Black Holes and Revelations: Using Evolutionary Algorithms to Uncover Vulnerabilities in Disruption-Tolerant Networks

被引:3
作者
Bucur, Doina [1 ]
Iacca, Giovanni [2 ]
Squillero, Giovanni [3 ]
Tonda, Alberto [4 ]
机构
[1] Univ Groningen, Johann Bernoulli Inst, Nijenborgh 9, NL-9747 AG Groningen, Netherlands
[2] INCAS, Dr Nassaulaan 9, NL-9401 HJ Assen, Netherlands
[3] Politecn Torino, Corso Duca Abruzzi 24, I-10129 Turin, Italy
[4] GMPA, INRA, UMR 782, 1 Ave Lucien Bretignieres, F-78850 Thiverval Grignon, France
来源
APPLICATIONS OF EVOLUTIONARY COMPUTATION, EVOAPPLICATIONS 2015 | 2015年 / 9028卷
关键词
Disruption-tolerant network; Routing; Evolutionary algorithm; ATTACKS;
D O I
10.1007/978-3-319-16549-3_3
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A challenging aspect in open ad hoc networks is their resilience against malicious agents. This is especially true in complex, urban-scale scenarios where numerous moving agents carry mobile devices that create a peer-to-peer network without authentication. A requirement for the proper functioning of such networks is that all the peers act legitimately, forwarding the needed messages, and concurring to the maintenance of the network connectivity. However, few malicious agents may easily exploit the movement patterns in the network to dramatically reduce its performance. We propose a methodology where an evolutionary algorithm evolves the parameters of different malicious agents, determining their types and mobility patterns in order to minimize the data delivery rate and maximize the latency of communication in the network. As a case study, we consider a fine-grained simulation of a large-scale disruption-tolerant network in the city of Venice. By evolving malicious agents, we uncover situations where even a single attacker can hamper the network performance, and we correlate the performance decay to the number of malicious agents.
引用
收藏
页码:29 / 41
页数:13
相关论文
共 11 条
[1]  
[Anonymous], 2009, P 2 INT C SIM TOOLS
[2]  
Borrel Vincent., 2007, CHANTS 07, P11
[3]   The Tradeoffs between Data Delivery Ratio and Energy Costs in Wireless Sensor Networks: A Multi-Objective Evolutionary Framework for Protocol Analysis [J].
Bucur, Doina ;
Iacca, Giovanni ;
Squillero, Giovanni ;
Tonda, Alberto .
GECCO'14: PROCEEDINGS OF THE 2014 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE, 2014, :1071-1078
[4]   The impact of topology on energy consumption for collection tree protocols: An experimental assessment through evolutionary computation [J].
Bucur, Doina ;
Iacca, Giovanni ;
Squillero, Giovanni ;
Tonda, Alberto .
APPLIED SOFT COMPUTING, 2014, 16 :210-222
[5]   MaxProp: Routing for vehicle-based disruption-tolerant networks [J].
Burgess, John ;
Gallagher, Brian ;
Jensen, David ;
Levine, Brian Neil .
25TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-7, PROCEEDINGS IEEE INFOCOM 2006, 2006, :1688-1698
[6]  
Burgess J, 2007, MOBIHOC'07: PROCEEDINGS OF THE EIGHTH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING, P61
[7]   Routing in a delay tolerant network [J].
Jain, S ;
Fall, K ;
Patra, R .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2004, 34 (04) :145-157
[8]  
Jenkins A, 2010, AEROSP CONF PROC
[9]   Thwarting Blackhole Attacks in Distruption-Tolerant Networks using Encounter Tickets [J].
Li, Feng ;
Wu, Jie ;
Srinivasan, Avinash .
IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, :2428-+
[10]   To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks [J].
Li, Qinghua ;
Gao, Wei ;
Zhu, Sencun ;
Cao, Guohong .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2013, 10 (03) :168-182