Publication Type : Journal Article
Publisher : Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA
Source : Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), volume: 15, number: 1,2024
Url : https://jowua.com/wp-content/uploads/2024/03/2024.I1.011.pdf
Campus : Coimbatore
School : School of Computing
Year : 2024
Abstract : Opportunistic Mobile Social Networks (OMSN) are prone to data integrity attacks that jeopardize
the integrity of the routing data inside the network. Among the several techniques that cope with
these attacks in OMSN, tree-based approaches have proven to be the most effective due to its ease
of data verification and ensurance in data integrity. This paper evaluates two tree-based data
structures, Merkle tree and Verkle tree in terms of their effectiveness in detecting and preventing
such attacks. The evaluation considers tree-generation time and proof-checking time, and the results
demonstrate that the Verkle tree is a bandwidth-efficient solution and have lower proof-checking
time, with a reduction of 98.33% than Merkle tree. This makes Verkle tree a good choice for
handling data integrity attacks in OMSN. A Verkle tree-based approach, named VADIA, is proposed
to handle data integrity attacks such as packet dropping, packet modification and pollution attack in
OMSN. The proposed approach is implemented in the Opportunistic Network Environment (ONE)
simulator and is shown to be effective in detecting malicious nodes and paths, reducing false
negative rates, and improving accuracy in detecting malicious activities. The results demonstrate a
47%, 84% and 69% improvement in malicious node, malicious path and malicious activity detection
over a period of time. Furthermore, the approach achieves an 80% reduction in false negative rates.
Cite this Research Publication : Lakshmi, Vimitha R. Vidhya, and T. Gireesh Kumar. "VADIA-Verkle Tree-based Approach for Dealing Data Integrity Attacks in Opportunistic Mobile Social Networks."Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), volume: 15, number: 1,2024