IEEE Copyright Notice

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

ACM Copyright Notice

These are the authors' versions of the work. The copyright is with ACM. They are posted here by permission of ACM for your personal use. Not for redistribution. See individual publication details for information on the publication of the definitive versions.

Springer-Verlag LNCS Copyright Notice

The copyright of these contributions has been transferred to Springer-Verlag Berlin Heidelberg New York. The copyright transfer covers the exclusive right to reproduce and distribute the contribution, including reprints, translations, photographic reproductions, microform, electronic form (offline, online), or any other reproductions of similar nature. Online available from Springer-Verlag LNCS series.

Work that appeared before the 1st of September 2003 was published while the authors were with the Lehrstuhl Praktische Informatik IV at the University of Mannheim.

Misrouted Prophecy - On the Impact of Security Attacks on PRoPHET

Author(s): Raphael Bialon, Kalman Graffi.
Title: Misrouted Prophecy - On the Impact of Security Attacks on PRoPHET
Published: LSDVE 2016 - 4th Workshop on Large Scale Distributed Virtual Environments, , pp. , Grenoble, France, August 2016
Keyword(s): opportunistic networks, security, attacks, PRoPHET, routing
Abstract: In opportunistic networking, the wireless connectivity of mobile nodes is used to engage in opportunistic contacts, to exchange messages and thus to forward message in a store-carry-forward approach to a destination.Routing algorithms were developed with regards to the characteristics of these regularly partitioned networks.Network partitioning, no guarantee on device availability, and long delivery delays make these networks outstanding from traditional networks.In this paper, we investigate the behaviour of the prominent routing algorithm PRoPHET in opportunistic networks under different attack strategies. The attacks are performed by malicious nodes aimed at sabotaging the routing process in the network.Utilising ONE, the opportunistic network environment simulator, we conduct tests on these attacks and evaluate the outcomes of networks with malicious nodes compared to regular network behaviour.Through characteristic scenarios we document the behaviour of the network under attack. While in most cases the impact is tremendous, we also observe an interesting case of an attack causing an improved result in the network under attack.
Bib entry: [XML] [BibTeX]
Verantwortlich für den Inhalt: E-Mail sendenWE Informatik