CFP last date
20 December 2024
Reseach Article

A Trusted Misbehaviors Detection Scheme in Delay Tolerant Network

by Sarawagya Singh, P. Prassenna
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 112 - Number 2
Year of Publication: 2015
Authors: Sarawagya Singh, P. Prassenna
10.5120/19640-1226

Sarawagya Singh, P. Prassenna . A Trusted Misbehaviors Detection Scheme in Delay Tolerant Network. International Journal of Computer Applications. 112, 2 ( February 2015), 29-33. DOI=10.5120/19640-1226

@article{ 10.5120/19640-1226,
author = { Sarawagya Singh, P. Prassenna },
title = { A Trusted Misbehaviors Detection Scheme in Delay Tolerant Network },
journal = { International Journal of Computer Applications },
issue_date = { February 2015 },
volume = { 112 },
number = { 2 },
month = { February },
year = { 2015 },
issn = { 0975-8887 },
pages = { 29-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume112/number2/19640-1226/ },
doi = { 10.5120/19640-1226 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:48:23.852461+05:30
%A Sarawagya Singh
%A P. Prassenna
%T A Trusted Misbehaviors Detection Scheme in Delay Tolerant Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 112
%N 2
%P 29-33
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Misbehavior of node represent a serious threat against routing in delay tolerant network. In this paper mainly focus to improve the packet loss during the transmission of packet one to another node and also deal with selfish and malicious node. In this paper introducing a periodically available trusted authority. TA judges any node in the network by collecting the history evidence from upstream and downstream node. TA could punish compensate the node based on its behaviors. Each node must pay deposit amount before it joins the networks, and the deposit will be paid after then node leave if there is no misbehaviors activity of node. In this paper also focus on security between the nodes in DTN. We introduced a secret key is generated, which is used to share the data. The secret key is automatically changed when the node joins a network and leaves a network based on fast randomized algorithm. So we can increase the level of security in delay tolerant network.

References
  1. Q. Li, S. Zhu, and G. Cao, "Routing in Socially Selfish Delay- Tolerant Networks," Proc. IEEE INFOCOM '10, 2010.
  2. SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks Haojin Zhu, Member, IEEE, Xiaodong Lin, Member, IEEE, Rongxing Lu, Student Member, IEEE, Yanfei Fan, and Xuemin (Sherman) Shen, Fellow, IEEE IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 58, NO. 8, OCTOBER 2009
  3. H. Zhu, X. Lin, R. Lu, P. -H. Ho, and X. Shen, "SLAB: Secure Localized Authentication and Billing Scheme for Wireless Mesh Networks," IEEE Trans. Wireless Comm. , vol. 17, no. 10, pp. 3858-3868, Oct. 2008.
  4. Q. Li and G. Cao, "Mitigating Routing Misbehavior in Disruption Tolerant Networks," IEEE Trans. Information Forensics and Security, vol. 7, no. 2, pp. 664-675, Apr. 2012.
  5. S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," Proc. ACM MobiCom '00, 2000.
  6. R. Lu, X. Lin, H. Zhu, and X. Shen, "Pi: A Practical Incentive Protocol for Delay Tolerant Networks," IEEE Trans. Wireless Comm. , vol. 9, no. 4, pp. 1483-1493, Apr. 2010.
  7. F. Li, A. Srinivasan, and J. Wu, "Thwarting Blackhole Attacks in Disruption-Tolerant Networks Using Encounter Tickets," Proc. IEEE INFOCOM '09, 2009.
  8. W. Gao and G. Cao, "User-Centric Data Dissemination in Disruption-Tolerant Networks," Proc. IEEE INFOCOM '11, 2011.
  9. A. Keranen, J. Ott, and T. Karkkainen, "The ONE Simulator for DTN Protocol Evaluation," Proc. Second Int'l Conf. Simulation Tools and Techniques (SIMUTools '09), 2009.
  10. A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks Haojin Zhu, Member, IEEE, Suguo Du, Zhaoyu Gao, Student Member, IEEE, Mianxiong Dong, Member, IEEE, and Zhenfu Cao, Senior Member, IEEE.
  11. http://en. wikipedia. org/wiki/Randomized_algorithm
  12. http://en. wikipedia. org/wiki/Key_(cryptography)
Index Terms

Computer Science
Information Sciences

Keywords

Trusted authority secret key DTN misbehavior