A Secure I-Trust Scheme Towards Periodic Trust Establishment in Delay-Tolerant Networks
Keywords:
DTN, TA, Delay Tolerant Networks, WIMAX, Disruption Tolerant NetworksAbstract
Malicious and selfish behaviors represent a serious threat against routing in Delay/Disruption Tolerant Networks (DTNs).We propose an iTrust, a probabilistic misbehavior detection scheme, for secure DTN routing towards efficient trust establishment. The basic idea of iTrust is introducing a periodically available Trusted Authority (TA) to judge the node’s behavior based on the collected routing evidences and probabilistically checking. TA could ensure the security of DTN routing at a reduced cost.
References
[1] R. Lu, X. Lin, H. Zhu, and X. Shen, “SPARK: A New VANETBased Smart Parking Scheme for Large Parking Lots,†Proc. IEEE INFOCOM ’09, Apr. 2009.
[2] T. Hossmann, T. Spyropoulos,
and F. Legendre, “Know the Neighbor: Towards Optimal Mapping of Contacts to
Social
[3] Graphs for DTN Routing,†Proc.
IEEE INFOCOM ’10, 2010.
[4] Q. Li, S. Zhu, and G. Cao,
“Routing in Socially Selfish Delay- Tolerant Networks,†Proc. IEEE INFOCOM ’10,
2010.
[5] H. Zhu, X. Lin, R. Lu, Y. Fan,
and X. Shen, “SMART: A Secure Multilayer Credit-Based Incentive Scheme for
Delay-Tolerant Networks,†IEEE Trans. Vehicular Technology, vol. 58, no. 8, pp.
828-836, 2009.
[6] H. Zhu, X. Lin, R. Lu, P.-H.
Ho, and X. Shen, “SLAB: Secure Localized Authentication and Billing Scheme for
Wireless Mesh Networks,†IEEE Trans. Wireless Comm., vol. 17, no. 10, pp. 3858-
3868, Oct. 2008.
[7] Q. Li and G. Cao, “Mitigating
Routing Misbehavior in Disruption Tolerant Networks,†IEEE Trans. Information
Forensics and Security, vol. 7, no. 2, pp. 664-675, Apr. 2012.
[8] S. Marti, T.J. Giuli, K. Lai,
and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,†Proc.
ACM MobiCom ’00, 2000.
[9] R. Lu, X. Lin, H. Zhu, and X.
Shen, “Pi: A Practical Incentive Protocol for Delay Tolerant Networks,†IEEE
Trans. Wireless Comm., vol. 9, no. 4, pp. 1483-1493, Apr. 2010.
[10] F. Li, A. Srinivasan, and J.
Wu, “Thwarting Blackhole Attacks in Disruption-Tolerant Networks Using
Encounter Tickets,†Proc. IEEE INFOCOM ’09, 2009.
[11] E. Ayday, H. Lee, and F.
Fekri, “Trust Management and Adversary Detection for Delay-Tolerant Networks,â€
Proc. Military Comm. Conf. (Milcom ’10), 2010.
[12] D. Fudenberg and J. Tirole,
Game Theory. MIT Press, 1991.
[13] Â M. Rayay, M.H. Manshaeiy, M. Flegyhziz, and J.
Hubauxy, “Revocation Games in Ephemeral Networks,†Proc. 15th ACM Conf.
Computer and Comm. Security (CCS ’08), 2008.
[14] S. Reidt, M. Srivatsa, and S.
Balfe, “The Fable of the Bees: Incentivizing Robust Revocation Decision Making
in Ad Hoc Networks,†Proc. 16th ACM Conf. Computer and Comm. Security (CCS
’09), 2009.
[15] B.B. Chen and M.C. Chan,
“Mobicent: A Credit-Based Incentive System for Disruption-Tolerant Network,â€
Proc. IEEE INFOCOM ’10, 2010.
[16] S. Zhong, J. Chen, and Y.R.
Yang, “Sprite: A Simple Cheat-Proof, Credit-Based System for Mobile Ad-Hoc
Networks,†Proc. IEEE INFOCOM ’03, 2003.
[17] J. Douceur, “The Sybil
Attack,†Proc. Revised Papers from the First Int’l Workshop Peer-to-Peer
Systems (IPTPS ’01), 2001.
[18] R. Pradiptyo, “Does Punishment
Matter? A Refinement of the Inspection Game,†Rev. Law and Economics, vol. 3,
no. 2, pp. 197-219, 2007.
[19] J. Burgess, B. Gallagher, D.
Jensen, and B. Levine, “Maxprop: Routing for Vehicle-Based Disruption-Tolerant
Networks,†Proc. IEEE INFOCOM ’06, 2006.
[20] A. Lindgren and A. Doria,
“Probabilistic Routing Protocol for Intermittently Connected Networks,â€
draft-lindgren-dtnrg-prophet-03, 20 07.
[21] W. Gao and G. Cao,
“User-Centric Data Dissemination in Disruption-Tolerant Networks,†Proc. IEEE
INFOCOM ’11, 2011.
[21] A. Keranen, J. Ott, and T.
Karkkainen, “The ONE Simulator for DTN Protocol Evaluation,†Proc. Second Int’l
Conf. Simulation Tools and Techniques (SIMUTools ’09), 2009.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.