Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

A Survey of Misbehavior Detection Scheme in DTN

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 107 - Number 10
Year of Publication: 2014
Authors:
M. Balaganesh
P. Sathiya
D. Balagowri
10.5120/18787-0121

M.balaganesh, P.sathiya and D.balagowri. Article: A Survey of Misbehavior Detection Scheme in DTN. International Journal of Computer Applications 107(10):18-20, December 2014. Full text available. BibTeX

@article{key:article,
	author = {M.balaganesh and P.sathiya and D.balagowri},
	title = {Article: A Survey of Misbehavior Detection Scheme in DTN},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {107},
	number = {10},
	pages = {18-20},
	month = {December},
	note = {Full text available}
}

Abstract

The survey tries to review the various problems and their solution in Delay Tolerant Network (DTN) while routing the packets. In this paper, going to discuss and see the overview of various methods used in the DTN. They are simbet and bubble rap which are the DTN routing algorithm and is used for identify the bridge nodes using betweenness centrality and similarity metrics in the network. Then watchdog and pathrater used for detecting the misbehaving nodes in the DTN. Practical incentive protocol (Pi) is used for addressing the selfishness problem in DTN. Secure multilayer credit based incentive scheme (SMART) provide the incentives to the selfish node by using credits in the network.

References

  • A. Garyfalos and K. C. Almeroth, "Coupons: A multilevel incentive scheme for information dissemination in mobile networks," IEEE Trans. Mobile Comput. , vol. 7, no. 6, pp. 792–804, Jun. 2008.
  • D. Boneh and M. Franklin, "Identity-based encryption from the weil pairing," in Lecture Notes Computer Sci. , Advances Cryptology -CRYPTO 2001, vol. 2139. Springer-Verlag, 2001, pp. 213-229.
  • E. M. Daly and M. Haahr, "Social network analysis for routing indisconnected delay-tolerant manets," in ACM MobiHoc, 2007.
  • F. Li, A. Srinivasan, and J. Wu, "Thwarting Blackhole Attacks in Disruption-Tolerant Networks Using Encounter Tickets," Proc. IEEE INFOCOM '09, 2009.
  • H. Zhu, X. Lin, R. Lu, P. -H. Ho, and X. Shen, "SLAB: Secure Localized Authentication and Billing Scheme for Wireless Mesh Networks," IEEE Trans. Wireless Comm. , vol. 17, no. 10, pp. 3858- 3868, Oct. 2008.
  • H. Zhu, X. Lin, R. Lu, Y. Fan, and X. Shen, "SMART: a secure multilayer credit based incentive scheme for delay-tolerant networks," IEEE Trans. Veh. Technol, vol. 58, no. 8, pp. 4628-4639, 2009. .
  • J. Burgess, G. Bissias, M. Corner, and B. Levine. Surviving attacks on disruption-tolerant networks without authentication. In Proc. of ACM MobiHoc, 2007.
  • P. Hui, J. Crowcroft, and E. Yoneki, "Bubble rap: Social-based forwarding in delay tolerant networks," in ACM MobiHoc, 2008. .
  • Q. He, D. Wu, and P. Khosla, "SORI: A secure and objective reputationbased incentive scheme for ad hoc networks," in Proc. WCNC, Atlanta,GA, Mar. 2004, pp. 825–830.
  • R. Lu, X. Lin, H. Zhu, P. -H. Ho, and X. Shen, "ECPP: efficient conditional privacy preservation protocol for secure vehicular communitions,"in Proc. 27th Conf. Computer Commun. (INFOCOM 2008),Phoenix, AZ, USA, Apr. 2008, pp. 1229-1237. .
  • R. Panayappan, J. Trivedi, A. Studer, and A. Perrig, "VANET-based approach for parking space availability," in Proc. of the Fourth ACM International Workshop on Vehicular Ad Hoc Networks (VANET 2007), Montr´eal, Qu´ebec, Canada, pp. 75-76, Sept. 2007.
  • R. Lu, X. Lin, H. Zhu, and X. Shen, "Pi: A Practical IncentivProtocol for Delay Tolerant Networks," IEEE Trans. Wireless Comm. , vol. 9, no. 4, pp. 1483-1493, Apr. 2010
  • R. Lu, X. Lin, H. Zhu, and X. Shen, "SPARK: A New VANET Based Smart Parking Scheme for Large Parking Lots," Proc. IEEE INFOCOM '09, Apr. 2009.
  • S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," Proc. ACMMobiCom '00, 2000.
  • Y. Peng, Z. Abichar, and J. M. Chang, "Roadside-aided routing (RAR) in vehicular networks", in Proc. IEEE ICC 2006, Vol. 8, pp. 3602-3607,
  • Y. Zhang, W. Lou, W. Liu, and Y. Fang, "A secure incentive protocol for mobile ad hoc networks," Wirel. Netw. , vol. 13, no. 5, pp. 569–582,Oct. 2007. Istanbul, Turkey, June 2006.