Skip to main content

Security Analysis of Opportunistic Networks Using Complex Network Properties

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 7405))

Abstract

An Opportunistic Network (Oppnet) is an enhanced evolution of Mobile ad hoc network, where at any given time a route between source and destination does not exist, yet messages are routed opportunistically via intermediate contacts. We implemented two types of Oppnet deployments, an Open Oppnet and a Selective Oppnet, and analyzed both deployments by studying three Complex Network Properties, namely Average Shortest Distance, Degree Distribution, and Clustering Coefficients. In order to study the robustness of an Oppnet against network attacks, we examined Wormhole attack. According to the simulation results, severity of a Wormhole depends on the nodes location, trajectory and its neighboring nodes. When a worm tunnel was established between a popular node and an aloof node, it caused a noticeable impact on Average Shortest Distance. While in other cases Oppnet remained robust. We also observed that security in a Selective Oppnet is comparatively better than an Open Oppnet.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aschenbruck, N., Ernst, R., Padella, E.G., Schwamborn, M.: BonnMotion - A Mobility Scenario Generation and Analysis Tool. In: Proc. International ICST Conference on Simulation Tools and Techniques (2010)

    Google Scholar 

  2. Barabasi, A.L., Albert, R.: Emergence of Scaling in Random Networks, Science Magazine. Science 286(5439), 509–512 (1999)

    Article  MathSciNet  Google Scholar 

  3. Burgress, J., Bissias, G., Corner, M., Levine, B.: Surviving Attacks on Disruption-Tolerant Networks without Authentication. In: Proc. ACM MobiHoc (2007)

    Google Scholar 

  4. Buttyan, L., Hubaux, J.P.: Security and Cooperation in Wireless Networks, A Graduate Textbook, Version 1.5.1. Cambridge University Press (July 2007), http://secowinet.epfl.ch/index.php?page=download.html

  5. Campbell, A., Eisenman, S., Lane, N., Miluzzo, E., Peterson, R.: People-Centric Urban Sensing. In: Proc. ACM WICON (2006)

    Google Scholar 

  6. Chen, L.J., Yu, C.H., Sun, T., Chen, Y.C., Chu, H.H.: A Hybrid Routing Approach for Opportunistic Networks. In: Proc. ACM SIGCOMM Workshop on Challenged Networks, pp. 213–220 (September 2006)

    Google Scholar 

  7. Choo, F., Chan, M., Chang, E.C.: Robustness of DTN against Routing Attacks. In: Proc. IEEE COMSNETS, pp. 1 -10 (January 2010)

    Google Scholar 

  8. Conti, M., Kumar, M.: Opportunities in opportunistic Computing. IEEE Computer Society 43(1), 42–50 (2010)

    Article  Google Scholar 

  9. Cornelius, C., Kapadia, A., Kotz, D., Peebles, D., Shin, M., Triandopoulos, N.: AnonySense: Privacy-Aware People-Centric Sensing. In: Proc. ACM MobiSys (June 2008)

    Google Scholar 

  10. Doria, A., Uden, M., Pandey, D.P.: Providing connectivity to the Saami nomadic community. In: Proc. International Conference on Open Collaborative Design for Sustainable Innovation (December 2002)

    Google Scholar 

  11. Hu, Y., Perrig, A., Johnson, D.: Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks. In: Proc. IEEE INFOCOM, vol. 3, pp. 1976–1986 (April 2003)

    Google Scholar 

  12. Huangm, C.M., Lan, K.C., Tsai, C.Z.: A survey of Opportunistic Networks. In: Proc. IEEE Advanced Information Networking and Applications - Workshops, pp. 1672–1677 (March 2008)

    Google Scholar 

  13. Jayakumar, G., Ganapathi, G.: Reference Point Group Mobility and Random Waypoint Models in Performance Evaluation of MANET Routing Protocols. ACM Journal of Computer Systems, Networks, and Communication 2008 (January 2008)

    Google Scholar 

  14. Juang, P., Oki, H., Wang, Y., Martonosi, M., Peh, L.S., Rubesnstein, D.: Energy-Efficient Computing for Wildlife Tracking: Design Tradeoffs and Early Experiences with ZebraNet. In: Proc. ACM ASPLOS-X (2002)

    Google Scholar 

  15. Kapadia, A., Kotz, D., Triandopoulos, N.: Opportunistic Sensing: Security Challenges for the New Paradigm. In: Proc. IEEE COMSNETS, pp. 1–10 (January 2009)

    Google Scholar 

  16. Lilien, L., Kamal, Z.H., Bhuse, V., Gupta, A.: Opportunistic Networks: The Concept and Research Challenges in Privacy and Security. In: Proc. NSF Intl. WSPWN (2006)

    Google Scholar 

  17. Musolesi, M., Hailes, S., Mascolo, C.: Adaptive Routing for Intermittently Connected Mobile Ad Hoc Networks. In: Proc. IEEE WoWMoM Symposium (June 2005)

    Google Scholar 

  18. Pelusi, L., Passarella, A., Conti, M.: Opportunistic Networking: Data Forwarding in Disconnected Mobile Ad Hoc Networks. IEEE Communication Magazine 44(11), 134–141 (2006)

    Article  Google Scholar 

  19. Petland, A., Fletcher, R., Hasson, A.: DakNet: Rethinking Connectivity in Developing Nations. IEEE Computer Society 37(1), 78–83 (2004)

    Article  Google Scholar 

  20. Shikfa, A.: Security Challenges in Opportunistic Communication. In: Proc. IEEE GCC, pp. 425–428 (February 2011)

    Google Scholar 

  21. C. H. Vu, A. Soneye, An Analysis of Collaborative Attacks on Mobile Ad hoc Networks, Masters Thesis MCS-2009:4 (June 2009), http://btu.se/fou/cuppsats.nsf/all/ab24607cbd4e770ac12575d300368841/file/Final_Thesis_Report_hovu07_adso07.pdf

  22. Wang, X.F., Chen, G.: Small World, Scale-Free and Beyond. IEEE Circuits and Systems Magazine 3(1), 6–20 (2003)

    Article  Google Scholar 

  23. Watts, D.J., Stogatz, S.H.: Collective dynamics of small-world networks. Nature International Weekly Journal of Science, Nature 393, 440–442 (1998)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mohan, S., Qu, G., Mili, F. (2012). Security Analysis of Opportunistic Networks Using Complex Network Properties. In: Wang, X., Zheng, R., Jing, T., Xing, K. (eds) Wireless Algorithms, Systems, and Applications. WASA 2012. Lecture Notes in Computer Science, vol 7405. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31869-6_40

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31869-6_40

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31868-9

  • Online ISBN: 978-3-642-31869-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics