SlideShare a Scribd company logo
1 of 7
DETECTION OF MISBEHAVIOR IN
DELAY TOLERANT NETWORK USING
TRUST AUTHORITY
Abstract
Malicious and selfish behaviors represent a serious
threat against routing in delay/disruption tolerant networks
((DTNs). Due to the selfish nature and energy consuming,
selfish nodes are not willing to forward packets for others
without sufficient reward. Due to the malicious nature,
malicious nodes that drop packets or modifying the packets
to launch attacks (black hole or gray hole attack). In this
project, iTrust, a probabilistic misbehavior detection
scheme, for secure DTN routing toward efficient trust
establishment. In our model iTrust as the inspection game
and use game theoretical analysis, by setting an appropriate
probability. Correlate detection probability with a node’s
reputation, which allows a dynamic detection probability
determined by the trust of the users.
Existing System
 In existing system, incentive protocol, called Pi.
 Pi protocol can also thwart various attacks, which could be
launched by selfish DTN nodes.
 It doesn’t set a routing path in advance, but only need to
attach some incentive on the bundle.
 In the reward model, to achieve fairness.
Disadvantages
 Fails in privacy protection.
 High computation.
 Transmission overhead and verification cost is high.
 High variation in network condition.
Proposed System
 Misbehaviors Detection in most of which are based on
forwarding history verification.
 An efficient and adaptive misbehavior detection and
reputation management scheme is highly desirable in DTN
 TA, which could launch the probabilistic detection for the
target node and judge it by collecting the forwarding
history evidence from its upstream and downstream nodes.
 TA could punish or compensate the node based on its
behaviors.
Advantages
 Detect the malicious nodes effectively.
 More secure.
 Reduce computation cost.
 Reduce transmission overhead incurred by misbehavior
detection.
THANK YOU

More Related Content

Similar to Detect Misbehavior in DTNs Using Trust Authority

ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...IDES Editor
 
Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...
Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...
Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...Kishan Patel
 
Modelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless NetworksModelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless Networksijeei-iaes
 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...CSCJournals
 
Iaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detectionIaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detectionIaetsd Iaetsd
 
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...IRJET Journal
 
Review on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETsReview on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETsijtsrd
 
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachMitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachIJLT EMAS
 
Optimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning AlgorithmOptimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning Algorithmijtsrd
 
A survey of Network Intrusion Detection using soft computing Technique
A survey of Network Intrusion Detection using soft computing TechniqueA survey of Network Intrusion Detection using soft computing Technique
A survey of Network Intrusion Detection using soft computing Techniqueijsrd.com
 
An improvement to trust based cross layer security protocol against sybil att...
An improvement to trust based cross layer security protocol against sybil att...An improvement to trust based cross layer security protocol against sybil att...
An improvement to trust based cross layer security protocol against sybil att...Alexander Decker
 
A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...Pvrtechnologies Nellore
 
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...1crore projects
 
A comparative study on different trust based routing schemes in manet
A comparative study on different trust based routing schemes in manetA comparative study on different trust based routing schemes in manet
A comparative study on different trust based routing schemes in manetijwmn
 
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant NetworkDetecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant NetworkIRJET Journal
 
Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...LogicMindtech Nologies
 
IRJET- Analysis of Router Poisoning using Network Attacks
IRJET- Analysis of Router Poisoning using Network AttacksIRJET- Analysis of Router Poisoning using Network Attacks
IRJET- Analysis of Router Poisoning using Network AttacksIRJET Journal
 

Similar to Detect Misbehavior in DTNs Using Trust Authority (20)

ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
 
Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...
Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...
Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...
 
Modelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless NetworksModelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless Networks
 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
 
Iaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detectionIaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detection
 
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
 
Review on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETsReview on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETs
 
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachMitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
 
Optimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning AlgorithmOptimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning Algorithm
 
A survey of Network Intrusion Detection using soft computing Technique
A survey of Network Intrusion Detection using soft computing TechniqueA survey of Network Intrusion Detection using soft computing Technique
A survey of Network Intrusion Detection using soft computing Technique
 
M dgx mde0mdm=
M dgx mde0mdm=M dgx mde0mdm=
M dgx mde0mdm=
 
An improvement to trust based cross layer security protocol against sybil att...
An improvement to trust based cross layer security protocol against sybil att...An improvement to trust based cross layer security protocol against sybil att...
An improvement to trust based cross layer security protocol against sybil att...
 
A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...
 
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...
 
A comparative study on different trust based routing schemes in manet
A comparative study on different trust based routing schemes in manetA comparative study on different trust based routing schemes in manet
A comparative study on different trust based routing schemes in manet
 
L 1000 423
L 1000 423L 1000 423
L 1000 423
 
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant NetworkDetecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
 
06558266
0655826606558266
06558266
 
Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...
 
IRJET- Analysis of Router Poisoning using Network Attacks
IRJET- Analysis of Router Poisoning using Network AttacksIRJET- Analysis of Router Poisoning using Network Attacks
IRJET- Analysis of Router Poisoning using Network Attacks
 

More from John Ajish

ydchdfjdjgjfkhgchgkhhcghkgkkhkgkgkhkgckhgk
ydchdfjdjgjfkhgchgkhhcghkgkkhkgkgkhkgckhgkydchdfjdjgjfkhgchgkhhcghkgkkhkgkgkhkgckhgk
ydchdfjdjgjfkhgchgkhhcghkgkkhkgkgkhkgckhgkJohn Ajish
 
tturutruruutrrxfjvfjgjgddfjfjdgjfdjfjgjdfgj
tturutruruutrrxfjvfjgjgddfjfjdgjfdjfjgjdfgjtturutruruutrrxfjvfjgjgddfjfjdgjfdjfjgjdfgj
tturutruruutrrxfjvfjgjgddfjfjdgjfdjfjgjdfgjJohn Ajish
 
Afasdhdfvjukgkrgdfbdzthgsdhgjjkvdxfhdfhfdh
AfasdhdfvjukgkrgdfbdzthgsdhgjjkvdxfhdfhfdhAfasdhdfvjukgkrgdfbdzthgsdhgjjkvdxfhdfhfdh
AfasdhdfvjukgkrgdfbdzthgsdhgjjkvdxfhdfhfdhJohn Ajish
 
GJFJFJXFJFJGGJFGJKIKJCGXYGZDFJZDJKGXJNHV
GJFJFJXFJFJGGJFGJKIKJCGXYGZDFJZDJKGXJNHVGJFJFJXFJFJGGJFGJKIKJCGXYGZDFJZDJKGXJNHV
GJFJFJXFJFJGGJFGJKIKJCGXYGZDFJZDJKGXJNHVJohn Ajish
 
saasgsdgdsgsdgdszvvetfdfdsgAsafgfsdgsgsdg
saasgsdgdsgsdgdszvvetfdfdsgAsafgfsdgsgsdgsaasgsdgdsgsdgdszvvetfdfdsgAsafgfsdgsgsdg
saasgsdgdsgsdgdszvvetfdfdsgAsafgfsdgsgsdgJohn Ajish
 
WRASASgDGGS DDGBLFAfbJKCfaiGFBKsIgsdJBIGDSKJ
WRASASgDGGS DDGBLFAfbJKCfaiGFBKsIgsdJBIGDSKJWRASASgDGGS DDGBLFAfbJKCfaiGFBKsIgsdJBIGDSKJ
WRASASgDGGS DDGBLFAfbJKCfaiGFBKsIgsdJBIGDSKJJohn Ajish
 
DOGAODHGOHDODOOanffaHSFOHGHASOGHSOGHGHAOGHOGHAOGG
DOGAODHGOHDODOOanffaHSFOHGHASOGHSOGHGHAOGHOGHAOGGDOGAODHGOHDODOOanffaHSFOHGHASOGHSOGHGHAOGHOGHAOGG
DOGAODHGOHDODOOanffaHSFOHGHASOGHSOGHGHAOGHOGHAOGGJohn Ajish
 
FINAL REVIEWADAFASFSAFASFAFSFSGGaGGV HBKJS
FINAL REVIEWADAFASFSAFASFAFSFSGGaGGV HBKJSFINAL REVIEWADAFASFSAFASFAFSFSGGaGGV HBKJS
FINAL REVIEWADAFASFSAFASFAFSFSGGaGGV HBKJSJohn Ajish
 
ffzvVxvzxvzxvzvzxvvxzvzx xnbdn asxh aabckkz
ffzvVxvzxvzxvzvzxvvxzvzx xnbdn asxh  aabckkzffzvVxvzxvzxvzvzxvvxzvzx xnbdn asxh  aabckkz
ffzvVxvzxvzxvzvzxvvxzvzx xnbdn asxh aabckkzJohn Ajish
 
PROJECT REVIVE.pptx
PROJECT REVIVE.pptxPROJECT REVIVE.pptx
PROJECT REVIVE.pptxJohn Ajish
 
FINAL REVIEW.pptx
FINAL  REVIEW.pptxFINAL  REVIEW.pptx
FINAL REVIEW.pptxJohn Ajish
 

More from John Ajish (20)

ydchdfjdjgjfkhgchgkhhcghkgkkhkgkgkhkgckhgk
ydchdfjdjgjfkhgchgkhhcghkgkkhkgkgkhkgckhgkydchdfjdjgjfkhgchgkhhcghkgkkhkgkgkhkgckhgk
ydchdfjdjgjfkhgchgkhhcghkgkkhkgkgkhkgckhgk
 
tturutruruutrrxfjvfjgjgddfjfjdgjfdjfjgjdfgj
tturutruruutrrxfjvfjgjgddfjfjdgjfdjfjgjdfgjtturutruruutrrxfjvfjgjgddfjfjdgjfdjfjgjdfgj
tturutruruutrrxfjvfjgjgddfjfjdgjfdjfjgjdfgj
 
Afasdhdfvjukgkrgdfbdzthgsdhgjjkvdxfhdfhfdh
AfasdhdfvjukgkrgdfbdzthgsdhgjjkvdxfhdfhfdhAfasdhdfvjukgkrgdfbdzthgsdhgjjkvdxfhdfhfdh
Afasdhdfvjukgkrgdfbdzthgsdhgjjkvdxfhdfhfdh
 
GJFJFJXFJFJGGJFGJKIKJCGXYGZDFJZDJKGXJNHV
GJFJFJXFJFJGGJFGJKIKJCGXYGZDFJZDJKGXJNHVGJFJFJXFJFJGGJFGJKIKJCGXYGZDFJZDJKGXJNHV
GJFJFJXFJFJGGJFGJKIKJCGXYGZDFJZDJKGXJNHV
 
saasgsdgdsgsdgdszvvetfdfdsgAsafgfsdgsgsdg
saasgsdgdsgsdgdszvvetfdfdsgAsafgfsdgsgsdgsaasgsdgdsgsdgdszvvetfdfdsgAsafgfsdgsgsdg
saasgsdgdsgsdgdszvvetfdfdsgAsafgfsdgsgsdg
 
WRASASgDGGS DDGBLFAfbJKCfaiGFBKsIgsdJBIGDSKJ
WRASASgDGGS DDGBLFAfbJKCfaiGFBKsIgsdJBIGDSKJWRASASgDGGS DDGBLFAfbJKCfaiGFBKsIgsdJBIGDSKJ
WRASASgDGGS DDGBLFAfbJKCfaiGFBKsIgsdJBIGDSKJ
 
DOGAODHGOHDODOOanffaHSFOHGHASOGHSOGHGHAOGHOGHAOGG
DOGAODHGOHDODOOanffaHSFOHGHASOGHSOGHGHAOGHOGHAOGGDOGAODHGOHDODOOanffaHSFOHGHASOGHSOGHGHAOGHOGHAOGG
DOGAODHGOHDODOOanffaHSFOHGHASOGHSOGHGHAOGHOGHAOGG
 
FINAL REVIEWADAFASFSAFASFAFSFSGGaGGV HBKJS
FINAL REVIEWADAFASFSAFASFAFSFSGGaGGV HBKJSFINAL REVIEWADAFASFSAFASFAFSFSGGaGGV HBKJS
FINAL REVIEWADAFASFSAFASFAFSFSGGaGGV HBKJS
 
ffzvVxvzxvzxvzvzxvvxzvzx xnbdn asxh aabckkz
ffzvVxvzxvzxvzvzxvvxzvzx xnbdn asxh  aabckkzffzvVxvzxvzxvzvzxvvxzvzx xnbdn asxh  aabckkz
ffzvVxvzxvzxvzvzxvvxzvzx xnbdn asxh aabckkz
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
 
FINAL PPT.pdf
FINAL PPT.pdfFINAL PPT.pdf
FINAL PPT.pdf
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
 
PROJECT REVIVE.pptx
PROJECT REVIVE.pptxPROJECT REVIVE.pptx
PROJECT REVIVE.pptx
 
1 REVIEW.pptx
1  REVIEW.pptx1  REVIEW.pptx
1 REVIEW.pptx
 
FINAL REVIEW.pptx
FINAL  REVIEW.pptxFINAL  REVIEW.pptx
FINAL REVIEW.pptx
 
ppt1.ppt
ppt1.pptppt1.ppt
ppt1.ppt
 

Recently uploaded

4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 

Recently uploaded (20)

4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 

Detect Misbehavior in DTNs Using Trust Authority

  • 1. DETECTION OF MISBEHAVIOR IN DELAY TOLERANT NETWORK USING TRUST AUTHORITY
  • 2. Abstract Malicious and selfish behaviors represent a serious threat against routing in delay/disruption tolerant networks ((DTNs). Due to the selfish nature and energy consuming, selfish nodes are not willing to forward packets for others without sufficient reward. Due to the malicious nature, malicious nodes that drop packets or modifying the packets to launch attacks (black hole or gray hole attack). In this project, iTrust, a probabilistic misbehavior detection scheme, for secure DTN routing toward efficient trust establishment. In our model iTrust as the inspection game and use game theoretical analysis, by setting an appropriate probability. Correlate detection probability with a node’s reputation, which allows a dynamic detection probability determined by the trust of the users.
  • 3. Existing System  In existing system, incentive protocol, called Pi.  Pi protocol can also thwart various attacks, which could be launched by selfish DTN nodes.  It doesn’t set a routing path in advance, but only need to attach some incentive on the bundle.  In the reward model, to achieve fairness.
  • 4. Disadvantages  Fails in privacy protection.  High computation.  Transmission overhead and verification cost is high.  High variation in network condition.
  • 5. Proposed System  Misbehaviors Detection in most of which are based on forwarding history verification.  An efficient and adaptive misbehavior detection and reputation management scheme is highly desirable in DTN  TA, which could launch the probabilistic detection for the target node and judge it by collecting the forwarding history evidence from its upstream and downstream nodes.  TA could punish or compensate the node based on its behaviors.
  • 6. Advantages  Detect the malicious nodes effectively.  More secure.  Reduce computation cost.  Reduce transmission overhead incurred by misbehavior detection.