journal of Advance Research in Computer Science and Management Studies, volume 3, pages 46- 51. IJARCSMS.
  8. Rashidibajgan, S. (2016). A trust structure for detection of sybil attacks in opportunistic networks. In 11th International Conference for Internet Technology and Secured Transactions (ICITST), pages 347-351. IEEE.
  9. Sujitha, R., Scholar, P., and Poornima, N. (2015). Efficient detection of selfish attacks in cognitive radio networks using coopon algorithm. In International journal of advanced research trends in Engineering and technology, volume 2, pages 84-91. IJARTET.
  10. Sun, H., Chen, C., and Hsiao, Y. (2007). An efficient countermeasure to the selective forwarding attack in wireless sensor networks. In TENCON 2007-2007 IEEE Region 10 Conference, pages 1-4. IEEE.
Download


Paper Citation


in Harvard Style

Rashidibajgan S. (2017). A Solution for Prevention of Selective Dropping and Selfish Attacks in Opportunistic Networks . In Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security - Volume 1: IoTBDS, ISBN 978-989-758-245-5, pages 30-35. DOI: 10.5220/0006233200300035


in Bibtex Style

@conference{iotbds17,
author={Samaneh Rashidibajgan},
title={A Solution for Prevention of Selective Dropping and Selfish Attacks in Opportunistic Networks},
booktitle={Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security - Volume 1: IoTBDS,},
year={2017},
pages={30-35},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006233200300035},
isbn={978-989-758-245-5},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security - Volume 1: IoTBDS,
TI - A Solution for Prevention of Selective Dropping and Selfish Attacks in Opportunistic Networks
SN - 978-989-758-245-5
AU - Rashidibajgan S.
PY - 2017
SP - 30
EP - 35
DO - 10.5220/0006233200300035