SlideShare a Scribd company logo
DETECTION OF MISBEHAVIOR IN
DELAY TOLERANT NETWORK USING
TRUST AUTHORITY
Abstract
Malicious and selfish behaviors represent a serious
threat against routing in delay/disruption tolerant networks
((DTNs). Due to the selfish nature and energy consuming,
selfish nodes are not willing to forward packets for others
without sufficient reward. Due to the malicious nature,
malicious nodes that drop packets or modifying the packets
to launch attacks (black hole or gray hole attack). In this
project, iTrust, a probabilistic misbehavior detection
scheme, for secure DTN routing toward efficient trust
establishment. In our model iTrust as the inspection game
and use game theoretical analysis, by setting an appropriate
probability. Correlate detection probability with a node’s
reputation, which allows a dynamic detection probability
determined by the trust of the users.
Existing System
 In existing system, incentive protocol, called Pi.
 Pi protocol can also thwart various attacks, which could be
launched by selfish DTN nodes.
 It doesn’t set a routing path in advance, but only need to
attach some incentive on the bundle.
 In the reward model, to achieve fairness.
Disadvantages
 Fails in privacy protection.
 High computation.
 Transmission overhead and verification cost is high.
 High variation in network condition.
Proposed System
 Misbehaviors Detection in most of which are based on
forwarding history verification.
 An efficient and adaptive misbehavior detection and
reputation management scheme is highly desirable in DTN
 TA, which could launch the probabilistic detection for the
target node and judge it by collecting the forwarding
history evidence from its upstream and downstream nodes.
 TA could punish or compensate the node based on its
behaviors.
Advantages
 Detect the malicious nodes effectively.
 More secure.
 Reduce computation cost.
 Reduce transmission overhead incurred by misbehavior
detection.
THANK YOU

More Related Content

PPT
saasgdggagf ibsFC ba;D;jBBISifBIBiucbiBIF
John Ajish
 
DOCX
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
DOCX
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...
IEEEMEMTECHSTUDENTPROJECTS
 
DOCX
JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
chennaijp
 
DOCX
a probabilistic misbehavior detection scheme toward efficient trust establish...
swathi78
 
DOCX
A probabilistic misbehavior detection scheme towards efficient trust establis...
JPINFOTECH JAYAPRAKASH
 
PPT
PPT.pptsdhdhdhdhdshfdgsdgdshbdfhdfdhdfhbdbd
bienaaccriteria1
 
PDF
Trust Providence in Delay Tolerant Networks
theijes
 
saasgdggagf ibsFC ba;D;jBBISifBIBiucbiBIF
John Ajish
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...
IEEEMEMTECHSTUDENTPROJECTS
 
JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
chennaijp
 
a probabilistic misbehavior detection scheme toward efficient trust establish...
swathi78
 
A probabilistic misbehavior detection scheme towards efficient trust establis...
JPINFOTECH JAYAPRAKASH
 
PPT.pptsdhdhdhdhdshfdgsdgdshbdfhdfdhdfhbdbd
bienaaccriteria1
 
Trust Providence in Delay Tolerant Networks
theijes
 

Similar to PPT.ppt (20)

PDF
A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...
IJNSA Journal
 
PDF
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
IDES Editor
 
PPTX
Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...
Kishan Patel
 
PDF
Modelling of A Trust and Reputation Model in Wireless Networks
ijeei-iaes
 
PDF
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
CSCJournals
 
PDF
Iaetsd an efficient and accurate misbehavior detection
Iaetsd Iaetsd
 
PDF
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
IRJET Journal
 
PDF
Review on Intrusion Detection in MANETs
ijtsrd
 
PDF
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
IJLT EMAS
 
PDF
Optimized Intrusion Detection System using Deep Learning Algorithm
ijtsrd
 
PDF
A survey of Network Intrusion Detection using soft computing Technique
ijsrd.com
 
PDF
An improvement to trust based cross layer security protocol against sybil att...
Alexander Decker
 
PDF
A lightweight secure scheme for detecting provenance forgery and packet drop ...
Pvrtechnologies Nellore
 
PDF
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...
1crore projects
 
PDF
A comparative study on different trust based routing schemes in manet
ijwmn
 
PDF
L 1000 423
Kirubaburi R
 
PDF
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
IRJET Journal
 
PDF
THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...
ijcisjournal
 
PDF
THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...
ijcisjournal2
 
A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...
IJNSA Journal
 
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
IDES Editor
 
Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...
Kishan Patel
 
Modelling of A Trust and Reputation Model in Wireless Networks
ijeei-iaes
 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
CSCJournals
 
Iaetsd an efficient and accurate misbehavior detection
Iaetsd Iaetsd
 
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
IRJET Journal
 
Review on Intrusion Detection in MANETs
ijtsrd
 
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
IJLT EMAS
 
Optimized Intrusion Detection System using Deep Learning Algorithm
ijtsrd
 
A survey of Network Intrusion Detection using soft computing Technique
ijsrd.com
 
An improvement to trust based cross layer security protocol against sybil att...
Alexander Decker
 
A lightweight secure scheme for detecting provenance forgery and packet drop ...
Pvrtechnologies Nellore
 
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...
1crore projects
 
A comparative study on different trust based routing schemes in manet
ijwmn
 
L 1000 423
Kirubaburi R
 
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
IRJET Journal
 
THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...
ijcisjournal
 
THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...
ijcisjournal2
 

More from John Ajish (20)

PDF
ydchdfjdjgjfkhgchgkhhcghkgkkhkgkgkhkgckhgk
John Ajish
 
PPTX
tturutruruutrrxfjvfjgjgddfjfjdgjfdjfjgjdfgj
John Ajish
 
PPTX
Afasdhdfvjukgkrgdfbdzthgsdhgjjkvdxfhdfhfdh
John Ajish
 
PPT
GJFJFJXFJFJGGJFGJKIKJCGXYGZDFJZDJKGXJNHV
John Ajish
 
PPT
saasgsdgdsgsdgdszvvetfdfdsgAsafgfsdgsgsdg
John Ajish
 
PPTX
WRASASgDGGS DDGBLFAfbJKCfaiGFBKsIgsdJBIGDSKJ
John Ajish
 
PPTX
DOGAODHGOHDODOOanffaHSFOHGHASOGHSOGHGHAOGHOGHAOGG
John Ajish
 
PPTX
FINAL REVIEWADAFASFSAFASFAFSFSGGaGGV HBKJS
John Ajish
 
PPT
ffzvVxvzxvzxvzvzxvvxzvzx xnbdn asxh aabckkz
John Ajish
 
PPTX
PPT.pptx
John Ajish
 
PPTX
PPT.pptx
John Ajish
 
PDF
FINAL PPT.pdf
John Ajish
 
PPTX
PPT.pptx
John Ajish
 
PPTX
PPT.pptx
John Ajish
 
PPTX
PPT.pptx
John Ajish
 
PPTX
PPT.pptx
John Ajish
 
PPTX
PROJECT REVIVE.pptx
John Ajish
 
PPTX
1 REVIEW.pptx
John Ajish
 
PPTX
FINAL REVIEW.pptx
John Ajish
 
PPT
ppt1.ppt
John Ajish
 
ydchdfjdjgjfkhgchgkhhcghkgkkhkgkgkhkgckhgk
John Ajish
 
tturutruruutrrxfjvfjgjgddfjfjdgjfdjfjgjdfgj
John Ajish
 
Afasdhdfvjukgkrgdfbdzthgsdhgjjkvdxfhdfhfdh
John Ajish
 
GJFJFJXFJFJGGJFGJKIKJCGXYGZDFJZDJKGXJNHV
John Ajish
 
saasgsdgdsgsdgdszvvetfdfdsgAsafgfsdgsgsdg
John Ajish
 
WRASASgDGGS DDGBLFAfbJKCfaiGFBKsIgsdJBIGDSKJ
John Ajish
 
DOGAODHGOHDODOOanffaHSFOHGHASOGHSOGHGHAOGHOGHAOGG
John Ajish
 
FINAL REVIEWADAFASFSAFASFAFSFSGGaGGV HBKJS
John Ajish
 
ffzvVxvzxvzxvzvzxvvxzvzx xnbdn asxh aabckkz
John Ajish
 
PPT.pptx
John Ajish
 
PPT.pptx
John Ajish
 
FINAL PPT.pdf
John Ajish
 
PPT.pptx
John Ajish
 
PPT.pptx
John Ajish
 
PPT.pptx
John Ajish
 
PPT.pptx
John Ajish
 
PROJECT REVIVE.pptx
John Ajish
 
1 REVIEW.pptx
John Ajish
 
FINAL REVIEW.pptx
John Ajish
 
ppt1.ppt
John Ajish
 

Recently uploaded (20)

PPTX
Basics and rules of probability with real-life uses
ravatkaran694
 
PDF
Module 2: Public Health History [Tutorial Slides]
JonathanHallett4
 
PPTX
Software Engineering BSC DS UNIT 1 .pptx
Dr. Pallawi Bulakh
 
PPTX
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
 
DOCX
Action Plan_ARAL PROGRAM_ STAND ALONE SHS.docx
Levenmartlacuna1
 
PPTX
HEALTH CARE DELIVERY SYSTEM - UNIT 2 - GNM 3RD YEAR.pptx
Priyanshu Anand
 
PPTX
Measures_of_location_-_Averages_and__percentiles_by_DR SURYA K.pptx
Surya Ganesh
 
PPTX
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
PPTX
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
PPTX
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
PPTX
How to Apply for a Job From Odoo 18 Website
Celine George
 
PPTX
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 
PDF
Virat Kohli- the Pride of Indian cricket
kushpar147
 
PPTX
Artificial Intelligence in Gastroentrology: Advancements and Future Presprec...
AyanHossain
 
PDF
Biological Classification Class 11th NCERT CBSE NEET.pdf
NehaRohtagi1
 
PPTX
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
PPTX
INTESTINALPARASITES OR WORM INFESTATIONS.pptx
PRADEEP ABOTHU
 
PDF
RA 12028_ARAL_Orientation_Day-2-Sessions_v2.pdf
Seven De Los Reyes
 
PDF
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
PPTX
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
Basics and rules of probability with real-life uses
ravatkaran694
 
Module 2: Public Health History [Tutorial Slides]
JonathanHallett4
 
Software Engineering BSC DS UNIT 1 .pptx
Dr. Pallawi Bulakh
 
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
 
Action Plan_ARAL PROGRAM_ STAND ALONE SHS.docx
Levenmartlacuna1
 
HEALTH CARE DELIVERY SYSTEM - UNIT 2 - GNM 3RD YEAR.pptx
Priyanshu Anand
 
Measures_of_location_-_Averages_and__percentiles_by_DR SURYA K.pptx
Surya Ganesh
 
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
How to Apply for a Job From Odoo 18 Website
Celine George
 
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 
Virat Kohli- the Pride of Indian cricket
kushpar147
 
Artificial Intelligence in Gastroentrology: Advancements and Future Presprec...
AyanHossain
 
Biological Classification Class 11th NCERT CBSE NEET.pdf
NehaRohtagi1
 
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
INTESTINALPARASITES OR WORM INFESTATIONS.pptx
PRADEEP ABOTHU
 
RA 12028_ARAL_Orientation_Day-2-Sessions_v2.pdf
Seven De Los Reyes
 
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 

PPT.ppt

  • 1. DETECTION OF MISBEHAVIOR IN DELAY TOLERANT NETWORK USING TRUST AUTHORITY
  • 2. Abstract Malicious and selfish behaviors represent a serious threat against routing in delay/disruption tolerant networks ((DTNs). Due to the selfish nature and energy consuming, selfish nodes are not willing to forward packets for others without sufficient reward. Due to the malicious nature, malicious nodes that drop packets or modifying the packets to launch attacks (black hole or gray hole attack). In this project, iTrust, a probabilistic misbehavior detection scheme, for secure DTN routing toward efficient trust establishment. In our model iTrust as the inspection game and use game theoretical analysis, by setting an appropriate probability. Correlate detection probability with a node’s reputation, which allows a dynamic detection probability determined by the trust of the users.
  • 3. Existing System  In existing system, incentive protocol, called Pi.  Pi protocol can also thwart various attacks, which could be launched by selfish DTN nodes.  It doesn’t set a routing path in advance, but only need to attach some incentive on the bundle.  In the reward model, to achieve fairness.
  • 4. Disadvantages  Fails in privacy protection.  High computation.  Transmission overhead and verification cost is high.  High variation in network condition.
  • 5. Proposed System  Misbehaviors Detection in most of which are based on forwarding history verification.  An efficient and adaptive misbehavior detection and reputation management scheme is highly desirable in DTN  TA, which could launch the probabilistic detection for the target node and judge it by collecting the forwarding history evidence from its upstream and downstream nodes.  TA could punish or compensate the node based on its behaviors.
  • 6. Advantages  Detect the malicious nodes effectively.  More secure.  Reduce computation cost.  Reduce transmission overhead incurred by misbehavior detection.