Dynamic trust management for delay tolerant networks and its application to secure routing
Delay tolerant networks (DTNs) are characterized by high end-to-end latency, frequent disconnection, and opportunistic communication over unreliable wireless links. In this paper, we design and validate a dynamic trust management protocol for secure routing optimization in DTN environments in the presence of well-behaved, selfish and malicious nodes. We develop a novel model-based methodology for the analysis of our trust protocol and validate
3. LeMeniz Infotech
LeMeniz Infotech a Leading Software Concern in Pondicherry Stepping in IEEE Projects 2014-
2015. We are Proud to Presents Android App for IEEE Projects Titles 2014-2015.
Download From : www.ieeeprojectspondicherrry.weebly.com
Student Benefits:
=>No False Commitment
=>Real Time Implementation
->27 X 7 Online Supports
=>Individual Attention
=>100% Satisfaction
In Project Based Implementation we give maximum
exposure to students in
=>Project Requirement Specification
=>Software Requirement Specification
=>Coding Techniques
=>Project flow Diagram
=>Project Documentation
=>Project Testing
=>PPT preparation
=>Project Based viva questions
=>Project Based Interview questions for Placements
4. Projects Technology
@LeMeniz Infotech
LeMeniz Infotech
For More IEEE Projects Titles
Visit : www.lemenizinfotech.com
5. LeMeniz Infotech
Projects Domains
@LeMeniz Infotech
For More IEEE Projects Titles
Visit : www.lemenizinfotech.com
6. Dynamic Trust Management for Delay Tolerant Networks
and Its Application to Secure Routing
@LeMeniz Infotech
7. Abstract
Delay tolerant networks (DTNs) are characterized by high end-to-end latency, frequent
disconnection, and opportunistic communication over unreliable wireless links. In this
paper, we design and validate a dynamic trust management protocol
for secure routing optimization in DTN environments in the presence of well-behaved,
selfish and malicious nodes. We develop a novel model-based methodology for the
analysis of our trust protocol and validate it via extensive simulation. Moreover, we
address dynamic trust management, i.e., determining and applying the best
operational settings at runtime in response to dynamically
changing network conditions to minimize trust bias and to maximize
the routing application performance. We perform a comparative analysis of our
proposed routing protocol against Bayesian trust-based and non-trust based (PROPHET
and epidemic) routing protocols. The results demonstrate that our protocol is able to
deal with selfish behaviors and is resilient against trust-related attacks. Furthermore,
our trust-based routing protocol can effectively trade off message overhead and
message delay for a significant gain in delivery ratio. Our trust-based routing protocol
operating under identified best settings outperforms Bayesian trust-based routing and
PROPHET, and approaches the ideal performance of epidemic routing in delivery ratio
and message delay without incurring high message or protocol maintenance overhead
8. Introduction
Many studies focus on information theoretical and physical layer aspects,
such as link capacity, coding, and relay positioning in simple scenarios often
with only three nodes The study of cooperative diversity in large networks
and the design of link-layer protocols enabling the use of relays has found
less attention. We believe that cooperative diversity will not be
implemented in practice until protocols supporting the physical layer to
exploit the benefits of diversity are designed and properly specified. To this
end, we focus on the design of Medium Access Control (MAC) protocols for
cooperative relay systems and specify design blocks of a MAC protocol that
can be readily incorporated into existing wireless systems.
9. EXISTING SYSTEM
A delay tolerant network (DTN) comprises mobile nodes (e.g., humans in a
social DTN) experiencing sparse connection, opportunistic communication,
and frequently changing network topology.
Because of lack of end-to-end connectivity, routing in DTN adopts a
storecarry- and-forward scheme by which messages are forwarded through
a number of intermediate nodes leveraging opportunistic encountering,
hence resulting in high end-to-end latency.
10. PROPOSED SYSTEM
• Social trust deriving from social networks and traditional quality of service
(QoS) trust deriving from communication networks into a composite trust
metric to assess the trust of a node in a DTN. To cope with both malicious
and socially selfish nodes, we consider “healthiness” and “unselfishness” as
two social trust metrics.
• The issue of application performance maximization (trust-based DTN
routing in this paper) through dynamic trust management by adjusting
trust aggregation/formation protocol settings dynamically in response to
changing conditions to maximize DTN routing performance. Essentially we
address the importance of integration of trust and security metrics into
routing and replication decisions in DTNs.
11. Advantages
• Allows the best trust setting for trust aggregation to be
identified so that subjective
• trust is closest to objective trust for each individual trust
property for minimizing trust bias.
• We performed a comparative analysis of trust-based secure
routing running on top of our trust management protocol
with Bayesian trustbased routing and non-trust-based
routing protocols (PROPHET and epidemic) in DTNs.
• DTN routing performance and developing trust and
security management protocols for delay-tolerant, self-contained
message forwarding applications based on the
information-centric networks (ICN) architecture.
12. Reference
Sendonaris, E. Erkip, and B. Aazhang, “User cooperation
diversity – Part I: System description,” IEEE Trans. Commun.,
vol. 51, no. 11, pp. 1927–1938, Nov. 2003.
Ayday, H. Lee, and F. Fekri, “Trust Management and Adversary
Detection for Delay Tolerant Networks,” Proc. Military Comm.
Conf., pp. 1788-1793, 2010
13. Hardware Specification
Processor : Any Processor above 500 MHz.
Ram : 128Mb.
Hard Disk : 10 Gb.
Compact Disk : 650 Mb.
Input device : Standard Keyboard and Mouse.
Output device : VGA and High Resolution Monitor.
15. Dynamic Trust Management for Delay Tolerant Networks
and Its Application to Secure Routing
To Get this Project with
Complete Document
Reach Us :
LeMeniz Infotech
36, 100 Feet Road,
Natesan Nagar,
Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444,
+91 99625 88976,
95663 55386.
We Are Ready for You
For More Project Title Call Us Rafee
9962588976 / 9566355386
Mail : projects@lemenizinfotech.com