Black Holes and Revelations: Using Evolutionary Algorithms to Uncover Vulnerabilities in Disruption-Tolerant Networks

被引:3
|
作者
Bucur, Doina [1 ]
Iacca, Giovanni [2 ]
Squillero, Giovanni [3 ]
Tonda, Alberto [4 ]
机构
[1] Univ Groningen, Johann Bernoulli Inst, Nijenborgh 9, NL-9747 AG Groningen, Netherlands
[2] INCAS, Dr Nassaulaan 9, NL-9401 HJ Assen, Netherlands
[3] Politecn Torino, Corso Duca Abruzzi 24, I-10129 Turin, Italy
[4] GMPA, INRA, UMR 782, 1 Ave Lucien Bretignieres, F-78850 Thiverval Grignon, France
来源
APPLICATIONS OF EVOLUTIONARY COMPUTATION, EVOAPPLICATIONS 2015 | 2015年 / 9028卷
关键词
Disruption-tolerant network; Routing; Evolutionary algorithm; ATTACKS;
D O I
10.1007/978-3-319-16549-3_3
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A challenging aspect in open ad hoc networks is their resilience against malicious agents. This is especially true in complex, urban-scale scenarios where numerous moving agents carry mobile devices that create a peer-to-peer network without authentication. A requirement for the proper functioning of such networks is that all the peers act legitimately, forwarding the needed messages, and concurring to the maintenance of the network connectivity. However, few malicious agents may easily exploit the movement patterns in the network to dramatically reduce its performance. We propose a methodology where an evolutionary algorithm evolves the parameters of different malicious agents, determining their types and mobility patterns in order to minimize the data delivery rate and maximize the latency of communication in the network. As a case study, we consider a fine-grained simulation of a large-scale disruption-tolerant network in the city of Venice. By evolving malicious agents, we uncover situations where even a single attacker can hamper the network performance, and we correlate the performance decay to the number of malicious agents.
引用
收藏
页码:29 / 41
页数:13
相关论文
共 27 条
  • [1] MORA routing and capacity building in disruption-tolerant networks
    Bums, Brendan
    Brock, Oliver
    Levine, Brian Neil
    AD HOC NETWORKS, 2008, 6 (04) : 600 - 620
  • [2] Surviving Attacks on Disruption-Tolerant Networks without Authentication
    Burgess, John
    Bissias, George Dean
    Corner, Mark
    Levine, Brian Neil
    MOBIHOC'07: PROCEEDINGS OF THE EIGHTH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING, 2007, : 61 - 70
  • [3] Predict and Relay: An Efficient Routing in Disruption-Tolerant Networks
    Yuan, Quan
    Cardei, Ionut
    Wu, Jie
    MOBIHOC'09 PROCEEDINGS OF THE TENTH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING, 2009, : 95 - 104
  • [4] An Efficient Prediction-Based Routing in Disruption-Tolerant Networks
    Yuan, Quan
    Cardei, Ionut
    Wu, Jie
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (01) : 19 - 31
  • [5] Average Operation Time of Bundle Protocol in Delay/Disruption-Tolerant Networks
    Cao, Lei
    Viswanathan, Ramanarayanan
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2022, 21 (08) : 5801 - 5813
  • [6] Spacial Mobility Prediction Based Routing Scheme in Delay/Disruption-Tolerant Networks
    Zhang, Lichen
    Cai, Zhipeng
    Lu, Junling
    Wang, Xiaoming
    2014 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI 2014), 2014, : 274 - 279
  • [7] Fairness Issue in Message Delivery in Delay- and Disruption-Tolerant Networks for Disaster Areas
    Takahashi, Asato
    Nishiyama, Hiroki
    Kato, Nei
    2013 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2013,
  • [8] Attribute Revocable Attribute-Based Encryption for Decentralized Disruption-Tolerant Military Networks
    Nomura, Kenta
    Mohri, Masami
    Ii, Yoshiaki Si Iiraisi
    Morii, Masakatu
    PROCEEDINGS OF 2015 THIRD INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2015, : 491 - 494
  • [9] An optimized content delivery approach based on demand–supply theory in disruption-tolerant networks
    Samira Esfandiari
    Mohammad Hossein Rezvani
    Telecommunication Systems, 2021, 76 : 265 - 289
  • [10] An optimized message routing approach inspired by the landlord-peasants game in disruption-tolerant networks
    Ghafouri-ghomi, Zahra
    Rezvani, Mohammad Hossein
    AD HOC NETWORKS, 2022, 127