CFP last date
20 May 2024
Reseach Article

A Survey of Misbehavior Detection Scheme in DTN

by M.balaganesh, P.sathiya, D.balagowri
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 107 - Number 10
Year of Publication: 2014
Authors: M.balaganesh, P.sathiya, D.balagowri
10.5120/18787-0121

M.balaganesh, P.sathiya, D.balagowri . A Survey of Misbehavior Detection Scheme in DTN. International Journal of Computer Applications. 107, 10 ( December 2014), 18-20. DOI=10.5120/18787-0121

@article{ 10.5120/18787-0121,
author = { M.balaganesh, P.sathiya, D.balagowri },
title = { A Survey of Misbehavior Detection Scheme in DTN },
journal = { International Journal of Computer Applications },
issue_date = { December 2014 },
volume = { 107 },
number = { 10 },
month = { December },
year = { 2014 },
issn = { 0975-8887 },
pages = { 18-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume107/number10/18787-0121/ },
doi = { 10.5120/18787-0121 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:40:42.422820+05:30
%A M.balaganesh
%A P.sathiya
%A D.balagowri
%T A Survey of Misbehavior Detection Scheme in DTN
%J International Journal of Computer Applications
%@ 0975-8887
%V 107
%N 10
%P 18-20
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The survey tries to review the various problems and their solution in Delay Tolerant Network (DTN) while routing the packets. In this paper, going to discuss and see the overview of various methods used in the DTN. They are simbet and bubble rap which are the DTN routing algorithm and is used for identify the bridge nodes using betweenness centrality and similarity metrics in the network. Then watchdog and pathrater used for detecting the misbehaving nodes in the DTN. Practical incentive protocol (Pi) is used for addressing the selfishness problem in DTN. Secure multilayer credit based incentive scheme (SMART) provide the incentives to the selfish node by using credits in the network.

References
  1. A. Garyfalos and K. C. Almeroth, "Coupons: A multilevel incentive scheme for information dissemination in mobile networks," IEEE Trans. Mobile Comput. , vol. 7, no. 6, pp. 792–804, Jun. 2008.
  2. D. Boneh and M. Franklin, "Identity-based encryption from the weil pairing," in Lecture Notes Computer Sci. , Advances Cryptology -CRYPTO 2001, vol. 2139. Springer-Verlag, 2001, pp. 213-229.
  3. E. M. Daly and M. Haahr, "Social network analysis for routing indisconnected delay-tolerant manets," in ACM MobiHoc, 2007.
  4. F. Li, A. Srinivasan, and J. Wu, "Thwarting Blackhole Attacks in Disruption-Tolerant Networks Using Encounter Tickets," Proc. IEEE INFOCOM '09, 2009.
  5. H. Zhu, X. Lin, R. Lu, P. -H. Ho, and X. Shen, "SLAB: Secure Localized Authentication and Billing Scheme for Wireless Mesh Networks," IEEE Trans. Wireless Comm. , vol. 17, no. 10, pp. 3858- 3868, Oct. 2008.
  6. H. Zhu, X. Lin, R. Lu, Y. Fan, and X. Shen, "SMART: a secure multilayer credit based incentive scheme for delay-tolerant networks," IEEE Trans. Veh. Technol, vol. 58, no. 8, pp. 4628-4639, 2009. .
  7. J. Burgess, G. Bissias, M. Corner, and B. Levine. Surviving attacks on disruption-tolerant networks without authentication. In Proc. of ACM MobiHoc, 2007.
  8. P. Hui, J. Crowcroft, and E. Yoneki, "Bubble rap: Social-based forwarding in delay tolerant networks," in ACM MobiHoc, 2008. .
  9. Q. He, D. Wu, and P. Khosla, "SORI: A secure and objective reputationbased incentive scheme for ad hoc networks," in Proc. WCNC, Atlanta,GA, Mar. 2004, pp. 825–830.
  10. R. Lu, X. Lin, H. Zhu, P. -H. Ho, and X. Shen, "ECPP: efficient conditional privacy preservation protocol for secure vehicular communitions,"in Proc. 27th Conf. Computer Commun. (INFOCOM 2008),Phoenix, AZ, USA, Apr. 2008, pp. 1229-1237. .
  11. R. Panayappan, J. Trivedi, A. Studer, and A. Perrig, "VANET-based approach for parking space availability," in Proc. of the Fourth ACM International Workshop on Vehicular Ad Hoc Networks (VANET 2007), Montr´eal, Qu´ebec, Canada, pp. 75-76, Sept. 2007.
  12. R. Lu, X. Lin, H. Zhu, and X. Shen, "Pi: A Practical IncentivProtocol for Delay Tolerant Networks," IEEE Trans. Wireless Comm. , vol. 9, no. 4, pp. 1483-1493, Apr. 2010
  13. R. Lu, X. Lin, H. Zhu, and X. Shen, "SPARK: A New VANET Based Smart Parking Scheme for Large Parking Lots," Proc. IEEE INFOCOM '09, Apr. 2009.
  14. S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," Proc. ACMMobiCom '00, 2000.
  15. Y. Peng, Z. Abichar, and J. M. Chang, "Roadside-aided routing (RAR) in vehicular networks", in Proc. IEEE ICC 2006, Vol. 8, pp. 3602-3607,
  16. Y. Zhang, W. Lou, W. Liu, and Y. Fang, "A secure incentive protocol for mobile ad hoc networks," Wirel. Netw. , vol. 13, no. 5, pp. 569–582,Oct. 2007. Istanbul, Turkey, June 2006.
Index Terms

Computer Science
Information Sciences

Keywords

DTN practical incentive protocol simbet bubble rap watchdog pathrater SMART.