Articles | Open Access |

GEOSPATIAL ANOMALY DETECTION FOR ENHANCED SECURITY IN DELAY-TOLERANT NETWORKS

Abstract

Delay-Tolerant Networks (DTNs) are designed to operate effectively in environments characterized by frequent disconnections, long delays, and intermittent connectivity. While their store-carry-forward paradigm enables communication in challenged environments, it also introduces unique security vulnerabilities, particularly concerning attacks that exploit spatial and temporal patterns of node mobility and contact. This article proposes and explores the feasibility of a geospatial anomaly detection framework to identify and monitor potential attack locations within a specific area of a DTN. By leveraging location information alongside network performance metrics, this approach aims to proactively detect malicious activities, such as black hole attacks or resource exhaustion, confined to geographical regions. The methodology encompasses data collection, feature engineering combining network and spatial data, and the application of anomaly detection algorithms. The hypothetical results suggest that such a system could significantly enhance DTN security by enabling targeted intervention and improving overall network resilience in challenged communication scenarios.

Keywords

Geospatial anomaly detection, delay-tolerant networks (DTNs), network security

References

Balasubramanian, A., Levine, B., & Venkataramani, A. (2007, August). DTN routing as a resource allocation problem. In Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications (pp. 373-384).

Burgess, J., Gallagher, B., Jensen, D. D., & Levine, B. N. (2006, April). MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks. Infocom, 6.

Chaintreau, A., Hui, P., Crowcroft, J., Diot, C., Gass, R., & Scott, J. (2007). Impact of human mobility on opportunistic forwarding algorithms. IEEE Transactions on Mobile Computing, 6(6), 606-620.

Fall, K. (2003, August). A delay-tolerant network architecture for challenged internets. In Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications (pp. 27-34).

Henriksson, D., Abdelzaher, T. F., & Ganti, R. K. (2007, August). A caching-based approach to routing in delay-tolerant networks. In 2007 16th International Conference on Computer Communications and Networks (pp. 69-74). IEEE.

Jain, S., Fall, K., & Patra, R. (2004, August). Routing in a delay tolerant network. In Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications (pp. 145-158).

Johnson, D. B., & Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks. In Mobile computing (pp. 153-181). Springer, Boston, MA.

Juang, P., Oki, H., Wang, Y., Martonosi, M., Peh, L. S., & Rubenstein, D. (2002, October). Energy-efficient computing for wildlife tracking: Design tradeoffs and early experiences with ZebraNet. In Proceedings of the 10th international conference on Architectural support for programming languages and operating systems (pp. 96-107).

Keranen, A. (2008). Opportunistic network environment simulator. Special Assignment report, Helsinki University of Technology, Department of Communications and Networking.

Kernen, A., Ott, J., & Krkkinen, T. (2009, March). The ONE simulator for DTN protocol evaluation. In Proceedings of the 2nd international conference on simulation tools and techniques (pp. 1-10).

Lindgren, A., Doria, A., & Scheln, O. (2003). Probabilistic routing in intermittently connected networks. ACM SIGMOBILE mobile computing and communications review, 7(3), 19-20.

Ling, C., Hwang, W., & Salvendy, G. (2007). A survey of what customers want in a cell phone design. Behaviour & Information Technology, 26(2), 149-163.

Mayer, C. P. (2010). osm2wkt-OpenStreetMap to WKT Conversion. mayer2010osm, from OpenStreetMaps-ONE.

Perkins, C. E., & Royer, E. M. (1999, February). Ad-hoc on-demand distance vector routing. In Proceedings WMCSA’99. Second IEEE Workshop on Mobile Computing Systems and Applications (pp. 90-100). IEEE.

Sallee, P. (2003, October). Model-based steganography. In International workshop on digital watermarking (pp. 154-167). Springer, Berlin, Heidelberg.

Spyropoulos, T., Psounis, K., & Raghavendra, C. S. (2005, August). Spray and wait: an efficient routing scheme for intermittently connected mobile networks. In Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking (pp. 252-259).

Tan, S., & Kim, K. (2013, November). Secure Route Discovery for preventing black hole attacks on AODV-based MANETs. In 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (pp. 1159-1164). IEEE.

Vahdat, A., & Becker, D. (2000). Epidemic routing for partially connected ad hoc networks.

Wagner, D., Zlotnikova, R., &Behr, F. J. (2009). XML-BASED AND OTHER GEORELATED ENCODINGS: OVERVIEW OF MAIN EXISTING GEOCODING FORMATS. AGSE, 196.

Article Statistics

Copyright License

Download Citations

How to Cite

GEOSPATIAL ANOMALY DETECTION FOR ENHANCED SECURITY IN DELAY-TOLERANT NETWORKS. (2024). International Journal of Modern Computer Science and IT Innovations, 1(01), 7-12. https://aimjournals.com/index.php/ijmcsit/article/view/117