Using cluster analysis to detect attackers in vehicular delay tolerant networks

4Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Delay- and Disruption-Tolerant Networks (DTNs) are a suitable technology for many applications when the network suffers from intermittent connections and significant delays. However, the characteristics of a DTN make most traditional strategies of detecting attackers infeasible. In this paper, we propose a Misbehavior Detection System (MDS) to defend a DTN against blackhole and greyhole attackers without the need of an initial learning phase. We evaluate our method in two scenarios using different DTN routing protocols. We show that the proposed MDS has a fast reaction time and can efficiently detect evil nodes with varying drop probabilities under different scenarios yielding a high detection and low false positive rate while saving resources in the system.

Cite

CITATION STYLE

APA

Guo, Y., Schildt, S., & Wolf, L. (2014). Using cluster analysis to detect attackers in vehicular delay tolerant networks. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST (Vol. 129, pp. 181–196). Springer Verlag. https://doi.org/10.1007/978-3-319-04105-6_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free