SlideShare a Scribd company logo
A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in 
Delay-Tolerant Networks 
A Probabilistic Misbehavior Detection Scheme toward Efficient Trust 
Establishment in Delay-Tolerant Networks 
Contact: 9703109334, 9533694296 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in 
ABSTRACT 
Malicious and selfish behaviors represent a serious threat against routing in Delay/Disruption 
Tolerant Networks (DTNs). Due to the unique network characteristics, designing a misbehavior 
detection scheme in DTN is regarded as a great challenge. In this paper, we propose iTrust, a 
probabilistic misbehavior detection scheme, for secure DTN routing towards efficient trust 
establishment. The basic idea of iTrust is introducing a periodically available Trusted Authority 
(TA) to judge the node’s behavior based on the collected routing evidences and probabilistically 
checking. We model iTrust as the Inspection Game and use game theoretical analysis to 
demonstrate that, by setting an appropriate investigation probability, TA could ensure the 
security of DTN routing at a reduced cost. To further improve the efficiency of the proposed 
scheme, we correlate detection probability with a node’s reputation, which allows a dynamic 
detection probability determined by the trust of the users. The extensive analysis and simulation 
results show that the proposed scheme substantiates the effectiveness and efficiency of the 
proposed scheme. 
EXISTING SYSTEM: 
In DTNs, a node could misbehave by dropping packets intentionally even when it has the 
capability to forward the data (e.g., sufficient buffers and meeting opportunities). Routing 
misbehavior can be caused by selfish (or rational) nodes that try to maximize their own benefits 
by enjoying the services provided by DTN while refusing to forward the bundles for others, or 
malicious nodes that drop packets or modifying the packets to launch attacks. 
Recently, there are quite a few proposals for misbehaviors detection in DTNs, most of which are 
based on forwarding history verification (e.g., multi- layered credit, three-hop feedback 
mechanism, or encounter ticket), which are costly in terms of transmission overhead and 
verification cost. The security overhead incurred by forwarding history checking is critical for a 
DTN since expensive security operations will be translated into more energy consumptions, 
which represents a fundamental challenge in resource constrained DTN.
A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in 
Delay-Tolerant Networks 
Contact: 9703109334, 9533694296 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in 
Delay-Tolerant Networks 
DISADVANTAGES OF EXISTING SYSTEM: 
 Malicious and selfish behaviors represent a serious threat against routing in 
Delay/Disruption Tolerant Networks (DTNs). 
 Due to the unique network characteristics, designing a misbehavior detection scheme in 
DTN is regarded as a great challenge. 
 Even though the existing misbehavior detection schemes work well for the traditional 
wireless networks, the unique network characteristics including lack of contemporaneous 
path, high variation in network conditions, difficulty to predict mobility patterns, and 
long feedback delay, have made the neighborhood monitoring based misbehavior 
detection scheme unsuitable for DTNs 
 In this paper, we propose iTrust, a probabilistic misbehavior detection scheme, for secure 
DTN routing towards efficient trust establishment. 
 The basic idea of iTrust is introducing a periodically available Trusted Authority (TA) to 
judge the node’s behavior based on the collected routing evidences and probabilistically 
checking. 
ADVANTAGES OF PROPOSED SYSTEM: 
 Reduce the detection overhead effectively. 
 Will reduce transmission overhead incurred by misbehavior detection and detect the 
malicious nodes effectively. 
Contact: 9703109334, 9533694296 
PROPOSED SYSTEM: 
 Improved Security. 
 Improved Efficiency. 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in 
Delay-Tolerant Networks 
SYSTEM ARCHITECTURE: 
Contact: 9703109334, 9533694296 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in 
MODULES: 
 System Model 
 Routing Model 
 Threat Model 
 Itrust Scheme 
MODULES DESCRIPTION: 
System Model 
In this paper, we adopt the system model where we consider a normal DTN consisted of mobile 
devices owned by individual users. Each node i is assumed to have a unique ID Ni and a 
corresponding public/private key pair. We assume that each node must pay a deposit C before it
A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in 
Delay-Tolerant Networks 
joins the network, and the deposit will be paid back after the node leaves if there is no 
misbehavior activity of the node. We assume that a periodically available TA exists so that it 
could take the responsibility of misbehavior detection in DTN. For a specific detection target Ni, 
TA will request Ni’s forwarding history in the global network. Therefore, each node will submit 
its collected Ni’s forwarding history to TA via two possible approaches. In some hybrid DTN 
network environment, the transmission between TA and each node could be also performed in a 
direct transmission manner (e.g., WIMAX or cellular networks). We argue that since the 
misbehavior detection is performed periodically, the message transmission could be performed in 
a batch model, which could further reduce the transmission overhead. 
Routing Model 
We adopt the single-copy routing mechanism such as First Contact routing protocol, and we 
assume the communication range of a mobile node is finite. Thus a data sender out of destination 
node’s communication range can only transmit packetized data via a sequence of intermediate 
nodes in a multi-hop manner. Our misbehaving detection scheme can be applied to delegation 
based routing protocols or multi-copy based routing ones, such as MaxProp and ProPHET. We 
assume that the network is loosely synchronized (i.e., any two nodes should be in the same time 
slot at any time). 
Threat Model 
First of all, we assume that each node in the networks is rational and a rational node’s goal is to 
maximize its own profit. In this work, we mainly consider two kinds of DTN nodes: selfish 
nodes and malicious nodes. Due to the selfish nature and energy consuming, selfish nodes are 
not willing to forward bundles for others without sufficient reward. As an adversary, the 
malicious nodes arbitrarily drop others’ bundles (blackhole or greyhole attack), which often take 
place beyond others’ observation in a sparse DTN, leading to serious performance degradation. 
Note that any of the selfish actions above can be further complicated by the collusion of two or 
more nodes. 
Itrust Scheme 
In this section, we will present a novel basic iTrust scheme for misbehavior detection scheme in 
DTNs. The basic iTrust has two phases, including Routing Evidence Generation Phase and 
Routing Evidence Auditing Phase. In the evidence generation phase, the nodes will generate 
Contact: 9703109334, 9533694296 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in 
Delay-Tolerant Networks 
contact and data forwarding evidence for each contact or data forwarding. In the subsequent 
auditing phase, TA will distinguish the normal nodes from the misbehaving nodes. 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
• System : Pentium IV 2.4 GHz. 
• Hard Disk : 40 GB. 
• Floppy Drive : 1.44 Mb. 
• Monitor : 15 VGA Colour. 
• Mouse : Logitech. 
• Ram : 512 Mb. 
SOFTWARE REQUIREMENTS: 
• Operating system : - Windows XP. 
• Coding Language : C#.Net. 
• Data Base : SQL Server 2005 
Haojin Zhu, Member, IEEE, Suguo Du, Zhaoyu Gao, Student Member, IEEE, Mianxiong Dong, 
Member, IEEE, and Zhenfu Cao, Senior Member, IEEE, “A Probabilistic Misbehavior Detection 
Scheme towards Efficient Trust Establishment in Delay-tolerant Networks”, IEEE 
TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014. 
Contact: 9703109334, 9533694296 
REFERENCE: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in

More Related Content

What's hot (18)

DOCX
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
chennaijp
 
PDF
K1803036872
IOSR Journals
 
PDF
Behavioral Model to Detect Anomalous Attacks in Packet Transmission
IOSR Journals
 
PPTX
Packet-Hiding Methods: To Prevent Selective Jamming Attacks
Swapnil Salunke
 
PDF
Iaetsd an efficient and accurate misbehavior detection
Iaetsd Iaetsd
 
DOCX
Defending against collaborative attacks by
jpstudcorner
 
PDF
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
IJNSA Journal
 
PDF
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
IJNSA Journal
 
PDF
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
IJNSA Journal
 
PDF
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
ijceronline
 
PDF
Modelling of A Trust and Reputation Model in Wireless Networks
ijeei-iaes
 
PDF
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
IRJET Journal
 
PDF
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
IRJET Journal
 
PDF
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
ijsptm
 
DOCX
A probabilistic misbehavior detection scheme towards efficient trust establis...
JPINFOTECH JAYAPRAKASH
 
PDF
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN
IJERDJOURNAL
 
PPT
Wireless sensor networks
nagibtech
 
PDF
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...
IRJET Journal
 
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
chennaijp
 
K1803036872
IOSR Journals
 
Behavioral Model to Detect Anomalous Attacks in Packet Transmission
IOSR Journals
 
Packet-Hiding Methods: To Prevent Selective Jamming Attacks
Swapnil Salunke
 
Iaetsd an efficient and accurate misbehavior detection
Iaetsd Iaetsd
 
Defending against collaborative attacks by
jpstudcorner
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
IJNSA Journal
 
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
IJNSA Journal
 
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
IJNSA Journal
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
ijceronline
 
Modelling of A Trust and Reputation Model in Wireless Networks
ijeei-iaes
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
IRJET Journal
 
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
IRJET Journal
 
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
ijsptm
 
A probabilistic misbehavior detection scheme towards efficient trust establis...
JPINFOTECH JAYAPRAKASH
 
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN
IJERDJOURNAL
 
Wireless sensor networks
nagibtech
 
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...
IRJET Journal
 

Similar to a probabilistic misbehavior detection scheme toward efficient trust establishment in delay-tolerant networks (20)

DOCX
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
PPT
PPT.ppt
John Ajish
 
DOCX
A probabilistic misbehavior detection scheme towards efficient trust establis...
Shakas Technologies
 
PPT
saasgdggagf ibsFC ba;D;jBBISifBIBiucbiBIF
John Ajish
 
PPT
PPT.pptsdhdhdhdhdshfdgsdgdshbdfhdfdhdfhbdbd
bienaaccriteria1
 
PDF
Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...
rahulmonikasharma
 
PDF
An Efficient Secured And Inspection of Malicious Node Using Double Encryption...
IRJET Journal
 
PPTX
Behavioral malware detection in delay tolerant network
Bittu Roy
 
PDF
Misconduct disclosure of the intermediates using the trusted authority
eSAT Publishing House
 
PDF
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
IAEME Publication
 
PDF
Ijciet 08 02_002
IAEME Publication
 
DOCX
Detection and elemination of block hole attack
Maalolan Narasimhan
 
PDF
Adaptive Circumstance Knowledgeable Trusted System for Security Enhancement i...
IJTET Journal
 
PDF
The International Journal of Engineering and Science (The IJES)
theijes
 
PDF
Detecting Misbehaving and Selfish Nodes in the Network using Watchdog Mechanism
INFOGAIN PUBLICATION
 
PDF
11.trust management in adhoc networks a social network based approach
Alexander Decker
 
PDF
Trust management in adhoc networks a social network based approach
Alexander Decker
 
PDF
WEIGHTED COEFFICIENT FIREFLY OPTIMIZATION ALGORITHM AND SUPPORT VECTOR MACHIN...
IJCNCJournal
 
PDF
Weighted Coefficient Firefly Optimization Algorithm and Support Vector Machin...
IJCNCJournal
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
PPT.ppt
John Ajish
 
A probabilistic misbehavior detection scheme towards efficient trust establis...
Shakas Technologies
 
saasgdggagf ibsFC ba;D;jBBISifBIBiucbiBIF
John Ajish
 
PPT.pptsdhdhdhdhdshfdgsdgdshbdfhdfdhdfhbdbd
bienaaccriteria1
 
Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...
rahulmonikasharma
 
An Efficient Secured And Inspection of Malicious Node Using Double Encryption...
IRJET Journal
 
Behavioral malware detection in delay tolerant network
Bittu Roy
 
Misconduct disclosure of the intermediates using the trusted authority
eSAT Publishing House
 
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
IAEME Publication
 
Ijciet 08 02_002
IAEME Publication
 
Detection and elemination of block hole attack
Maalolan Narasimhan
 
Adaptive Circumstance Knowledgeable Trusted System for Security Enhancement i...
IJTET Journal
 
The International Journal of Engineering and Science (The IJES)
theijes
 
Detecting Misbehaving and Selfish Nodes in the Network using Watchdog Mechanism
INFOGAIN PUBLICATION
 
11.trust management in adhoc networks a social network based approach
Alexander Decker
 
Trust management in adhoc networks a social network based approach
Alexander Decker
 
WEIGHTED COEFFICIENT FIREFLY OPTIMIZATION ALGORITHM AND SUPPORT VECTOR MACHIN...
IJCNCJournal
 
Weighted Coefficient Firefly Optimization Algorithm and Support Vector Machin...
IJCNCJournal
 
Ad

More from swathi78 (20)

DOC
secure mining of association rules in horizontally distributed databases
swathi78
 
DOCX
a system for denial-of-service attack detection based on multivariate correla...
swathi78
 
DOCX
web service recommendation via exploiting location and qo s information
swathi78
 
DOCX
privacy-enhanced web service composition
swathi78
 
DOCX
optimal distributed malware defense in mobile networks with heterogeneous dev...
swathi78
 
DOCX
friend book a semantic-based friend recommendation system for social networks
swathi78
 
DOCX
efficient authentication for mobile and pervasive computing
swathi78
 
DOCX
cooperative caching for efficient data access in disruption tolerant networks
swathi78
 
DOCX
an incentive framework for cellular traffic offloading
swathi78
 
DOCX
secure outsourced attribute-based signatures
swathi78
 
DOCX
traffic pattern-based content leakage detection for trusted content delivery ...
swathi78
 
DOCX
the design and evaluation of an information sharing system for human networks
swathi78
 
DOCX
the client assignment problem for continuous distributed interactive applicat...
swathi78
 
DOCX
sos a distributed mobile q&a system based on social networks
swathi78
 
DOCX
securing broker-less publish subscribe systems using identity-based encryption
swathi78
 
DOCX
rre a game-theoretic intrusion response and recovery engine
swathi78
 
DOCX
on false data-injection attacks against power system state estimation modelin...
swathi78
 
DOCX
loca ward a security and privacy aware location-based rewarding system
swathi78
 
DOCX
exploiting service similarity for privacy in location-based search queries
swathi78
 
DOCX
enabling trustworthy service evaluation in service-oriented mobile social net...
swathi78
 
secure mining of association rules in horizontally distributed databases
swathi78
 
a system for denial-of-service attack detection based on multivariate correla...
swathi78
 
web service recommendation via exploiting location and qo s information
swathi78
 
privacy-enhanced web service composition
swathi78
 
optimal distributed malware defense in mobile networks with heterogeneous dev...
swathi78
 
friend book a semantic-based friend recommendation system for social networks
swathi78
 
efficient authentication for mobile and pervasive computing
swathi78
 
cooperative caching for efficient data access in disruption tolerant networks
swathi78
 
an incentive framework for cellular traffic offloading
swathi78
 
secure outsourced attribute-based signatures
swathi78
 
traffic pattern-based content leakage detection for trusted content delivery ...
swathi78
 
the design and evaluation of an information sharing system for human networks
swathi78
 
the client assignment problem for continuous distributed interactive applicat...
swathi78
 
sos a distributed mobile q&a system based on social networks
swathi78
 
securing broker-less publish subscribe systems using identity-based encryption
swathi78
 
rre a game-theoretic intrusion response and recovery engine
swathi78
 
on false data-injection attacks against power system state estimation modelin...
swathi78
 
loca ward a security and privacy aware location-based rewarding system
swathi78
 
exploiting service similarity for privacy in location-based search queries
swathi78
 
enabling trustworthy service evaluation in service-oriented mobile social net...
swathi78
 
Ad

Recently uploaded (20)

PDF
UNIT-4-FEEDBACK AMPLIFIERS AND OSCILLATORS (1).pdf
Sridhar191373
 
PPTX
ISO/IEC JTC 1/WG 9 (MAR) Convenor Report
Kurata Takeshi
 
PPTX
265587293-NFPA 101 Life safety code-PPT-1.pptx
chandermwason
 
PPTX
Structural Functiona theory this important for the theorist
cagumaydanny26
 
PPTX
Pharmaceuticals and fine chemicals.pptxx
jaypa242004
 
PPTX
MobileComputingMANET2023 MobileComputingMANET2023.pptx
masterfake98765
 
PPTX
site survey architecture student B.arch.
sri02032006
 
PPTX
MPMC_Module-2 xxxxxxxxxxxxxxxxxxxxx.pptx
ShivanshVaidya5
 
PPTX
Thermal runway and thermal stability.pptx
godow93766
 
PDF
Water Design_Manual_2005. KENYA FOR WASTER SUPPLY AND SEWERAGE
DancanNgutuku
 
PPTX
Heart Bleed Bug - A case study (Course: Cryptography and Network Security)
Adri Jovin
 
PDF
6th International Conference on Machine Learning Techniques and Data Science ...
ijistjournal
 
PPT
inherently safer design for engineering.ppt
DhavalShah616893
 
PDF
Ethics and Trustworthy AI in Healthcare – Governing Sensitive Data, Profiling...
AlqualsaDIResearchGr
 
PDF
monopile foundation seminar topic for civil engineering students
Ahina5
 
PDF
International Journal of Information Technology Convergence and services (IJI...
ijitcsjournal4
 
PPTX
Presentation on Foundation Design for Civil Engineers.pptx
KamalKhan563106
 
PDF
A presentation on the Urban Heat Island Effect
studyfor7hrs
 
PDF
Statistical Data Analysis Using SPSS Software
shrikrishna kesharwani
 
PDF
PRIZ Academy - Change Flow Thinking Master Change with Confidence.pdf
PRIZ Guru
 
UNIT-4-FEEDBACK AMPLIFIERS AND OSCILLATORS (1).pdf
Sridhar191373
 
ISO/IEC JTC 1/WG 9 (MAR) Convenor Report
Kurata Takeshi
 
265587293-NFPA 101 Life safety code-PPT-1.pptx
chandermwason
 
Structural Functiona theory this important for the theorist
cagumaydanny26
 
Pharmaceuticals and fine chemicals.pptxx
jaypa242004
 
MobileComputingMANET2023 MobileComputingMANET2023.pptx
masterfake98765
 
site survey architecture student B.arch.
sri02032006
 
MPMC_Module-2 xxxxxxxxxxxxxxxxxxxxx.pptx
ShivanshVaidya5
 
Thermal runway and thermal stability.pptx
godow93766
 
Water Design_Manual_2005. KENYA FOR WASTER SUPPLY AND SEWERAGE
DancanNgutuku
 
Heart Bleed Bug - A case study (Course: Cryptography and Network Security)
Adri Jovin
 
6th International Conference on Machine Learning Techniques and Data Science ...
ijistjournal
 
inherently safer design for engineering.ppt
DhavalShah616893
 
Ethics and Trustworthy AI in Healthcare – Governing Sensitive Data, Profiling...
AlqualsaDIResearchGr
 
monopile foundation seminar topic for civil engineering students
Ahina5
 
International Journal of Information Technology Convergence and services (IJI...
ijitcsjournal4
 
Presentation on Foundation Design for Civil Engineers.pptx
KamalKhan563106
 
A presentation on the Urban Heat Island Effect
studyfor7hrs
 
Statistical Data Analysis Using SPSS Software
shrikrishna kesharwani
 
PRIZ Academy - Change Flow Thinking Master Change with Confidence.pdf
PRIZ Guru
 

a probabilistic misbehavior detection scheme toward efficient trust establishment in delay-tolerant networks

  • 1. A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks Contact: 9703109334, 9533694296 Email id: [email protected], www.logicsystems.org.in ABSTRACT Malicious and selfish behaviors represent a serious threat against routing in Delay/Disruption Tolerant Networks (DTNs). Due to the unique network characteristics, designing a misbehavior detection scheme in DTN is regarded as a great challenge. In this paper, we propose iTrust, a probabilistic misbehavior detection scheme, for secure DTN routing towards efficient trust establishment. The basic idea of iTrust is introducing a periodically available Trusted Authority (TA) to judge the node’s behavior based on the collected routing evidences and probabilistically checking. We model iTrust as the Inspection Game and use game theoretical analysis to demonstrate that, by setting an appropriate investigation probability, TA could ensure the security of DTN routing at a reduced cost. To further improve the efficiency of the proposed scheme, we correlate detection probability with a node’s reputation, which allows a dynamic detection probability determined by the trust of the users. The extensive analysis and simulation results show that the proposed scheme substantiates the effectiveness and efficiency of the proposed scheme. EXISTING SYSTEM: In DTNs, a node could misbehave by dropping packets intentionally even when it has the capability to forward the data (e.g., sufficient buffers and meeting opportunities). Routing misbehavior can be caused by selfish (or rational) nodes that try to maximize their own benefits by enjoying the services provided by DTN while refusing to forward the bundles for others, or malicious nodes that drop packets or modifying the packets to launch attacks. Recently, there are quite a few proposals for misbehaviors detection in DTNs, most of which are based on forwarding history verification (e.g., multi- layered credit, three-hop feedback mechanism, or encounter ticket), which are costly in terms of transmission overhead and verification cost. The security overhead incurred by forwarding history checking is critical for a DTN since expensive security operations will be translated into more energy consumptions, which represents a fundamental challenge in resource constrained DTN.
  • 2. A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks Contact: 9703109334, 9533694296 Email id: [email protected], www.logicsystems.org.in
  • 3. A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks DISADVANTAGES OF EXISTING SYSTEM:  Malicious and selfish behaviors represent a serious threat against routing in Delay/Disruption Tolerant Networks (DTNs).  Due to the unique network characteristics, designing a misbehavior detection scheme in DTN is regarded as a great challenge.  Even though the existing misbehavior detection schemes work well for the traditional wireless networks, the unique network characteristics including lack of contemporaneous path, high variation in network conditions, difficulty to predict mobility patterns, and long feedback delay, have made the neighborhood monitoring based misbehavior detection scheme unsuitable for DTNs  In this paper, we propose iTrust, a probabilistic misbehavior detection scheme, for secure DTN routing towards efficient trust establishment.  The basic idea of iTrust is introducing a periodically available Trusted Authority (TA) to judge the node’s behavior based on the collected routing evidences and probabilistically checking. ADVANTAGES OF PROPOSED SYSTEM:  Reduce the detection overhead effectively.  Will reduce transmission overhead incurred by misbehavior detection and detect the malicious nodes effectively. Contact: 9703109334, 9533694296 PROPOSED SYSTEM:  Improved Security.  Improved Efficiency. Email id: [email protected], www.logicsystems.org.in
  • 4. A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks SYSTEM ARCHITECTURE: Contact: 9703109334, 9533694296 Email id: [email protected], www.logicsystems.org.in MODULES:  System Model  Routing Model  Threat Model  Itrust Scheme MODULES DESCRIPTION: System Model In this paper, we adopt the system model where we consider a normal DTN consisted of mobile devices owned by individual users. Each node i is assumed to have a unique ID Ni and a corresponding public/private key pair. We assume that each node must pay a deposit C before it
  • 5. A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks joins the network, and the deposit will be paid back after the node leaves if there is no misbehavior activity of the node. We assume that a periodically available TA exists so that it could take the responsibility of misbehavior detection in DTN. For a specific detection target Ni, TA will request Ni’s forwarding history in the global network. Therefore, each node will submit its collected Ni’s forwarding history to TA via two possible approaches. In some hybrid DTN network environment, the transmission between TA and each node could be also performed in a direct transmission manner (e.g., WIMAX or cellular networks). We argue that since the misbehavior detection is performed periodically, the message transmission could be performed in a batch model, which could further reduce the transmission overhead. Routing Model We adopt the single-copy routing mechanism such as First Contact routing protocol, and we assume the communication range of a mobile node is finite. Thus a data sender out of destination node’s communication range can only transmit packetized data via a sequence of intermediate nodes in a multi-hop manner. Our misbehaving detection scheme can be applied to delegation based routing protocols or multi-copy based routing ones, such as MaxProp and ProPHET. We assume that the network is loosely synchronized (i.e., any two nodes should be in the same time slot at any time). Threat Model First of all, we assume that each node in the networks is rational and a rational node’s goal is to maximize its own profit. In this work, we mainly consider two kinds of DTN nodes: selfish nodes and malicious nodes. Due to the selfish nature and energy consuming, selfish nodes are not willing to forward bundles for others without sufficient reward. As an adversary, the malicious nodes arbitrarily drop others’ bundles (blackhole or greyhole attack), which often take place beyond others’ observation in a sparse DTN, leading to serious performance degradation. Note that any of the selfish actions above can be further complicated by the collusion of two or more nodes. Itrust Scheme In this section, we will present a novel basic iTrust scheme for misbehavior detection scheme in DTNs. The basic iTrust has two phases, including Routing Evidence Generation Phase and Routing Evidence Auditing Phase. In the evidence generation phase, the nodes will generate Contact: 9703109334, 9533694296 Email id: [email protected], www.logicsystems.org.in
  • 6. A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks contact and data forwarding evidence for each contact or data forwarding. In the subsequent auditing phase, TA will distinguish the normal nodes from the misbehaving nodes. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS: • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 15 VGA Colour. • Mouse : Logitech. • Ram : 512 Mb. SOFTWARE REQUIREMENTS: • Operating system : - Windows XP. • Coding Language : C#.Net. • Data Base : SQL Server 2005 Haojin Zhu, Member, IEEE, Suguo Du, Zhaoyu Gao, Student Member, IEEE, Mianxiong Dong, Member, IEEE, and Zhenfu Cao, Senior Member, IEEE, “A Probabilistic Misbehavior Detection Scheme towards Efficient Trust Establishment in Delay-tolerant Networks”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014. Contact: 9703109334, 9533694296 REFERENCE: Email id: [email protected], www.logicsystems.org.in