IJSRSET calls volunteers interested to contribute towards the scientific development in the field of Science, Engineering and Technology

Home > IJSRSET152215                                                     

A Secure I-Trust Scheme Towards Periodic Trust Establishment in Delay-Tolerant Networks


K. Punitha, A. Pushpalatha, R. Sridurga, J. Seetha
  • Abstract
  • Authors
  • Keywords
  • References
  • Details
Malicious and selfish behaviors represent a serious threat against routing in Delay/Disruption Tolerant Networks (DTNs).We propose an iTrust, a probabilistic misbehavior detection scheme, for secure DTN routing towards efficient trust establishment. The basic idea of iTrust is introducing a periodically available Trusted Authority (TA) to judge the node’s behavior based on the collected routing evidences and probabilistically checking. TA could ensure the security of DTN routing at a reduced cost.

K. Punitha, A. Pushpalatha, R. Sridurga, J. Seetha

DTN, TA, Delay Tolerant Networks, WIMAX, Disruption Tolerant Networks


 [1] R. Lu, X. Lin, H. Zhu, and X. Shen, “SPARK: A New VANETBased Smart Parking Scheme for Large Parking Lots,” Proc. IEEE INFOCOM ’09, Apr. 2009.

[2] T. Hossmann, T. Spyropoulos, and F. Legendre, “Know the Neighbor: Towards Optimal Mapping of Contacts to Social

[3] Graphs for DTN Routing,” Proc. IEEE INFOCOM ’10, 2010.

[4] Q. Li, S. Zhu, and G. Cao, “Routing in Socially Selfish Delay- Tolerant Networks,” Proc. IEEE INFOCOM ’10, 2010.

[5] H. Zhu, X. Lin, R. Lu, Y. Fan, and X. Shen, “SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks,” IEEE Trans. Vehicular Technology, vol. 58, no. 8, pp. 828-836, 2009.

[6] H. Zhu, X. Lin, R. Lu, P.-H. Ho, and X. Shen, “SLAB: Secure Localized Authentication and Billing Scheme for Wireless Mesh Networks,” IEEE Trans. Wireless Comm., vol. 17, no. 10, pp. 3858- 3868, Oct. 2008.

[7] Q. Li and G. Cao, “Mitigating Routing Misbehavior in Disruption Tolerant Networks,” IEEE Trans. Information Forensics and Security, vol. 7, no. 2, pp. 664-675, Apr. 2012.

[8] S. Marti, T.J. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” Proc. ACM MobiCom ’00, 2000.

[9] R. Lu, X. Lin, H. Zhu, and X. Shen, “Pi: A Practical Incentive Protocol for Delay Tolerant Networks,” IEEE Trans. Wireless Comm., vol. 9, no. 4, pp. 1483-1493, Apr. 2010.

[10] F. Li, A. Srinivasan, and J. Wu, “Thwarting Blackhole Attacks in Disruption-Tolerant Networks Using Encounter Tickets,” Proc. IEEE INFOCOM ’09, 2009.

[11] E. Ayday, H. Lee, and F. Fekri, “Trust Management and Adversary Detection for Delay-Tolerant Networks,” Proc. Military Comm. Conf. (Milcom ’10), 2010.

[12] D. Fudenberg and J. Tirole, Game Theory. MIT Press, 1991.

[13]  M. Rayay, M.H. Manshaeiy, M. Flegyhziz, and J. Hubauxy, “Revocation Games in Ephemeral Networks,” Proc. 15th ACM Conf. Computer and Comm. Security (CCS ’08), 2008.

[14] S. Reidt, M. Srivatsa, and S. Balfe, “The Fable of the Bees: Incentivizing Robust Revocation Decision Making in Ad Hoc Networks,” Proc. 16th ACM Conf. Computer and Comm. Security (CCS ’09), 2009.

[15] B.B. Chen and M.C. Chan, “Mobicent: A Credit-Based Incentive System for Disruption-Tolerant Network,” Proc. IEEE INFOCOM ’10, 2010.

[16] S. Zhong, J. Chen, and Y.R. Yang, “Sprite: A Simple Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks,” Proc. IEEE INFOCOM ’03, 2003.

[17] J. Douceur, “The Sybil Attack,” Proc. Revised Papers from the First Int’l Workshop Peer-to-Peer Systems (IPTPS ’01), 2001.

[18] R. Pradiptyo, “Does Punishment Matter? A Refinement of the Inspection Game,” Rev. Law and Economics, vol. 3, no. 2, pp. 197-219, 2007.

[19] J. Burgess, B. Gallagher, D. Jensen, and B. Levine, “Maxprop: Routing for Vehicle-Based Disruption-Tolerant Networks,” Proc. IEEE INFOCOM ’06, 2006.

[20] A. Lindgren and A. Doria, “Probabilistic Routing Protocol for Intermittently Connected Networks,” draft-lindgren-dtnrg-prophet-03, 20 07.

[21] W. Gao and G. Cao, “User-Centric Data Dissemination in Disruption-Tolerant Networks,” Proc. IEEE INFOCOM ’11, 2011.

[21] A. Keranen, J. Ott, and T. Karkkainen, “The ONE Simulator for DTN Protocol Evaluation,” Proc. Second Int’l Conf. Simulation Tools and Techniques (SIMUTools ’09), 2009.


Publication Details

Published in : Volume 1 | Issue 2 | March-April - 2015
Date of Publication Print ISSN Online ISSN
2015-04-25 2395-1990 2394-4099
Page(s) Manuscript Number   Publisher
76-80 IJSRSET152215   Technoscience Academy

Cite This Article

K. Punitha, A. Pushpalatha, R. Sridurga, J. Seetha, "A Secure I-Trust Scheme Towards Periodic Trust Establishment in Delay-Tolerant Networks", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 2, pp.76-80, March-April-2015.
URL : http://ijsrset.com/IJSRSET152215.php




National Conference on Advances in Mechanical Engineering 2017(NCAME 2017)

National Conference on Emerging Trends in Civil Engineering 2017( NCETCE 2017)