An Approach to Mitigate Blackhole Attack on Delay Tolerant Networks using Multiple Paths

Detalhes bibliográficos
Autor(a) principal: Perlin, Rodrigo
Data de Publicação: 2020
Outros Autores: Macedo, Ricardo Tombesi, Silveira, Sidnei Renato, Vit, Antonio Rodrigo Delepiane de, Franciscatto, Roberto
Tipo de documento: Artigo
Idioma: por
Título da fonte: Research, Society and Development
Texto Completo: https://rsdjournal.org/index.php/rsd/article/view/5535
Resumo: Delay and Tolerant Networks (DTNs) are networks that do not need infrastructure and use their nodes to communicate. However Blackhole attacks (Blackhole) constitute a threat to the functioning of these networks by dropping packets from legitimate users. There are attempts in the literature to solve the blackhole attack on DTNs. However, the implemented forms consume a large amount of network resources because they work by generating copies of the message. This paper presents a Mitigation approach that uses Mojette and multiple paths to fragment, send and retrieve data without high network wear. The approach was developed using the Eclipse IDE in conjunction with The Opportunistic Network Environment Simulator. In this environment two scenarios with different situations were developed in order to perform three simulations, aiming to evaluate the approach that aims to transmit and retrieve the package even if there are discards.  Simulation results show that the approach has a re-assembly rate of at least 75%, even though the lost packet rate is 62.50%.
id UNIFEI_70a9189112892806c5891f3a859cd3bc
oai_identifier_str oai:ojs.pkp.sfu.ca:article/5535
network_acronym_str UNIFEI
network_name_str Research, Society and Development
repository_id_str
spelling An Approach to Mitigate Blackhole Attack on Delay Tolerant Networks using Multiple PathsUn enfoque para mitigar el ataque de agujeros negros en redes tolerantes para retrasos y desconexiones utilizando múltiples rutasUma Abordagem para Mitigar Ataque Blackhole em Redes Tolerantes a Atrasos e Desconexões utilizando Múltiplos CaminhosDelay and tolerant networksBlackhole attackMitigation.Redes tolerantes a atrasos e desconexõesAtaque blackholeMitigação.Redes tolerantes para retrasos y desconexionesAtaque de agujero negroMitigación.Delay and Tolerant Networks (DTNs) are networks that do not need infrastructure and use their nodes to communicate. However Blackhole attacks (Blackhole) constitute a threat to the functioning of these networks by dropping packets from legitimate users. There are attempts in the literature to solve the blackhole attack on DTNs. However, the implemented forms consume a large amount of network resources because they work by generating copies of the message. This paper presents a Mitigation approach that uses Mojette and multiple paths to fragment, send and retrieve data without high network wear. The approach was developed using the Eclipse IDE in conjunction with The Opportunistic Network Environment Simulator. In this environment two scenarios with different situations were developed in order to perform three simulations, aiming to evaluate the approach that aims to transmit and retrieve the package even if there are discards.  Simulation results show that the approach has a re-assembly rate of at least 75%, even though the lost packet rate is 62.50%.Las redes tolerantes al retraso (DTN) son redes que no necesitan infraestructura y utilizan la locomoción de sus nodos para comunicarse. Sin embargo, los ataques de BlackHole representan una amenaza para el funcionamiento de estas redes al descartar paquetes de usuarios legítimos. En la literatura hay esfuerzos para resolver el ataque del agujero negro en las ETD. Sin embargo, los formularios implementados consumen una gran cantidad de recursos de red, ya que funcionan generando copias del mensaje. En este contexto, este trabajo presenta un enfoque de mitigación que utiliza Mojette y múltiples formas de fragmentar, enviar y recuperar los datos y sin el alto desgaste de la red. El enfoque se desarrolló utilizando el Eclipse IDE (Entorno de desarrollo integrado) junto con el simulador de entorno de red oportunista The ONE (El simulador de entorno de red oportunista). En este entorno, se desarrollaron dos escenarios con diferentes situaciones, con el fin de realizar tres simulaciones, con el objetivo de evaluar el enfoque que tiene como objetivo transmitir y recuperar el paquete, incluso si hay descartes. Los resultados obtenidos a través de las simulaciones revelan que el enfoque presenta una tasa de reensamblaje de al menos 75%, aunque la tasa de paquetes perdidos es 62.50%.As redes tolerantes a atrasos e desconexões (Delay Tolerant Networks – DTNs) são redes que não precisam de infraestrutura e utilizam da locomoção dos seus nós para se comunicar. Todavia, ataques do tipo Buracos Negros (do inglês, Blackhole) consistem em uma ameaça para o funcionamento destas redes ao descartar pacotes de usuários legítimos. Na literatura há esforços para solucionar o ataque blackhole em DTNs. No entanto, as formas implementadas consomem uma grande quantidade de recursos da rede, pois funcionam por meio da geração de cópias da mensagem. Neste contexto, este trabalho apresenta uma abordagem de mitigação que se utiliza da Mojette e múltiplos caminhos para fragmentar, enviar e recuperar o dado e sem o alto desgaste da rede.  A abordagem foi desenvolvida utilizando a IDE (Integrated Development Environment) Eclipse em conjunto com o simulador  de ambiente  de rede oportunista The ONE (The Opportunistic Network Environment Simulator). Nesse ambiente foram desenvolvidos dois cenários com diferentes situações, a fim de realizar três simulações, visando a avaliar a abordagem que tem como objetivos transmitir e recuperar o pacote ainda que existam descartes. Os resultados obtidos por meio das simulações revelam que a abordagem apresenta uma taxa de remontagem de no mínimo 75%, ainda que a taxa de pacotes perdidos seja de 62,50%.Research, Society and Development2020-07-18info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionapplication/pdfhttps://rsdjournal.org/index.php/rsd/article/view/553510.33448/rsd-v9i8.5535Research, Society and Development; Vol. 9 No. 8; e473985535Research, Society and Development; Vol. 9 Núm. 8; e473985535Research, Society and Development; v. 9 n. 8; e4739855352525-3409reponame:Research, Society and Developmentinstname:Universidade Federal de Itajubá (UNIFEI)instacron:UNIFEIporhttps://rsdjournal.org/index.php/rsd/article/view/5535/5057Copyright (c) 2020 Rodrigo Perlin, Ricardo Tombesi Macedo, Sidnei Renato Silveira, Antonio Rodrigo Delepiane de Vit, Roberto Franciscattoinfo:eu-repo/semantics/openAccessPerlin, RodrigoMacedo, Ricardo TombesiSilveira, Sidnei RenatoVit, Antonio Rodrigo Delepiane deFranciscatto, Roberto2020-08-20T18:00:17Zoai:ojs.pkp.sfu.ca:article/5535Revistahttps://rsdjournal.org/index.php/rsd/indexPUBhttps://rsdjournal.org/index.php/rsd/oairsd.articles@gmail.com2525-34092525-3409opendoar:2024-01-17T09:29:01.743187Research, Society and Development - Universidade Federal de Itajubá (UNIFEI)false
dc.title.none.fl_str_mv An Approach to Mitigate Blackhole Attack on Delay Tolerant Networks using Multiple Paths
Un enfoque para mitigar el ataque de agujeros negros en redes tolerantes para retrasos y desconexiones utilizando múltiples rutas
Uma Abordagem para Mitigar Ataque Blackhole em Redes Tolerantes a Atrasos e Desconexões utilizando Múltiplos Caminhos
title An Approach to Mitigate Blackhole Attack on Delay Tolerant Networks using Multiple Paths
spellingShingle An Approach to Mitigate Blackhole Attack on Delay Tolerant Networks using Multiple Paths
Perlin, Rodrigo
Delay and tolerant networks
Blackhole attack
Mitigation.
Redes tolerantes a atrasos e desconexões
Ataque blackhole
Mitigação.
Redes tolerantes para retrasos y desconexiones
Ataque de agujero negro
Mitigación.
title_short An Approach to Mitigate Blackhole Attack on Delay Tolerant Networks using Multiple Paths
title_full An Approach to Mitigate Blackhole Attack on Delay Tolerant Networks using Multiple Paths
title_fullStr An Approach to Mitigate Blackhole Attack on Delay Tolerant Networks using Multiple Paths
title_full_unstemmed An Approach to Mitigate Blackhole Attack on Delay Tolerant Networks using Multiple Paths
title_sort An Approach to Mitigate Blackhole Attack on Delay Tolerant Networks using Multiple Paths
author Perlin, Rodrigo
author_facet Perlin, Rodrigo
Macedo, Ricardo Tombesi
Silveira, Sidnei Renato
Vit, Antonio Rodrigo Delepiane de
Franciscatto, Roberto
author_role author
author2 Macedo, Ricardo Tombesi
Silveira, Sidnei Renato
Vit, Antonio Rodrigo Delepiane de
Franciscatto, Roberto
author2_role author
author
author
author
dc.contributor.author.fl_str_mv Perlin, Rodrigo
Macedo, Ricardo Tombesi
Silveira, Sidnei Renato
Vit, Antonio Rodrigo Delepiane de
Franciscatto, Roberto
dc.subject.por.fl_str_mv Delay and tolerant networks
Blackhole attack
Mitigation.
Redes tolerantes a atrasos e desconexões
Ataque blackhole
Mitigação.
Redes tolerantes para retrasos y desconexiones
Ataque de agujero negro
Mitigación.
topic Delay and tolerant networks
Blackhole attack
Mitigation.
Redes tolerantes a atrasos e desconexões
Ataque blackhole
Mitigação.
Redes tolerantes para retrasos y desconexiones
Ataque de agujero negro
Mitigación.
description Delay and Tolerant Networks (DTNs) are networks that do not need infrastructure and use their nodes to communicate. However Blackhole attacks (Blackhole) constitute a threat to the functioning of these networks by dropping packets from legitimate users. There are attempts in the literature to solve the blackhole attack on DTNs. However, the implemented forms consume a large amount of network resources because they work by generating copies of the message. This paper presents a Mitigation approach that uses Mojette and multiple paths to fragment, send and retrieve data without high network wear. The approach was developed using the Eclipse IDE in conjunction with The Opportunistic Network Environment Simulator. In this environment two scenarios with different situations were developed in order to perform three simulations, aiming to evaluate the approach that aims to transmit and retrieve the package even if there are discards.  Simulation results show that the approach has a re-assembly rate of at least 75%, even though the lost packet rate is 62.50%.
publishDate 2020
dc.date.none.fl_str_mv 2020-07-18
dc.type.driver.fl_str_mv info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
format article
status_str publishedVersion
dc.identifier.uri.fl_str_mv https://rsdjournal.org/index.php/rsd/article/view/5535
10.33448/rsd-v9i8.5535
url https://rsdjournal.org/index.php/rsd/article/view/5535
identifier_str_mv 10.33448/rsd-v9i8.5535
dc.language.iso.fl_str_mv por
language por
dc.relation.none.fl_str_mv https://rsdjournal.org/index.php/rsd/article/view/5535/5057
dc.rights.driver.fl_str_mv info:eu-repo/semantics/openAccess
eu_rights_str_mv openAccess
dc.format.none.fl_str_mv application/pdf
dc.publisher.none.fl_str_mv Research, Society and Development
publisher.none.fl_str_mv Research, Society and Development
dc.source.none.fl_str_mv Research, Society and Development; Vol. 9 No. 8; e473985535
Research, Society and Development; Vol. 9 Núm. 8; e473985535
Research, Society and Development; v. 9 n. 8; e473985535
2525-3409
reponame:Research, Society and Development
instname:Universidade Federal de Itajubá (UNIFEI)
instacron:UNIFEI
instname_str Universidade Federal de Itajubá (UNIFEI)
instacron_str UNIFEI
institution UNIFEI
reponame_str Research, Society and Development
collection Research, Society and Development
repository.name.fl_str_mv Research, Society and Development - Universidade Federal de Itajubá (UNIFEI)
repository.mail.fl_str_mv rsd.articles@gmail.com
_version_ 1797052652985516032