A Secure I-Trust Scheme Towards Periodic Trust Establishment in Delay-Tolerant Networks

Authors(4) :-K. Punitha, A. Pushpalatha, R. Sridurga, J. Seetha

Malicious and selfish behaviors represent a serious threat against routing in Delay/Disruption Tolerant Networks (DTNs).We propose an iTrust, a probabilistic misbehavior detection scheme, for secure DTN routing towards efficient trust establishment. The basic idea of iTrust is introducing a periodically available Trusted Authority (TA) to judge the node’s behavior based on the collected routing evidences and probabilistically checking. TA could ensure the security of DTN routing at a reduced cost.

Authors and Affiliations

K. Punitha
Department of Information Technology, Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India
A. Pushpalatha
Department of Information Technology, Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India
R. Sridurga
Department of Information Technology, Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India
J. Seetha

DTN, TA, Delay Tolerant Networks, WIMAX, Disruption Tolerant Networks

 [1] R. Lu, X. Lin, H. Zhu, and X. Shen, “SPARK: A New VANETBased Smart Parking Scheme for Large Parking Lots,” Proc. IEEE INFOCOM ’09, Apr. 2009.

[2] T. Hossmann, T. Spyropoulos, and F. Legendre, “Know the Neighbor: Towards Optimal Mapping of Contacts to Social

[3] Graphs for DTN Routing,” Proc. IEEE INFOCOM ’10, 2010.

[4] Q. Li, S. Zhu, and G. Cao, “Routing in Socially Selfish Delay- Tolerant Networks,” Proc. IEEE INFOCOM ’10, 2010.

[5] H. Zhu, X. Lin, R. Lu, Y. Fan, and X. Shen, “SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks,” IEEE Trans. Vehicular Technology, vol. 58, no. 8, pp. 828-836, 2009.

[6] H. Zhu, X. Lin, R. Lu, P.-H. Ho, and X. Shen, “SLAB: Secure Localized Authentication and Billing Scheme for Wireless Mesh Networks,” IEEE Trans. Wireless Comm., vol. 17, no. 10, pp. 3858- 3868, Oct. 2008.

[7] Q. Li and G. Cao, “Mitigating Routing Misbehavior in Disruption Tolerant Networks,” IEEE Trans. Information Forensics and Security, vol. 7, no. 2, pp. 664-675, Apr. 2012.

[8] S. Marti, T.J. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” Proc. ACM MobiCom ’00, 2000.

[9] R. Lu, X. Lin, H. Zhu, and X. Shen, “Pi: A Practical Incentive Protocol for Delay Tolerant Networks,” IEEE Trans. Wireless Comm., vol. 9, no. 4, pp. 1483-1493, Apr. 2010.

[10] F. Li, A. Srinivasan, and J. Wu, “Thwarting Blackhole Attacks in Disruption-Tolerant Networks Using Encounter Tickets,” Proc. IEEE INFOCOM ’09, 2009.

[11] E. Ayday, H. Lee, and F. Fekri, “Trust Management and Adversary Detection for Delay-Tolerant Networks,” Proc. Military Comm. Conf. (Milcom ’10), 2010.

[12] D. Fudenberg and J. Tirole, Game Theory. MIT Press, 1991.

[13]  M. Rayay, M.H. Manshaeiy, M. Flegyhziz, and J. Hubauxy, “Revocation Games in Ephemeral Networks,” Proc. 15th ACM Conf. Computer and Comm. Security (CCS ’08), 2008.

[14] S. Reidt, M. Srivatsa, and S. Balfe, “The Fable of the Bees: Incentivizing Robust Revocation Decision Making in Ad Hoc Networks,” Proc. 16th ACM Conf. Computer and Comm. Security (CCS ’09), 2009.

[15] B.B. Chen and M.C. Chan, “Mobicent: A Credit-Based Incentive System for Disruption-Tolerant Network,” Proc. IEEE INFOCOM ’10, 2010.

[16] S. Zhong, J. Chen, and Y.R. Yang, “Sprite: A Simple Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks,” Proc. IEEE INFOCOM ’03, 2003.

[17] J. Douceur, “The Sybil Attack,” Proc. Revised Papers from the First Int’l Workshop Peer-to-Peer Systems (IPTPS ’01), 2001.

[18] R. Pradiptyo, “Does Punishment Matter? A Refinement of the Inspection Game,” Rev. Law and Economics, vol. 3, no. 2, pp. 197-219, 2007.

[19] J. Burgess, B. Gallagher, D. Jensen, and B. Levine, “Maxprop: Routing for Vehicle-Based Disruption-Tolerant Networks,” Proc. IEEE INFOCOM ’06, 2006.

[20] A. Lindgren and A. Doria, “Probabilistic Routing Protocol for Intermittently Connected Networks,” draft-lindgren-dtnrg-prophet-03, 20 07.

[21] W. Gao and G. Cao, “User-Centric Data Dissemination in Disruption-Tolerant Networks,” Proc. IEEE INFOCOM ’11, 2011.

[21] A. Keranen, J. Ott, and T. Karkkainen, “The ONE Simulator for DTN Protocol Evaluation,” Proc. Second Int’l Conf. Simulation Tools and Techniques (SIMUTools ’09), 2009.

Publication Details

Published in : Volume 1 | Issue 2 | March-April 2015
Date of Publication : 2015-04-25
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 76-80
Manuscript Number : IJSRSET152215
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

K. Punitha, A. Pushpalatha, R. Sridurga, J. Seetha, " A Secure I-Trust Scheme Towards Periodic Trust Establishment in Delay-Tolerant Networks, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 2, pp.76-80, March-April-2015.
Journal URL : http://ijsrset.com/IJSRSET152215

Article Preview

Follow Us

Contact Us