SlideShare a Scribd company logo
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
A PROBABILISTIC MISBEHAVIOR DETECTION SCHEME TOWARDS EFFICIENT
TRUST ESTABLISHMENT IN DELAY-TOLERANT NETWORKS
ABSTRACT:
Malicious and selfish behaviors represent a serious threat against routing in
Delay/Disruption Tolerant Networks (DTNs). Due to the unique network characteristics,
designing a misbehavior detection scheme in DTN is regarded as a great challenge. In this paper,
we propose iTrust, a probabilistic misbehavior detection scheme, for secure DTN routing
towards efficient trust establishment. The basic idea of iTrust is introducing a periodically
available Trusted Authority (TA) to judge the node’s behavior based on the collected routing
evidences and probabilistically checking. We model iTrust as the Inspection Game and use game
theoretical analysis to demonstrate that, by setting an appropriate investigation probability, TA
could ensure the security of DTN routing at a reduced cost. To further improve the efficiency of
the proposed scheme, we correlate detection probability with a node’s reputation, which allows a
dynamic detection probability determined by the trust of the users. The extensive analysis and
simulation results show that the proposed scheme substantiates the effectiveness and efficiency
of the proposed scheme.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
EXISTING SYSTEM:
In DTNs, a node could misbehave by dropping packets intentionally even when it has the
capability to forward the data (e.g., sufficient buffers and meeting opportunities). Routing
misbehavior can be caused by selfish (or rational) nodes that try to maximize their own benefits
by enjoying the services provided by DTN while refusing to forward the bundles for others, or
malicious nodes that drop packets or modifying the packets to launch attacks.
Recently, there are quite a few proposals for misbehaviors detection in DTNs, most of which are
based on forwarding history verification (e.g., multi-layered credit, three-hop feedback
mechanism, or encounter ticket), which are costly in terms of transmission overhead and
verification cost. The security overhead incurred by forwarding history checking is critical for a
DTN since expensive security operations will be translated into more energy consumptions,
which represents a fundamental challenge in resource constrained DTN.
DISADVANTAGES OF EXISTING SYSTEM:
 Malicious and selfish behaviors represent a serious threat against routing in
Delay/Disruption Tolerant Networks (DTNs).
 Due to the unique network characteristics, designing a misbehavior detection scheme in
DTN is regarded as a great challenge.
 Even though the existing misbehavior detection schemes work well for the traditional
wireless networks, the unique network characteristics including lack of contemporaneous
path, high variation in network conditions, difficulty to predict mobility patterns, and
long feedback delay, have made the neighborhood monitoring based misbehavior
detection scheme unsuitable for DTNs
PROPOSED SYSTEM:
 In this paper, we propose iTrust, a probabilistic misbehavior detection scheme, for secure
DTN routing towards efficient trust establishment.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
 The basic idea of iTrust is introducing a periodically available Trusted Authority (TA) to
judge the node’s behavior based on the collected routing evidences and probabilistically
checking.
ADVANTAGES OF PROPOSED SYSTEM:
 Reduce the detection overhead effectively.
 Improved Security.
 Improved Efficiency.
 Will reduce transmission overhead incurred by misbehavior detection and detect the
malicious nodes effectively.
SYSTEM ARCHITECTURE:
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
MODULES:
 System Model
 Routing Model
 Threat Model
 Itrust Scheme
MODULES DESCRIPTION:
System Model
In this paper, we adopt the system model where we consider a normal DTN consisted of mobile
devices owned by individual users. Each node i is assumed to have a unique ID Ni and a
corresponding public/private key pair. We assume that each node must pay a deposit C before it
joins the network, and the deposit will be paid back after the node leaves if there is no
misbehavior activity of the node. We assume that a periodically available TA exists so that it
could take the responsibility of misbehavior detection in DTN. For a specific detection target Ni,
TA will request Ni’s forwarding history in the global network. Therefore, each node will submit
its collected Ni’s forwarding history to TA via two possible approaches. In some hybrid DTN
network environment, the transmission between TA and each node could be also performed in a
direct transmission manner (e.g., WIMAX or cellular networks). We argue that since the
misbehavior detection is performed periodically, the message transmission could be performed in
a batch model, which could further reduce the transmission overhead.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
Routing Model
We adopt the single-copy routing mechanism such as First Contact routing protocol, and we
assume the communication range of a mobile node is finite. Thus a data sender out of destination
node’s communication range can only transmit packetized data via a sequence of intermediate
nodes in a multi-hop manner. Our misbehaving detection scheme can be applied to delegation
based routing protocols or multi-copy based routing ones, such as Maypop and Prophet. We
assume that the network is loosely synchronized (i.e., any two nodes should be in the same time
slot at any time).
Threat Model
First of all, we assume that each node in the networks is rational and a rational node’s goal is to
maximize its own profit. In this work, we mainly consider two kinds of DTN nodes: selfish
nodes and malicious nodes. Due to the selfish nature and energy consuming, selfish nodes are
not willing to forward bundles for others without sufficient reward. As an adversary, the
malicious nodes arbitrarily drop others’ bundles (black hole or keyhole attack), which often take
place beyond others’ observation in a sparse DTN, leading to serious performance degradation.
Note that any of the selfish actions above can be further complicated by the collusion of two or
more nodes.
I trust Scheme
In this section, we will present a novel basic iTrust scheme for misbehavior detection scheme in
DTNs. The basic iTrust has two phases, including Routing Evidence Generation Phase and
Routing Evidence Auditing Phase. In the evidence generation phase, the nodes will generate
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
contact and data forwarding evidence for each contact or data forwarding. In the subsequent
auditing phase, TA will distinguish the normal nodes from the misbehaving nodes.
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
• System : Pentium IV 2.4 GHz.
• Hard Disk : 40 GB.
• Floppy Drive : 1.44 Mb.
• Monitor : 15 VGA Colour.
• Mouse : Logitech.
• Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
• Operating system : - Windows XP.
• Coding Language : C#.Net.
• Data Base : SQL Server 2005
REFERENCE:
Haojin Zhu, Member, IEEE, Suguo Du, Zhaoyu Gao, Student Member, IEEE, Mianxiong Dong,
Member, IEEE, and Zhenfu Cao, Senior Member, IEEE, “A Probabilistic Misbehavior Detection
Scheme towards Efficient Trust Establishment in Delay-tolerant Networks”, IEEE
TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014.

More Related Content

DOCX
Privacy preserving and truthful detection of packet dropping attacks in wirel...
PPTX
Use of social network in detecting financial frauds
PDF
Irrational node detection in multihop cellular
PDF
Irrational node detection in multihop cellular networks using accounting center
PDF
F0352033038
PDF
USING LATTICE TO DYNAMICALLY PREVENT INFORMATION LEAKAGE FOR WEB SERVICES
PDF
Combiningefficiencyfidelityandflexibilityin 150511053028-lva1-app6892
DOCX
Cloudarmor supporting reputation based trust management for cloud services
Privacy preserving and truthful detection of packet dropping attacks in wirel...
Use of social network in detecting financial frauds
Irrational node detection in multihop cellular
Irrational node detection in multihop cellular networks using accounting center
F0352033038
USING LATTICE TO DYNAMICALLY PREVENT INFORMATION LEAKAGE FOR WEB SERVICES
Combiningefficiencyfidelityandflexibilityin 150511053028-lva1-app6892
Cloudarmor supporting reputation based trust management for cloud services

Viewers also liked (10)

DOCX
Passive ip traceback disclosing the locations of ip spoofers from path backsc
PDF
SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION
DOCX
A scalable and reliable matching service for
DOCX
A framework for secure computations with two
PDF
Privacypreservingdelegatedaccesscontrolinpublicclouds
PDF
Cost minimizing dynamic migration of content
DOCX
Cost aware secure routing (caser) protocol design for wireless sensor networks
PDF
Secure data sharing in cloud computing using revocable storage identity-based...
DOCX
SELCSP: A FRAMEWORK TO FACILITATE SELECTION OF CLOUD SERVICE PROVIDERS
PDF
Continuous answering-holistic-queries-over sensor networks
Passive ip traceback disclosing the locations of ip spoofers from path backsc
SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION
A scalable and reliable matching service for
A framework for secure computations with two
Privacypreservingdelegatedaccesscontrolinpublicclouds
Cost minimizing dynamic migration of content
Cost aware secure routing (caser) protocol design for wireless sensor networks
Secure data sharing in cloud computing using revocable storage identity-based...
SELCSP: A FRAMEWORK TO FACILITATE SELECTION OF CLOUD SERVICE PROVIDERS
Continuous answering-holistic-queries-over sensor networks
Ad

Similar to A probabilistic misbehavior detection scheme towards efficient trust establishment in delay tolerant networks (20)

DOCX
a probabilistic misbehavior detection scheme toward efficient trust establish...
DOCX
JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
DOCX
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...
DOCX
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
DOCX
A probabilistic misbehavior detection scheme towards efficient trust establis...
PPT
saasgdggagf ibsFC ba;D;jBBISifBIBiucbiBIF
PDF
Iaetsd an efficient and accurate misbehavior detection
PPT
PPT.ppt
PDF
Trust Providence in Delay Tolerant Networks
PPT
PPT.pptsdhdhdhdhdshfdgsdgdshbdfhdfdhdfhbdbd
PDF
Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...
PDF
Ijciet 08 02_002
PDF
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
PDF
Misconduct disclosure of the intermediates using the trusted authority
PDF
An Efficient Secured And Inspection of Malicious Node Using Double Encryption...
PDF
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
PPTX
Dynamic trust management for delay tolerant networks and its application to s...
PPTX
Behavioral malware detection in delay tolerant network
PPTX
Cryptography based misbehavior detection for opportunistic network
a probabilistic misbehavior detection scheme toward efficient trust establish...
JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
A probabilistic misbehavior detection scheme towards efficient trust establis...
saasgdggagf ibsFC ba;D;jBBISifBIBiucbiBIF
Iaetsd an efficient and accurate misbehavior detection
PPT.ppt
Trust Providence in Delay Tolerant Networks
PPT.pptsdhdhdhdhdshfdgsdgdshbdfhdfdhdfhbdbd
Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...
Ijciet 08 02_002
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
Misconduct disclosure of the intermediates using the trusted authority
An Efficient Secured And Inspection of Malicious Node Using Double Encryption...
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
Dynamic trust management for delay tolerant networks and its application to s...
Behavioral malware detection in delay tolerant network
Cryptography based misbehavior detection for opportunistic network
Ad

More from Shakas Technologies (20)

DOCX
A Review on Deep-Learning-Based Cyberbullying Detection
DOCX
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
DOCX
A Novel Framework for Credit Card.
DOCX
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
DOCX
NS2 Final Year Project Titles 2023- 2024
DOCX
MATLAB Final Year IEEE Project Titles 2023-2024
DOCX
Latest Python IEEE Project Titles 2023-2024
DOCX
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
DOCX
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
DOCX
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
DOCX
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
DOCX
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
DOCX
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
DOCX
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
DOCX
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
DOCX
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
DOCX
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
DOCX
Fighting Money Laundering With Statistics and Machine Learning.docx
DOCX
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
DOCX
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
A Review on Deep-Learning-Based Cyberbullying Detection
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Novel Framework for Credit Card.
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
NS2 Final Year Project Titles 2023- 2024
MATLAB Final Year IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Fighting Money Laundering With Statistics and Machine Learning.docx
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...

Recently uploaded (20)

PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Approach and Philosophy of On baking technology
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Big Data Technologies - Introduction.pptx
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
1. Introduction to Computer Programming.pptx
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Encapsulation theory and applications.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
“AI and Expert System Decision Support & Business Intelligence Systems”
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Assigned Numbers - 2025 - Bluetooth® Document
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Approach and Philosophy of On baking technology
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Group 1 Presentation -Planning and Decision Making .pptx
Network Security Unit 5.pdf for BCA BBA.
MIND Revenue Release Quarter 2 2025 Press Release
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Big Data Technologies - Introduction.pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
1. Introduction to Computer Programming.pptx
SOPHOS-XG Firewall Administrator PPT.pptx
A comparative analysis of optical character recognition models for extracting...
NewMind AI Weekly Chronicles - August'25-Week II
Diabetes mellitus diagnosis method based random forest with bat algorithm
Encapsulation theory and applications.pdf

A probabilistic misbehavior detection scheme towards efficient trust establishment in delay tolerant networks

  • 1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com A PROBABILISTIC MISBEHAVIOR DETECTION SCHEME TOWARDS EFFICIENT TRUST ESTABLISHMENT IN DELAY-TOLERANT NETWORKS ABSTRACT: Malicious and selfish behaviors represent a serious threat against routing in Delay/Disruption Tolerant Networks (DTNs). Due to the unique network characteristics, designing a misbehavior detection scheme in DTN is regarded as a great challenge. In this paper, we propose iTrust, a probabilistic misbehavior detection scheme, for secure DTN routing towards efficient trust establishment. The basic idea of iTrust is introducing a periodically available Trusted Authority (TA) to judge the node’s behavior based on the collected routing evidences and probabilistically checking. We model iTrust as the Inspection Game and use game theoretical analysis to demonstrate that, by setting an appropriate investigation probability, TA could ensure the security of DTN routing at a reduced cost. To further improve the efficiency of the proposed scheme, we correlate detection probability with a node’s reputation, which allows a dynamic detection probability determined by the trust of the users. The extensive analysis and simulation results show that the proposed scheme substantiates the effectiveness and efficiency of the proposed scheme.
  • 2. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com EXISTING SYSTEM: In DTNs, a node could misbehave by dropping packets intentionally even when it has the capability to forward the data (e.g., sufficient buffers and meeting opportunities). Routing misbehavior can be caused by selfish (or rational) nodes that try to maximize their own benefits by enjoying the services provided by DTN while refusing to forward the bundles for others, or malicious nodes that drop packets or modifying the packets to launch attacks. Recently, there are quite a few proposals for misbehaviors detection in DTNs, most of which are based on forwarding history verification (e.g., multi-layered credit, three-hop feedback mechanism, or encounter ticket), which are costly in terms of transmission overhead and verification cost. The security overhead incurred by forwarding history checking is critical for a DTN since expensive security operations will be translated into more energy consumptions, which represents a fundamental challenge in resource constrained DTN. DISADVANTAGES OF EXISTING SYSTEM:  Malicious and selfish behaviors represent a serious threat against routing in Delay/Disruption Tolerant Networks (DTNs).  Due to the unique network characteristics, designing a misbehavior detection scheme in DTN is regarded as a great challenge.  Even though the existing misbehavior detection schemes work well for the traditional wireless networks, the unique network characteristics including lack of contemporaneous path, high variation in network conditions, difficulty to predict mobility patterns, and long feedback delay, have made the neighborhood monitoring based misbehavior detection scheme unsuitable for DTNs PROPOSED SYSTEM:  In this paper, we propose iTrust, a probabilistic misbehavior detection scheme, for secure DTN routing towards efficient trust establishment.
  • 3. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com  The basic idea of iTrust is introducing a periodically available Trusted Authority (TA) to judge the node’s behavior based on the collected routing evidences and probabilistically checking. ADVANTAGES OF PROPOSED SYSTEM:  Reduce the detection overhead effectively.  Improved Security.  Improved Efficiency.  Will reduce transmission overhead incurred by misbehavior detection and detect the malicious nodes effectively. SYSTEM ARCHITECTURE:
  • 4. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com MODULES:  System Model  Routing Model  Threat Model  Itrust Scheme MODULES DESCRIPTION: System Model In this paper, we adopt the system model where we consider a normal DTN consisted of mobile devices owned by individual users. Each node i is assumed to have a unique ID Ni and a corresponding public/private key pair. We assume that each node must pay a deposit C before it joins the network, and the deposit will be paid back after the node leaves if there is no misbehavior activity of the node. We assume that a periodically available TA exists so that it could take the responsibility of misbehavior detection in DTN. For a specific detection target Ni, TA will request Ni’s forwarding history in the global network. Therefore, each node will submit its collected Ni’s forwarding history to TA via two possible approaches. In some hybrid DTN network environment, the transmission between TA and each node could be also performed in a direct transmission manner (e.g., WIMAX or cellular networks). We argue that since the misbehavior detection is performed periodically, the message transmission could be performed in a batch model, which could further reduce the transmission overhead.
  • 5. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com Routing Model We adopt the single-copy routing mechanism such as First Contact routing protocol, and we assume the communication range of a mobile node is finite. Thus a data sender out of destination node’s communication range can only transmit packetized data via a sequence of intermediate nodes in a multi-hop manner. Our misbehaving detection scheme can be applied to delegation based routing protocols or multi-copy based routing ones, such as Maypop and Prophet. We assume that the network is loosely synchronized (i.e., any two nodes should be in the same time slot at any time). Threat Model First of all, we assume that each node in the networks is rational and a rational node’s goal is to maximize its own profit. In this work, we mainly consider two kinds of DTN nodes: selfish nodes and malicious nodes. Due to the selfish nature and energy consuming, selfish nodes are not willing to forward bundles for others without sufficient reward. As an adversary, the malicious nodes arbitrarily drop others’ bundles (black hole or keyhole attack), which often take place beyond others’ observation in a sparse DTN, leading to serious performance degradation. Note that any of the selfish actions above can be further complicated by the collusion of two or more nodes. I trust Scheme In this section, we will present a novel basic iTrust scheme for misbehavior detection scheme in DTNs. The basic iTrust has two phases, including Routing Evidence Generation Phase and Routing Evidence Auditing Phase. In the evidence generation phase, the nodes will generate
  • 6. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com contact and data forwarding evidence for each contact or data forwarding. In the subsequent auditing phase, TA will distinguish the normal nodes from the misbehaving nodes. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS: • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 15 VGA Colour. • Mouse : Logitech. • Ram : 512 Mb. SOFTWARE REQUIREMENTS: • Operating system : - Windows XP. • Coding Language : C#.Net. • Data Base : SQL Server 2005 REFERENCE: Haojin Zhu, Member, IEEE, Suguo Du, Zhaoyu Gao, Student Member, IEEE, Mianxiong Dong, Member, IEEE, and Zhenfu Cao, Senior Member, IEEE, “A Probabilistic Misbehavior Detection Scheme towards Efficient Trust Establishment in Delay-tolerant Networks”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014.