Articles | Open Access |

Securing Delay-Tolerant Networks: A Framework for Anomaly Detection Using Geospatial-Temporal Analysis

Dr. Alistair Finch , Department of Network Engineering, Institute for Resilient Systems, Munich, Germany
Prof. Kenji Tanaka , Faculty of Mobile and Pervasive Computing, University of Northern Kyoto, Kyoto, Japan

Abstract

Background: Delay-Tolerant Networks (DTNs) are engineered to function in environments with intermittent connectivity, making them vital for applications ranging from wildlife tracking to disaster response. However, their defining store-carry-forward nature exposes them to unique security vulnerabilities, such as black hole and gray hole attacks, which are difficult to counter with traditional security protocols. Existing DTN routing mechanisms, while efficient in message delivery, often lack robust, integrated security layers, creating a critical need for novel defense strategies.

Methods: This paper introduces and evaluates a Geospatial Anomaly Detection (GAD) framework designed to enhance security in DTNs. Using The ONE (Opportunistic Network Environment) simulator, we modeled node mobility based on real-world map data from OpenStreetMap. We implemented the GAD framework on top of the MaxProp routing protocol [2]. The framework establishes normal behavior profiles by analyzing nodes' historical geospatial-temporal data. Anomalies are flagged when a node's movement significantly deviates from its established patterns, indicating a potential compromise or malicious intent. We evaluated the framework's effectiveness against a simulated black hole attack.

Results: The simulations demonstrate that the GAD framework is highly effective. It successfully identified over 94% of malicious nodes (True Positive Rate) while maintaining a False Positive Rate below 5%. Crucially, this security enhancement introduced minimal network overhead, with a negligible impact on key performance metrics such as packet delivery ratio and latency when compared to the baseline MaxProp protocol operating in a non-hostile environment.

Conclusion: The findings confirm that leveraging geospatial data for anomaly detection is a viable and potent strategy for securing DTNs. The proposed GAD framework offers a practical and resource-efficient security layer that can be integrated with existing routing protocols. This approach represents a significant step toward building more resilient and trustworthy communication systems for challenged network environments.

Keywords

Delay-Tolerant Networks (DTNs), Network Security, Anomaly Detection

References

Balasubramanian, A., Levine, B., & Venkataramani, A. (2007, August). DTN routing as a resource allocation problem. In Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications (pp. 373-384).

Burgess, J., Gallagher, B., Jensen, D. D., & Levine, B. N. (2006, April). MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks. Infocom, 6.

Chaintreau, A., Hui, P., Crowcroft, J., Diot, C., Gass, R., & Scott, J. (2007). Impact of human mobility on opportunistic forwarding algorithms. IEEE Transactions on Mobile Computing, 6(6), 606-620.

Fall, K. (2003, August). A delay-tolerant network architecture for challenged internets. In Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications (pp. 27-34).

Henriksson, D., Abdelzaher, T. F., & Ganti, R. K. (2007, August). A caching-based approach to routing in delay-tolerant networks. In 2007 16th International Conference on Computer Communications and Networks (pp. 69-74). IEEE.

Jain, S., Fall, K., & Patra, R. (2004, August). Routing in a delay tolerant network. In Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications (pp. 145-158).

Johnson, D. B., & Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks. In Mobile computing (pp. 153-181). Springer, Boston, MA.

Juang, P., Oki, H., Wang, Y., Martonosi, M., Peh, L. S., & Rubenstein, D. (2002, October). Energy-efficient computing for wildlife tracking: Design tradeoffs and early experiences with ZebraNet. In Proceedings of the 10th international conference on Architectural support for programming languages and operating systems (pp. 96-107).

Keranen, A. (2008). Opportunistic network environment simulator. Special Assignment report, Helsinki University of Technology, Department of Communications and Networking.

Keranen, A., Ott, J., & Kärkkäinen, T. (2009, March). The ONE simulator for DTN protocol evaluation. In Proceedings of the 2nd international conference on simulation tools and techniques (pp. 1-10).

Lindgren, A., Doria, A., & Schelén, O. (2003). Probabilistic routing in intermittently connected networks. ACM SIGMOBILE mobile computing and communications review, 7(3), 19-20.

Ling, C., Hwang, W., & Salvendy, G. (2007). A survey of what customers want in a cell phone design. Behaviour & Information Technology, 26(2), 149-163.

Mayer, C. P. (2010). osm2wkt-OpenStreetMap to WKT Conversion. mayer2010osm, from OpenStreetMaps-ONE.

Perkins, C. E., & Royer, E. M. (1999, February). Ad-hoc on-demand distance vector routing. In Proceedings WMCSA’99. Second IEEE Workshop on Mobile Computing Systems and Applications (pp. 90-100). IEEE.

Sallee, P. (2003, October). Model-based steganography. In International workshop on digital watermarking (pp. 154-167). Springer, Berlin, Heidelberg.

Article Statistics

Downloads

Download data is not yet available.

Copyright License

Download Citations

How to Cite

Dr. Alistair Finch, & Prof. Kenji Tanaka. (2025). Securing Delay-Tolerant Networks: A Framework for Anomaly Detection Using Geospatial-Temporal Analysis. International Journal of Computer Science & Information System, 10(09), 1–15. Retrieved from https://scientiamreearch.org/index.php/ijcsis/article/view/170