Abstract
An Opportunistic Network (Oppnet) is an enhanced evolution of Mobile ad hoc network, where at any given time a route between source and destination does not exist, yet messages are routed opportunistically via intermediate contacts. We implemented two types of Oppnet deployments, an Open Oppnet and a Selective Oppnet, and analyzed both deployments by studying three Complex Network Properties, namely Average Shortest Distance, Degree Distribution, and Clustering Coefficients. In order to study the robustness of an Oppnet against network attacks, we examined Wormhole attack. According to the simulation results, severity of a Wormhole depends on the nodes location, trajectory and its neighboring nodes. When a worm tunnel was established between a popular node and an aloof node, it caused a noticeable impact on Average Shortest Distance. While in other cases Oppnet remained robust. We also observed that security in a Selective Oppnet is comparatively better than an Open Oppnet.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Aschenbruck, N., Ernst, R., Padella, E.G., Schwamborn, M.: BonnMotion - A Mobility Scenario Generation and Analysis Tool. In: Proc. International ICST Conference on Simulation Tools and Techniques (2010)
Barabasi, A.L., Albert, R.: Emergence of Scaling in Random Networks, Science Magazine. Science 286(5439), 509–512 (1999)
Burgress, J., Bissias, G., Corner, M., Levine, B.: Surviving Attacks on Disruption-Tolerant Networks without Authentication. In: Proc. ACM MobiHoc (2007)
Buttyan, L., Hubaux, J.P.: Security and Cooperation in Wireless Networks, A Graduate Textbook, Version 1.5.1. Cambridge University Press (July 2007), http://secowinet.epfl.ch/index.php?page=download.html
Campbell, A., Eisenman, S., Lane, N., Miluzzo, E., Peterson, R.: People-Centric Urban Sensing. In: Proc. ACM WICON (2006)
Chen, L.J., Yu, C.H., Sun, T., Chen, Y.C., Chu, H.H.: A Hybrid Routing Approach for Opportunistic Networks. In: Proc. ACM SIGCOMM Workshop on Challenged Networks, pp. 213–220 (September 2006)
Choo, F., Chan, M., Chang, E.C.: Robustness of DTN against Routing Attacks. In: Proc. IEEE COMSNETS, pp. 1 -10 (January 2010)
Conti, M., Kumar, M.: Opportunities in opportunistic Computing. IEEE Computer Society 43(1), 42–50 (2010)
Cornelius, C., Kapadia, A., Kotz, D., Peebles, D., Shin, M., Triandopoulos, N.: AnonySense: Privacy-Aware People-Centric Sensing. In: Proc. ACM MobiSys (June 2008)
Doria, A., Uden, M., Pandey, D.P.: Providing connectivity to the Saami nomadic community. In: Proc. International Conference on Open Collaborative Design for Sustainable Innovation (December 2002)
Hu, Y., Perrig, A., Johnson, D.: Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks. In: Proc. IEEE INFOCOM, vol. 3, pp. 1976–1986 (April 2003)
Huangm, C.M., Lan, K.C., Tsai, C.Z.: A survey of Opportunistic Networks. In: Proc. IEEE Advanced Information Networking and Applications - Workshops, pp. 1672–1677 (March 2008)
Jayakumar, G., Ganapathi, G.: Reference Point Group Mobility and Random Waypoint Models in Performance Evaluation of MANET Routing Protocols. ACM Journal of Computer Systems, Networks, and Communication 2008 (January 2008)
Juang, P., Oki, H., Wang, Y., Martonosi, M., Peh, L.S., Rubesnstein, D.: Energy-Efficient Computing for Wildlife Tracking: Design Tradeoffs and Early Experiences with ZebraNet. In: Proc. ACM ASPLOS-X (2002)
Kapadia, A., Kotz, D., Triandopoulos, N.: Opportunistic Sensing: Security Challenges for the New Paradigm. In: Proc. IEEE COMSNETS, pp. 1–10 (January 2009)
Lilien, L., Kamal, Z.H., Bhuse, V., Gupta, A.: Opportunistic Networks: The Concept and Research Challenges in Privacy and Security. In: Proc. NSF Intl. WSPWN (2006)
Musolesi, M., Hailes, S., Mascolo, C.: Adaptive Routing for Intermittently Connected Mobile Ad Hoc Networks. In: Proc. IEEE WoWMoM Symposium (June 2005)
Pelusi, L., Passarella, A., Conti, M.: Opportunistic Networking: Data Forwarding in Disconnected Mobile Ad Hoc Networks. IEEE Communication Magazine 44(11), 134–141 (2006)
Petland, A., Fletcher, R., Hasson, A.: DakNet: Rethinking Connectivity in Developing Nations. IEEE Computer Society 37(1), 78–83 (2004)
Shikfa, A.: Security Challenges in Opportunistic Communication. In: Proc. IEEE GCC, pp. 425–428 (February 2011)
C. H. Vu, A. Soneye, An Analysis of Collaborative Attacks on Mobile Ad hoc Networks, Masters Thesis MCS-2009:4 (June 2009), http://btu.se/fou/cuppsats.nsf/all/ab24607cbd4e770ac12575d300368841/file/Final_Thesis_Report_hovu07_adso07.pdf
Wang, X.F., Chen, G.: Small World, Scale-Free and Beyond. IEEE Circuits and Systems Magazine 3(1), 6–20 (2003)
Watts, D.J., Stogatz, S.H.: Collective dynamics of small-world networks. Nature International Weekly Journal of Science, Nature 393, 440–442 (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mohan, S., Qu, G., Mili, F. (2012). Security Analysis of Opportunistic Networks Using Complex Network Properties. In: Wang, X., Zheng, R., Jing, T., Xing, K. (eds) Wireless Algorithms, Systems, and Applications. WASA 2012. Lecture Notes in Computer Science, vol 7405. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31869-6_40
Download citation
DOI: https://doi.org/10.1007/978-3-642-31869-6_40
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31868-9
Online ISBN: 978-3-642-31869-6
eBook Packages: Computer ScienceComputer Science (R0)