Loading

Detecting Blackhole Attack using Encounter Records on Multi-Copy Routing Protocols in Delay Tolerant Networks (DTN)
Heru Nurwarsito1, Naldo Steven Sirait2

1Heru Nurwarsito, Lecturer, Department of Computer Science Faculty, University of Brawijaya, Malang, East Java, Indonesia. 

2Naldo Steven Sirait, Undergraduate Student, Department of Computer Science Faculty, University of Brawijaya, Malang, East Java, Indonesia.

Manuscript received on 10 January 2020 | Revised Manuscript received on 06 February 2020 | Manuscript Published on 20 February 2020 | PP: 152-157 | Volume-9 Issue-3S January 2020 | Retrieval Number: C10340193S20/2020©BEIESP | DOI: 10.35940/ijitee.C1034.0193S20

Open Access | Editorial and Publishing Policies | Cite | Zenodo | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Delay Tolerant Network (DTN) is a solution for intermittent connectivity and high delay. However, due to constrained connectivity, DTN is vulnerably susceptible to Blackhole attacks in which malicious nodes will drop all packets received from source nodes or relay nodes. The impact of a Blackhole attack can reduce the packet delivery ratio and waste resources from relay nodes that carry and forward messages. The encounter record scheme is one solution that can be applied to detect Blackhole attacks on the DTN. The encounter record mechanism is performed by utilizing a relay node that will store several records obtained from encounters between previous nodes, then the node will detect when a packet has dropped and a blacklist is performed on the node detected as a malicious node. Based on testing the performance of the routing protocol obtained that the encounter record scheme is able to detect malicious nodes so that it can again increase the delivery ratio and overhead ratio. The simulation results of this research showed that the Encounter Record has successfully detected Blackhole attacks with an average detection time of 1,5992 seconds in the spray-and-wait routing and 1,5342 seconds in the epidemic routing for 15 malicious nodes. Detection accuracy is 100% on spray-and-wait routing and 73,85% on routing epidemic for 15 malicious nodes.

Keywords: Blackhole Attack, Delay Tolerant Network, Encounter Record, Epidemic, Malicious nodes, Spray and Wait.
Scope of the Article: High Speed Networks