GEOSPATIAL ANOMALY DETECTION FOR ENHANCED SECURITY IN DELAY-TOLERANT NETWORKS
Abstract
Delay-Tolerant Networks (DTNs) are designed to operate effectively in environments characterized by frequent disconnections, long delays, and intermittent connectivity. While their store-carry-forward paradigm enables communication in challenged environments, it also introduces unique security vulnerabilities, particularly concerning attacks that exploit spatial and temporal patterns of node mobility and contact. This article proposes and explores the feasibility of a geospatial anomaly detection framework to identify and monitor potential attack locations within a specific area of a DTN. By leveraging location information alongside network performance metrics, this approach aims to proactively detect malicious activities, such as black hole attacks or resource exhaustion, confined to geographical regions. The methodology encompasses data collection, feature engineering combining network and spatial data, and the application of anomaly detection algorithms. The hypothetical results suggest that such a system could significantly enhance DTN security by enabling targeted intervention and improving overall network resilience in challenged communication scenarios.
Keywords
References
Similar Articles
- Dr. Adrian K. Varela, Edge Intelligence-Driven Intrusion Detection for Internet of Things Networks in Next-Generation Communication Systems , International Journal of Modern Computer Science and IT Innovations: Vol. 3 No. 03 (2026): Volume03 Issue03
- Dr. Sofia Duarte, Jiwon Park, SECURING LARGE-SCALE IOT NETWORKS: A FEDERATED TRANSFER LEARNING APPROACH FOR REAL-TIME INTRUSION DETECTION , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 06 (2025): Volume 02 Issue 06
- Tang Shu Qi, Autonomous Resilience: Integrating Generative AI-Driven Threat Detection with Adaptive Query Optimization in Distributed Ecosystems , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 11 (2025): Volume 02 Issue 11
- Dr. Eleanor Whitfield, Architecting Secure and Cost-Optimized Iot-Cloud Ecosystems: Integrating AI-Driven Intrusion Detection, Multi-Path Routing, And Intelligent Workload Scheduling in Distributed Systems , International Journal of Modern Computer Science and IT Innovations: Vol. 3 No. 01 (2026): Volume 03 Issue 01
- Priya Kapoor, A Comprehensive Analytical Framework for Zero Trust Architecture: Evolutionary Paradigms, Socio-Technical Adoption, and Integrative Security in Heterogeneous Network Environments , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 09 (2025): Volume 02 Issue 09
- Dr. Lukas Weber, Dr. Anna Schmidt, An Optimized Convolutional Neural Network Architecture for Accurate Skin Lesion Analysis and Intelligent Skin Cancer Prediction System , International Journal of Modern Computer Science and IT Innovations: Vol. 3 No. 05 (2026): Volume 03 Issue 05
- Dr. Alistair Sterling, Architectural Evolution and Decomposition Strategies: A Comprehensive Analysis of Microservice Migration, Performance Optimization, And Machine Learning-Assisted Service Boundary Detection , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 12 (2025): Volume 02 Issue 12
- Serhii Svynarov, AI-Driven Automation in Cloud-Based Business Systems: A Practical Implementation Using Microservices Architecture , International Journal of Modern Computer Science and IT Innovations: Vol. 3 No. 05 (2026): Volume 03 Issue 05
- Prof. Elena Rostova, Dr. Kenji Tanaka, Enhancing Stability in Distributed Signed Networks via Local Node Compensation , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 09 (2025): Volume 02 Issue 09
- Pedro C. Almeida, Prof. Laura B. Heinrich, LOCAL NODE COMPENSATION FOR ENHANCED STABILITY IN DISTRIBUTED SIGNED NETWORKS , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 04 (2025): Volume 02 Issue 04
You may also start an advanced similarity search for this article.