Prof. Isabella Rossi
1
,
Dr. Luis Fernando PΓ‘ez
1
,
4
Laboratory of Network Intelligence and Geospatial Systems, Sapienza University of Rome, Rome, Italy
4
Department of Electrical and Computer Engineering, Universidad de los Andes, BogotΓ‘, Colombia
Abstract
Delay-Tolerant Networks (DTNs) are designed to operate effectively in environments characterized by frequent disconnections, long delays, and intermittent connectivity. While their store-carry-forward paradigm enables communication in challenged environments, it also introduces unique security vulnerabilities, particularly concerning attacks that exploit spatial and temporal patterns of node mobility and contact. This article proposes and explores the feasibility of a geospatial anomaly detection framework to identify and monitor potential attack locations within a specific area of a DTN. By leveraging location information alongside network performance metrics, this approach aims to proactively detect malicious activities, such as black hole attacks or resource exhaustion, confined to geographical regions. The methodology encompasses data collection, feature engineering combining network and spatial data, and the application of anomaly detection algorithms. The hypothetical results suggest that such a system could significantly enhance DTN security by enabling targeted intervention and improving overall network resilience in challenged communication scenarios.
πBalasubramanian, A., Levine, B., & Venkataramani, A. (2007, August). DTN routing as a resource allocation problem. In Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications (pp. 373-384).
πBurgess, J., Gallagher, B., Jensen, D. D., & Levine, B. N. (2006, April). MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks. Infocom, 6.
πChaintreau, A., Hui, P., Crowcroft, J., Diot, C., Gass, R., & Scott, J. (2007). Impact of human mobility on opportunistic forwarding algorithms. IEEE Transactions on Mobile Computing, 6(6), 606-620.
πFall, K. (2003, August). A delay-tolerant network architecture for challenged internets. In Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications (pp. 27-34).
πHenriksson, D., Abdelzaher, T. F., & Ganti, R. K. (2007, August). A caching-based approach to routing in delay-tolerant networks. In 2007 16th International Conference on Computer Communications and Networks (pp. 69-74). IEEE.
πJain, S., Fall, K., & Patra, R. (2004, August). Routing in a delay tolerant network. In Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications (pp. 145-158).
πJohnson, D. B., & Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks. In Mobile computing (pp. 153-181). Springer, Boston, MA.
πJuang, P., Oki, H., Wang, Y., Martonosi, M., Peh, L. S., & Rubenstein, D. (2002, October). Energy-efficient computing for wildlife tracking: Design tradeoffs and early experiences with ZebraNet. In Proceedings of the 10th international conference on Architectural support for programming languages and operating systems (pp. 96-107).
πKeranen, A. (2008). Opportunistic network environment simulator. Special Assignment report, Helsinki University of Technology, Department of Communications and Networking.
πKernen, A., Ott, J., & Krkkinen, T. (2009, March). The ONE simulator for DTN protocol evaluation. In Proceedings of the 2nd international conference on simulation tools and techniques (pp. 1-10).
πLindgren, A., Doria, A., & Scheln, O. (2003). Probabilistic routing in intermittently connected networks. ACM SIGMOBILE mobile computing and communications review, 7(3), 19-20.
πLing, C., Hwang, W., & Salvendy, G. (2007). A survey of what customers want in a cell phone design. Behaviour & Information Technology, 26(2), 149-163.
πMayer, C. P. (2010). osm2wkt-OpenStreetMap to WKT Conversion. mayer2010osm, from OpenStreetMaps-ONE.
πPerkins, C. E., & Royer, E. M. (1999, February). Ad-hoc on-demand distance vector routing. In Proceedings WMCSAβ99. Second IEEE Workshop on Mobile Computing Systems and Applications (pp. 90-100). IEEE.
πSallee, P. (2003, October). Model-based steganography. In International workshop on digital watermarking (pp. 154-167). Springer, Berlin, Heidelberg.
πSpyropoulos, T., Psounis, K., & Raghavendra, C. S. (2005, August). Spray and wait: an efficient routing scheme for intermittently connected mobile networks. In Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking (pp. 252-259).
πTan, S., & Kim, K. (2013, November). Secure Route Discovery for preventing black hole attacks on AODV-based MANETs. In 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (pp. 1159-1164). IEEE.
πVahdat, A., & Becker, D. (2000). Epidemic routing for partially connected ad hoc networks.
πWagner, D., Zlotnikova, R., &Behr, F. J. (2009). XML-BASED AND OTHER GEORELATED ENCODINGS: OVERVIEW OF MAIN EXISTING GEOCODING FORMATS. AGSE, 196.