An Approach to Mitigate Blackhole Attack on Delay Tolerant Networks using Multiple Paths
Autor(a) principal: | |
---|---|
Data de Publicação: | 2020 |
Outros Autores: | , , , |
Tipo de documento: | Artigo |
Idioma: | por |
Título da fonte: | Research, Society and Development |
Texto Completo: | https://rsdjournal.org/index.php/rsd/article/view/5535 |
Resumo: | Delay and Tolerant Networks (DTNs) are networks that do not need infrastructure and use their nodes to communicate. However Blackhole attacks (Blackhole) constitute a threat to the functioning of these networks by dropping packets from legitimate users. There are attempts in the literature to solve the blackhole attack on DTNs. However, the implemented forms consume a large amount of network resources because they work by generating copies of the message. This paper presents a Mitigation approach that uses Mojette and multiple paths to fragment, send and retrieve data without high network wear. The approach was developed using the Eclipse IDE in conjunction with The Opportunistic Network Environment Simulator. In this environment two scenarios with different situations were developed in order to perform three simulations, aiming to evaluate the approach that aims to transmit and retrieve the package even if there are discards. Simulation results show that the approach has a re-assembly rate of at least 75%, even though the lost packet rate is 62.50%. |
id |
UNIFEI_70a9189112892806c5891f3a859cd3bc |
---|---|
oai_identifier_str |
oai:ojs.pkp.sfu.ca:article/5535 |
network_acronym_str |
UNIFEI |
network_name_str |
Research, Society and Development |
repository_id_str |
|
spelling |
An Approach to Mitigate Blackhole Attack on Delay Tolerant Networks using Multiple PathsUn enfoque para mitigar el ataque de agujeros negros en redes tolerantes para retrasos y desconexiones utilizando múltiples rutasUma Abordagem para Mitigar Ataque Blackhole em Redes Tolerantes a Atrasos e Desconexões utilizando Múltiplos CaminhosDelay and tolerant networksBlackhole attackMitigation.Redes tolerantes a atrasos e desconexõesAtaque blackholeMitigação.Redes tolerantes para retrasos y desconexionesAtaque de agujero negroMitigación.Delay and Tolerant Networks (DTNs) are networks that do not need infrastructure and use their nodes to communicate. However Blackhole attacks (Blackhole) constitute a threat to the functioning of these networks by dropping packets from legitimate users. There are attempts in the literature to solve the blackhole attack on DTNs. However, the implemented forms consume a large amount of network resources because they work by generating copies of the message. This paper presents a Mitigation approach that uses Mojette and multiple paths to fragment, send and retrieve data without high network wear. The approach was developed using the Eclipse IDE in conjunction with The Opportunistic Network Environment Simulator. In this environment two scenarios with different situations were developed in order to perform three simulations, aiming to evaluate the approach that aims to transmit and retrieve the package even if there are discards. Simulation results show that the approach has a re-assembly rate of at least 75%, even though the lost packet rate is 62.50%.Las redes tolerantes al retraso (DTN) son redes que no necesitan infraestructura y utilizan la locomoción de sus nodos para comunicarse. Sin embargo, los ataques de BlackHole representan una amenaza para el funcionamiento de estas redes al descartar paquetes de usuarios legítimos. En la literatura hay esfuerzos para resolver el ataque del agujero negro en las ETD. Sin embargo, los formularios implementados consumen una gran cantidad de recursos de red, ya que funcionan generando copias del mensaje. En este contexto, este trabajo presenta un enfoque de mitigación que utiliza Mojette y múltiples formas de fragmentar, enviar y recuperar los datos y sin el alto desgaste de la red. El enfoque se desarrolló utilizando el Eclipse IDE (Entorno de desarrollo integrado) junto con el simulador de entorno de red oportunista The ONE (El simulador de entorno de red oportunista). En este entorno, se desarrollaron dos escenarios con diferentes situaciones, con el fin de realizar tres simulaciones, con el objetivo de evaluar el enfoque que tiene como objetivo transmitir y recuperar el paquete, incluso si hay descartes. Los resultados obtenidos a través de las simulaciones revelan que el enfoque presenta una tasa de reensamblaje de al menos 75%, aunque la tasa de paquetes perdidos es 62.50%.As redes tolerantes a atrasos e desconexões (Delay Tolerant Networks – DTNs) são redes que não precisam de infraestrutura e utilizam da locomoção dos seus nós para se comunicar. Todavia, ataques do tipo Buracos Negros (do inglês, Blackhole) consistem em uma ameaça para o funcionamento destas redes ao descartar pacotes de usuários legítimos. Na literatura há esforços para solucionar o ataque blackhole em DTNs. No entanto, as formas implementadas consomem uma grande quantidade de recursos da rede, pois funcionam por meio da geração de cópias da mensagem. Neste contexto, este trabalho apresenta uma abordagem de mitigação que se utiliza da Mojette e múltiplos caminhos para fragmentar, enviar e recuperar o dado e sem o alto desgaste da rede. A abordagem foi desenvolvida utilizando a IDE (Integrated Development Environment) Eclipse em conjunto com o simulador de ambiente de rede oportunista The ONE (The Opportunistic Network Environment Simulator). Nesse ambiente foram desenvolvidos dois cenários com diferentes situações, a fim de realizar três simulações, visando a avaliar a abordagem que tem como objetivos transmitir e recuperar o pacote ainda que existam descartes. Os resultados obtidos por meio das simulações revelam que a abordagem apresenta uma taxa de remontagem de no mínimo 75%, ainda que a taxa de pacotes perdidos seja de 62,50%.Research, Society and Development2020-07-18info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionapplication/pdfhttps://rsdjournal.org/index.php/rsd/article/view/553510.33448/rsd-v9i8.5535Research, Society and Development; Vol. 9 No. 8; e473985535Research, Society and Development; Vol. 9 Núm. 8; e473985535Research, Society and Development; v. 9 n. 8; e4739855352525-3409reponame:Research, Society and Developmentinstname:Universidade Federal de Itajubá (UNIFEI)instacron:UNIFEIporhttps://rsdjournal.org/index.php/rsd/article/view/5535/5057Copyright (c) 2020 Rodrigo Perlin, Ricardo Tombesi Macedo, Sidnei Renato Silveira, Antonio Rodrigo Delepiane de Vit, Roberto Franciscattoinfo:eu-repo/semantics/openAccessPerlin, RodrigoMacedo, Ricardo TombesiSilveira, Sidnei RenatoVit, Antonio Rodrigo Delepiane deFranciscatto, Roberto2020-08-20T18:00:17Zoai:ojs.pkp.sfu.ca:article/5535Revistahttps://rsdjournal.org/index.php/rsd/indexPUBhttps://rsdjournal.org/index.php/rsd/oairsd.articles@gmail.com2525-34092525-3409opendoar:2024-01-17T09:29:01.743187Research, Society and Development - Universidade Federal de Itajubá (UNIFEI)false |
dc.title.none.fl_str_mv |
An Approach to Mitigate Blackhole Attack on Delay Tolerant Networks using Multiple Paths Un enfoque para mitigar el ataque de agujeros negros en redes tolerantes para retrasos y desconexiones utilizando múltiples rutas Uma Abordagem para Mitigar Ataque Blackhole em Redes Tolerantes a Atrasos e Desconexões utilizando Múltiplos Caminhos |
title |
An Approach to Mitigate Blackhole Attack on Delay Tolerant Networks using Multiple Paths |
spellingShingle |
An Approach to Mitigate Blackhole Attack on Delay Tolerant Networks using Multiple Paths Perlin, Rodrigo Delay and tolerant networks Blackhole attack Mitigation. Redes tolerantes a atrasos e desconexões Ataque blackhole Mitigação. Redes tolerantes para retrasos y desconexiones Ataque de agujero negro Mitigación. |
title_short |
An Approach to Mitigate Blackhole Attack on Delay Tolerant Networks using Multiple Paths |
title_full |
An Approach to Mitigate Blackhole Attack on Delay Tolerant Networks using Multiple Paths |
title_fullStr |
An Approach to Mitigate Blackhole Attack on Delay Tolerant Networks using Multiple Paths |
title_full_unstemmed |
An Approach to Mitigate Blackhole Attack on Delay Tolerant Networks using Multiple Paths |
title_sort |
An Approach to Mitigate Blackhole Attack on Delay Tolerant Networks using Multiple Paths |
author |
Perlin, Rodrigo |
author_facet |
Perlin, Rodrigo Macedo, Ricardo Tombesi Silveira, Sidnei Renato Vit, Antonio Rodrigo Delepiane de Franciscatto, Roberto |
author_role |
author |
author2 |
Macedo, Ricardo Tombesi Silveira, Sidnei Renato Vit, Antonio Rodrigo Delepiane de Franciscatto, Roberto |
author2_role |
author author author author |
dc.contributor.author.fl_str_mv |
Perlin, Rodrigo Macedo, Ricardo Tombesi Silveira, Sidnei Renato Vit, Antonio Rodrigo Delepiane de Franciscatto, Roberto |
dc.subject.por.fl_str_mv |
Delay and tolerant networks Blackhole attack Mitigation. Redes tolerantes a atrasos e desconexões Ataque blackhole Mitigação. Redes tolerantes para retrasos y desconexiones Ataque de agujero negro Mitigación. |
topic |
Delay and tolerant networks Blackhole attack Mitigation. Redes tolerantes a atrasos e desconexões Ataque blackhole Mitigação. Redes tolerantes para retrasos y desconexiones Ataque de agujero negro Mitigación. |
description |
Delay and Tolerant Networks (DTNs) are networks that do not need infrastructure and use their nodes to communicate. However Blackhole attacks (Blackhole) constitute a threat to the functioning of these networks by dropping packets from legitimate users. There are attempts in the literature to solve the blackhole attack on DTNs. However, the implemented forms consume a large amount of network resources because they work by generating copies of the message. This paper presents a Mitigation approach that uses Mojette and multiple paths to fragment, send and retrieve data without high network wear. The approach was developed using the Eclipse IDE in conjunction with The Opportunistic Network Environment Simulator. In this environment two scenarios with different situations were developed in order to perform three simulations, aiming to evaluate the approach that aims to transmit and retrieve the package even if there are discards. Simulation results show that the approach has a re-assembly rate of at least 75%, even though the lost packet rate is 62.50%. |
publishDate |
2020 |
dc.date.none.fl_str_mv |
2020-07-18 |
dc.type.driver.fl_str_mv |
info:eu-repo/semantics/article info:eu-repo/semantics/publishedVersion |
format |
article |
status_str |
publishedVersion |
dc.identifier.uri.fl_str_mv |
https://rsdjournal.org/index.php/rsd/article/view/5535 10.33448/rsd-v9i8.5535 |
url |
https://rsdjournal.org/index.php/rsd/article/view/5535 |
identifier_str_mv |
10.33448/rsd-v9i8.5535 |
dc.language.iso.fl_str_mv |
por |
language |
por |
dc.relation.none.fl_str_mv |
https://rsdjournal.org/index.php/rsd/article/view/5535/5057 |
dc.rights.driver.fl_str_mv |
info:eu-repo/semantics/openAccess |
eu_rights_str_mv |
openAccess |
dc.format.none.fl_str_mv |
application/pdf |
dc.publisher.none.fl_str_mv |
Research, Society and Development |
publisher.none.fl_str_mv |
Research, Society and Development |
dc.source.none.fl_str_mv |
Research, Society and Development; Vol. 9 No. 8; e473985535 Research, Society and Development; Vol. 9 Núm. 8; e473985535 Research, Society and Development; v. 9 n. 8; e473985535 2525-3409 reponame:Research, Society and Development instname:Universidade Federal de Itajubá (UNIFEI) instacron:UNIFEI |
instname_str |
Universidade Federal de Itajubá (UNIFEI) |
instacron_str |
UNIFEI |
institution |
UNIFEI |
reponame_str |
Research, Society and Development |
collection |
Research, Society and Development |
repository.name.fl_str_mv |
Research, Society and Development - Universidade Federal de Itajubá (UNIFEI) |
repository.mail.fl_str_mv |
rsd.articles@gmail.com |
_version_ |
1797052652985516032 |