SlideShare a Scribd company logo
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1723
DETECTING MISBEHAVIOR NODES USING SECURED DELAY TOLERANT
NETWORK
S.Aiswarya1, G.Vanitha2 , C.B. LogaPreethi3, A.Monica4
1Assistant Professor, Department of Computer Science and Engineering, Velammal Institute of technology, Chennai.
2,3,4UG Student, Department of Computer Science and Engineering, Velammal Institute of technology, Chennai.
-----------------------------------------------------------------------------------------------------------------------------------------------------
ABSTRACT - Delay Tolerant Networks (DTN) assumes
that the network nodes voluntarily cooperate in order
to work properly. This cooperation is a cost-intensive
activity and some nodes can refuse to cooperate,
leading to a selfish node behavior. Normally nodes are
required to exchange their encounter data, in which
malicious nodes are intentionally drop all or part.Thus
the overall network performance could be seriously
affected. Thus, we propose Statistical-based Detection of
Blackhole and Greyhole attackers (SDBG to address
both individual and collusion attacks. To detect the
individual misbehavioring nodes As shown in the paper,
detect the attacker node at a time and increases the
precision when detecting selfish nodes. Extensive
simulation shows that our solution can work with
various dropping probabilities and different number of
attackers per collusion at high accuracy and low false
positive.
Keywords used: Delay Tolerant Network, Blackhole
attack and Greyhole attack
1. INTRODUCTION
DTN makes use of hop-by-hop routing and the
store-and-forward paradigm to overcome the lack of end-
to-end paths. DTN is threatened by various attacks,
including black- hole and greyhole. Blackhole attackers
drops all the received messages even if they have enough
buffer storage. Greyhole attackers drops received
messages partially. The malicious nodes will decrease the
overall message delivery and waste the resources of
intermediate nodes.
[1], [2] require trusted ferries to check if nodes
arbitrarily increase their delivery probabilities to absorb
more data, which is preliminary to the dropping attack. [3]
depends on a trusted authority to investigate nodes based
on the evidences of forwarding tasks, contact
opportunities and actual forwarding behaviors. [4] designs
a trust-based framework in which the message forwarding
behavior is acknowledged and rewarded with reputation.
[5], [6], and [7] make use of node’s encounter records to
detect or mitigate the impact of the attack. In the above
methods, only individual attackers can be found, they
cannot handle multiple attackers. For example, in an
individual detection method, is for each nodes, histories of
encounters will be evaluated with other nodes, i.e.,
encounter records. A node is suspected as malicious if it’s
forwarding ratio is lower than a threshold. Forwarding
ratio is the ratio between the total number of sent
messages and receive messages. This method will work if
attackers tend to drop received messages instead of
sending them. If attackers cooperate with each other node
and creates the forged encounter records by boosting the
forwarding ratio. So, this kind of cooperative attacks can
be detected by this method. This type of attack is called as
collusion attack. In the proposed method, Statistical-based
Detection of Blackhole and Greyhole (SDBG), which can
detect both individual and collusion attacks with high
accuracy is used. SDBG is designed based on the following
observations. Forwarding ratio is used to find individual
attack, attackers tend to send out their own messages
rather than messages of other nodes. The individual
detection accuracy can be improved by observing the
number of self-sent messages. In collusion attacks, since
attackers need to frequently create fake encounter records
to boost the forwarding ratio metric, their number of sent
messages can be high. This observation enables us to
detect collusion attack.
2. RELATED WORK
Zhaoyu Gaoy experimented with malicious and selfish
behaviors represent a serious threat against routing in
Delay or Disruption Tolerant Networks (DTNs). Due to the
unique network characteristics, designing a misbehavior
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1724
detection scheme in DTN represents a great challenge. The
basic idea of a probabilistic misbehavior detection scheme
(PMDS) is introducing a periodically available Trusted
Authority (TA), which judges the node’s behavior based on
the collected routing evidences. PMDS model is the
Inspection Game and use game theoretical analysis to
demonstrate that, by setting an appropriate investigation
probability, TA could ensure the security of DTN routing at
a reduced cost. To improve the efficiency of the scheme,
correlate detection probability with a node’s reputation,
which allows a dynamic detection probability determined
by a node’s reputation. The extensive analysis and
simulation results show that the scheme substantiates the
effectiveness and efficiency of the scheme.
Qinghua Li worked in disruption tolerant networks
(DTNs), selfish or malicious nodes may drop received
packets. Such routing misbehavior reduces the packet
delivery ratio and wastes system resources such as power
and bandwidth. Although techniques have been proposed
to mitigate routing misbehavior in mobile ad hoc
networks, they cannot be directly applied to DTNs because
of the intermittent connectivity between nodes. To address
the problem, a distributed scheme is used to detect packet
dropping in DTNs. In a scheme, a node is required to keep
a few signed contact records of its previous contacts, based
on which the next contacted node can detect if the node
has dropped any packet. Since misbehaving nodes may
misreport their contact records to avoid being detected, a
small part of each contact record is disseminated to a
certain number of witness nodes, which can collect
appropriate contact records and detect the misbehaving
nodes. A scheme to mitigate routing misbehavior by
limiting the number of packets forwarded to the
misbehaving nodes is used. Trace-driven simulations show
these solutions which are efficient and can effectively
mitigate routing misbehavior.
Yanzhi Ren found that the Disruption Tolerant Networks
(DTNs) are vulnerable to insider attacks, in which the
legitimate nodes are compromised and the adversary
modifies the delivery metrics of the node to launch
harmful attacks in the networks. The traditional detection
approaches of secure routing protocols cannot address
such kind of insider attacks in DTNs. A mutual correlation
detection scheme (MUTON) for addressing these insider
attacks. MUTON takes into consideration of the transitive
property when calculating the packet delivery probability
of each node and correlates the information collected from
other nodes. To evaluate this approach through extensive
simulations using both Random Way Point and Zebranet
mobility models. The results show that MUTON can detect
insider attacks efficiently with high detection rate and low
false positive rate.
3. PROPOSED SYSTEM
Statistical-based Detection of Blackhole and
Greyhole attackers (SDBG) to address both individual and
collusion attacks to detect .A authority to reduce the time
and improve the effectiveness of detecting selfish nodes,
reducing the harmful effect of false positives, and
malicious nodes. When a contact occurs between two or
more collaborative nodes. We can thus enhance the
individual detection accuracy by further observing the
number of selfsent messages Each and every nodes
updated to identify the authority. So easy to detect
collusion and individual attack and we can produce high
accuracy and low false positive.
3.1 Network Formation and Authority
Creation
First we can create a Trusted Authority and then
create network node assume the communication range of a
node is finite. Thus a data sender out of destination node’s
communication range can only transmit packetized data
via a sequence of intermediate nodes in a multi-hop
manner. For the simplicity of presentation, we take a
three-step data forwarding process as an example.
Suppose that node A has packets, which will be delivered
to node C. Now, if node A meets another node B that could
help to forward the packets to C, A will replicate and
forward the packets to B. Thereafter, B will forward the
packets to C when C arrives at the transmission range of B.
In this process, we define three kinds of data forwarding
evidences. They are Delegation Task Evidence, Forwarding
History Evidence and Contact History Evidence, Encounter
Records, Message Records.
Fig- 1: Authority Details
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1725
3.1.1 First Contact Algorithm
First contact algorithm is used in the proposed
approach. First contact algorithm is the algorithm is used
to find the nearest neighboring node in the network. It is
mainly used for hop-by-hop communication in Delay
Tolerant Network. For example, let consider the three
nodes a1, a2 and a3. Using First contact algorithm, each node
can find nearest node by creating a contact history will
have the information (name of the nearest neighbour node,
time of that node creation) about each and every nearest
node. Thus, the neighbour node can be found.
Fig-2: Contact History
3.2 Route Finding and Data Forwarding
A normal user will honestly follow the forwarding
the messages as long as there are enough contacts. The
requested message has been forwarded to the next hop,
the chosen next hop nodes. We assume a trusted authority
with the right to assign each node a unique identifier and a
pair of public and private keys. Nodes are assumed to
know the public keys of each other so that they can
authenticate messages signed by others. we model the
general behaviors of nodes as follows. When two nodes
encounter and exchange messages, each of them generates
an Encounter Record (ER) and stores it in its own storage.
The ER includes the identities of two nodes, the ER
sequence numbers assigned by them, the encounter
timestamp and the lists of sent and received messages
between the two parties and their signatures.
3.3 Detecting for colluding Attacks
When two nodes are communicating via
intermediate node some time individuals adversaries
launches an attacker first receives messages from other
nodes but later drops them with a certain probability.
Blackhole attacker drops all received messages (dropping
probability = 100%) while greyhole attacker drops
partially (dropping probability lower than 100 percent).
The dropping occurs even if the attacker still has enough
buffer to store messages , Introduces a SDBG, which could
launch the trusted authority based watchdog for the target
node and judge it by collecting the forwarding history
evidence from its upstream and downstream nodes. Each
node maintains a local black list which lists malicious
nodes that it detects as blackhole or greyhole attackers If
any node is detected as committing either misbehaviors,
authority will punish it accordingly and then trusted
authority add blacklist and send malicious node name to
all nodes. . To further improve the performance of the
proposed Statistical-based Detection on scheme, we
introduce a reputation system, in which the inspection
probability could vary along with the target node’s
reputation. Under the reputation system, a node with a
good reputation will be checked with a lower probability
while a bad reputation node could be checked with a
higher probability.
4. RESULT AND ANALYSIS
Finding the route and detecting the black hole and grey
hole attacks has been implemented and the results are
shown below:
Fig-3: Finding the route
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1726
Fig-4: Detecting Greyhole and Blackhole Attacks
5. CONCLUSION AND FUTURE WORK:
We propose a method SDBG that can successfully
prevent not only individual attackers but also cooperating
attackers. The simulation results show that SDBG can
detect colluding malicious nodes with high detection rate
and low false positive rate when varying the number of
colluding nodes and with a wide range of packet- dropping
probability and different routing protocols.
REFERENCES
[1] M. Chuah, P. Yang, and J. Han, “A ferry-based intrusion
detection scheme for sparsely connected ad-hoc
networks,” in Proc. 4th Annu. Int. Conf. Workshop Security
Emerging Ubiquitous Comput., 2007.
[2] Y. Ren, M. Chuah, J. Yang, and Y. Chen, “MUTON:
Detecting malicious nodes in disrupt-tolerant networks,”
in Proc. IEEE Wire- less Commun. Netw. Conf., 2010.
[3] Z. Gao, H. Zhu, S. Du, C. Xiao, and R. Lu, “PMDS: A
probabilistic misbehavior detection scheme toward
efficient trust establish- ment in Delay-tolerant networks,”
IEEE Trans. Parallel Distrib. Syst., Jan. 2014.
[4] N. Li and S. K. Das, “A trust-based framework for data
forward- ing in opportunistic networks,” Elsevier J. Ad Hoc
Netw., 2013.
[5] F. Li, J. Wu, and A. Srinivasan,, “Thwarting blackhole
attacks in disrupt-tolerant networks using encounter
tickets,” in Proc. INFOCOMM, 2009.
[6] Y. Guo, S. Schildt, and L. Wolf, “Detecting blackhole and
greyhole attacks in vehicular delay tolerant networks,” in
Proc. IEEE 5th Int. Conf. Commun. Syst. Netw., Jan. 2013.
[7] Q. Li and G. Cao, “Mitigating routing misbehaviors in
disruption tolerant networks,” IEEE Trans. Inf. Forensics
Security, Apr. 2012.
[8] J. Ott and D. Kutscher, “A disconnection-tolerant
transport for drive-thru internet environments,” in Proc.
IEEE 24th Annu. Joint Conf. Comput. Commun. Soc., Mar.
2005.
[9] J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine,
“Maxprop: Routing for vehicle-based disruption-tolerant
networks,” in Proc. IEEE Int. Conf. Comput. Commun.,
Barcelona, Spain, Apr. 2006.
[10] M. J. Khabbaz, C. M. Assi, and W. F. Fawaz, “Disruption-
tolerant networking: A comprehensive survey on recent
developments and persisting challenges,” in Proc. IEEE
Commun. Surveys Tuts., 2012.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072

More Related Content

What's hot

IRJET- Secure Data Transmission from Malicious Attacks: A Review
IRJET-  	  Secure Data Transmission from Malicious Attacks: A ReviewIRJET-  	  Secure Data Transmission from Malicious Attacks: A Review
IRJET- Secure Data Transmission from Malicious Attacks: A Review
IRJET Journal
 
Defending against collaborative attacks by
Defending against collaborative attacks byDefending against collaborative attacks by
Defending against collaborative attacks by
jpstudcorner
 
Enhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor NetworksEnhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor Networks
Eswar Publications
 
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
ranjith kumar
 
Behavioral Model to Detect Anomalous Attacks in Packet Transmission
Behavioral Model to Detect Anomalous Attacks in Packet TransmissionBehavioral Model to Detect Anomalous Attacks in Packet Transmission
Behavioral Model to Detect Anomalous Attacks in Packet Transmission
IOSR Journals
 
Defending against collaborative attacks by
Defending against collaborative attacks byDefending against collaborative attacks by
Defending against collaborative attacks by
ranjith kumar
 
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1422  Defending Against Collaborative Attacks by Malicious Nodes in MANETs...JPN1422  Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
chennaijp
 
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANETPDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
ijsptm
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
IJNSA Journal
 
Icimt 2010 procediing rp118 vol.2 d10122
Icimt 2010 procediing rp118 vol.2 d10122Icimt 2010 procediing rp118 vol.2 d10122
Icimt 2010 procediing rp118 vol.2 d10122
Gulshan Shrivastava
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
IJNSA Journal
 
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
IRJET Journal
 
zebra curtain
zebra curtainzebra curtain
zebra curtain
curtainnikjou
 

What's hot (13)

IRJET- Secure Data Transmission from Malicious Attacks: A Review
IRJET-  	  Secure Data Transmission from Malicious Attacks: A ReviewIRJET-  	  Secure Data Transmission from Malicious Attacks: A Review
IRJET- Secure Data Transmission from Malicious Attacks: A Review
 
Defending against collaborative attacks by
Defending against collaborative attacks byDefending against collaborative attacks by
Defending against collaborative attacks by
 
Enhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor NetworksEnhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor Networks
 
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
 
Behavioral Model to Detect Anomalous Attacks in Packet Transmission
Behavioral Model to Detect Anomalous Attacks in Packet TransmissionBehavioral Model to Detect Anomalous Attacks in Packet Transmission
Behavioral Model to Detect Anomalous Attacks in Packet Transmission
 
Defending against collaborative attacks by
Defending against collaborative attacks byDefending against collaborative attacks by
Defending against collaborative attacks by
 
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1422  Defending Against Collaborative Attacks by Malicious Nodes in MANETs...JPN1422  Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
 
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANETPDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
 
Icimt 2010 procediing rp118 vol.2 d10122
Icimt 2010 procediing rp118 vol.2 d10122Icimt 2010 procediing rp118 vol.2 d10122
Icimt 2010 procediing rp118 vol.2 d10122
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
 
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
 
zebra curtain
zebra curtainzebra curtain
zebra curtain
 

Similar to Detecting Misbehavior Nodes Using Secured Delay Tolerant Network

Trust Providence in Delay Tolerant Networks
Trust Providence in Delay Tolerant NetworksTrust Providence in Delay Tolerant Networks
Trust Providence in Delay Tolerant Networks
theijes
 
Iaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detectionIaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detection
Iaetsd Iaetsd
 
Exclusion of Denial of Service Attack using Graph Theory in MANETS
Exclusion of Denial of Service Attack using Graph Theory in MANETSExclusion of Denial of Service Attack using Graph Theory in MANETS
Exclusion of Denial of Service Attack using Graph Theory in MANETS
IRJET Journal
 
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachMitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
IJLT EMAS
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
ijceronline
 
B010110514
B010110514B010110514
B010110514
IOSR Journals
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
IDES Editor
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
ijp2p
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
ijp2p
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
ijp2p
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
ijp2p
 
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET Journal
 
Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...
Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...
Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...
rahulmonikasharma
 
a probabilistic misbehavior detection scheme toward efficient trust establish...
a probabilistic misbehavior detection scheme toward efficient trust establish...a probabilistic misbehavior detection scheme toward efficient trust establish...
a probabilistic misbehavior detection scheme toward efficient trust establish...
swathi78
 
Robust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksRobust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networks
ijdpsjournal
 
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETs
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETsAn Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETs
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETs
IJMER
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
IRJET Journal
 
Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...
Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...
Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...
IJECEIAES
 
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
Editor IJMTER
 
K1803036872
K1803036872K1803036872
K1803036872
IOSR Journals
 

Similar to Detecting Misbehavior Nodes Using Secured Delay Tolerant Network (20)

Trust Providence in Delay Tolerant Networks
Trust Providence in Delay Tolerant NetworksTrust Providence in Delay Tolerant Networks
Trust Providence in Delay Tolerant Networks
 
Iaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detectionIaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detection
 
Exclusion of Denial of Service Attack using Graph Theory in MANETS
Exclusion of Denial of Service Attack using Graph Theory in MANETSExclusion of Denial of Service Attack using Graph Theory in MANETS
Exclusion of Denial of Service Attack using Graph Theory in MANETS
 
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachMitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
 
B010110514
B010110514B010110514
B010110514
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
 
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
 
Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...
Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...
Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...
 
a probabilistic misbehavior detection scheme toward efficient trust establish...
a probabilistic misbehavior detection scheme toward efficient trust establish...a probabilistic misbehavior detection scheme toward efficient trust establish...
a probabilistic misbehavior detection scheme toward efficient trust establish...
 
Robust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksRobust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networks
 
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETs
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETsAn Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETs
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETs
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
 
Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...
Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...
Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...
 
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
 
K1803036872
K1803036872K1803036872
K1803036872
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
yokeleetan1
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
Mukeshwaran Balu
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
Madhumitha Jayaram
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
PuktoonEngr
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
PauloRodrigues104553
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 

Recently uploaded (20)

basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 

Detecting Misbehavior Nodes Using Secured Delay Tolerant Network

  • 1. © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1723 DETECTING MISBEHAVIOR NODES USING SECURED DELAY TOLERANT NETWORK S.Aiswarya1, G.Vanitha2 , C.B. LogaPreethi3, A.Monica4 1Assistant Professor, Department of Computer Science and Engineering, Velammal Institute of technology, Chennai. 2,3,4UG Student, Department of Computer Science and Engineering, Velammal Institute of technology, Chennai. ----------------------------------------------------------------------------------------------------------------------------------------------------- ABSTRACT - Delay Tolerant Networks (DTN) assumes that the network nodes voluntarily cooperate in order to work properly. This cooperation is a cost-intensive activity and some nodes can refuse to cooperate, leading to a selfish node behavior. Normally nodes are required to exchange their encounter data, in which malicious nodes are intentionally drop all or part.Thus the overall network performance could be seriously affected. Thus, we propose Statistical-based Detection of Blackhole and Greyhole attackers (SDBG to address both individual and collusion attacks. To detect the individual misbehavioring nodes As shown in the paper, detect the attacker node at a time and increases the precision when detecting selfish nodes. Extensive simulation shows that our solution can work with various dropping probabilities and different number of attackers per collusion at high accuracy and low false positive. Keywords used: Delay Tolerant Network, Blackhole attack and Greyhole attack 1. INTRODUCTION DTN makes use of hop-by-hop routing and the store-and-forward paradigm to overcome the lack of end- to-end paths. DTN is threatened by various attacks, including black- hole and greyhole. Blackhole attackers drops all the received messages even if they have enough buffer storage. Greyhole attackers drops received messages partially. The malicious nodes will decrease the overall message delivery and waste the resources of intermediate nodes. [1], [2] require trusted ferries to check if nodes arbitrarily increase their delivery probabilities to absorb more data, which is preliminary to the dropping attack. [3] depends on a trusted authority to investigate nodes based on the evidences of forwarding tasks, contact opportunities and actual forwarding behaviors. [4] designs a trust-based framework in which the message forwarding behavior is acknowledged and rewarded with reputation. [5], [6], and [7] make use of node’s encounter records to detect or mitigate the impact of the attack. In the above methods, only individual attackers can be found, they cannot handle multiple attackers. For example, in an individual detection method, is for each nodes, histories of encounters will be evaluated with other nodes, i.e., encounter records. A node is suspected as malicious if it’s forwarding ratio is lower than a threshold. Forwarding ratio is the ratio between the total number of sent messages and receive messages. This method will work if attackers tend to drop received messages instead of sending them. If attackers cooperate with each other node and creates the forged encounter records by boosting the forwarding ratio. So, this kind of cooperative attacks can be detected by this method. This type of attack is called as collusion attack. In the proposed method, Statistical-based Detection of Blackhole and Greyhole (SDBG), which can detect both individual and collusion attacks with high accuracy is used. SDBG is designed based on the following observations. Forwarding ratio is used to find individual attack, attackers tend to send out their own messages rather than messages of other nodes. The individual detection accuracy can be improved by observing the number of self-sent messages. In collusion attacks, since attackers need to frequently create fake encounter records to boost the forwarding ratio metric, their number of sent messages can be high. This observation enables us to detect collusion attack. 2. RELATED WORK Zhaoyu Gaoy experimented with malicious and selfish behaviors represent a serious threat against routing in Delay or Disruption Tolerant Networks (DTNs). Due to the unique network characteristics, designing a misbehavior International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
  • 2. © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1724 detection scheme in DTN represents a great challenge. The basic idea of a probabilistic misbehavior detection scheme (PMDS) is introducing a periodically available Trusted Authority (TA), which judges the node’s behavior based on the collected routing evidences. PMDS model is the Inspection Game and use game theoretical analysis to demonstrate that, by setting an appropriate investigation probability, TA could ensure the security of DTN routing at a reduced cost. To improve the efficiency of the scheme, correlate detection probability with a node’s reputation, which allows a dynamic detection probability determined by a node’s reputation. The extensive analysis and simulation results show that the scheme substantiates the effectiveness and efficiency of the scheme. Qinghua Li worked in disruption tolerant networks (DTNs), selfish or malicious nodes may drop received packets. Such routing misbehavior reduces the packet delivery ratio and wastes system resources such as power and bandwidth. Although techniques have been proposed to mitigate routing misbehavior in mobile ad hoc networks, they cannot be directly applied to DTNs because of the intermittent connectivity between nodes. To address the problem, a distributed scheme is used to detect packet dropping in DTNs. In a scheme, a node is required to keep a few signed contact records of its previous contacts, based on which the next contacted node can detect if the node has dropped any packet. Since misbehaving nodes may misreport their contact records to avoid being detected, a small part of each contact record is disseminated to a certain number of witness nodes, which can collect appropriate contact records and detect the misbehaving nodes. A scheme to mitigate routing misbehavior by limiting the number of packets forwarded to the misbehaving nodes is used. Trace-driven simulations show these solutions which are efficient and can effectively mitigate routing misbehavior. Yanzhi Ren found that the Disruption Tolerant Networks (DTNs) are vulnerable to insider attacks, in which the legitimate nodes are compromised and the adversary modifies the delivery metrics of the node to launch harmful attacks in the networks. The traditional detection approaches of secure routing protocols cannot address such kind of insider attacks in DTNs. A mutual correlation detection scheme (MUTON) for addressing these insider attacks. MUTON takes into consideration of the transitive property when calculating the packet delivery probability of each node and correlates the information collected from other nodes. To evaluate this approach through extensive simulations using both Random Way Point and Zebranet mobility models. The results show that MUTON can detect insider attacks efficiently with high detection rate and low false positive rate. 3. PROPOSED SYSTEM Statistical-based Detection of Blackhole and Greyhole attackers (SDBG) to address both individual and collusion attacks to detect .A authority to reduce the time and improve the effectiveness of detecting selfish nodes, reducing the harmful effect of false positives, and malicious nodes. When a contact occurs between two or more collaborative nodes. We can thus enhance the individual detection accuracy by further observing the number of selfsent messages Each and every nodes updated to identify the authority. So easy to detect collusion and individual attack and we can produce high accuracy and low false positive. 3.1 Network Formation and Authority Creation First we can create a Trusted Authority and then create network node assume the communication range of a node is finite. Thus a data sender out of destination node’s communication range can only transmit packetized data via a sequence of intermediate nodes in a multi-hop manner. For the simplicity of presentation, we take a three-step data forwarding process as an example. Suppose that node A has packets, which will be delivered to node C. Now, if node A meets another node B that could help to forward the packets to C, A will replicate and forward the packets to B. Thereafter, B will forward the packets to C when C arrives at the transmission range of B. In this process, we define three kinds of data forwarding evidences. They are Delegation Task Evidence, Forwarding History Evidence and Contact History Evidence, Encounter Records, Message Records. Fig- 1: Authority Details International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
  • 3. © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1725 3.1.1 First Contact Algorithm First contact algorithm is used in the proposed approach. First contact algorithm is the algorithm is used to find the nearest neighboring node in the network. It is mainly used for hop-by-hop communication in Delay Tolerant Network. For example, let consider the three nodes a1, a2 and a3. Using First contact algorithm, each node can find nearest node by creating a contact history will have the information (name of the nearest neighbour node, time of that node creation) about each and every nearest node. Thus, the neighbour node can be found. Fig-2: Contact History 3.2 Route Finding and Data Forwarding A normal user will honestly follow the forwarding the messages as long as there are enough contacts. The requested message has been forwarded to the next hop, the chosen next hop nodes. We assume a trusted authority with the right to assign each node a unique identifier and a pair of public and private keys. Nodes are assumed to know the public keys of each other so that they can authenticate messages signed by others. we model the general behaviors of nodes as follows. When two nodes encounter and exchange messages, each of them generates an Encounter Record (ER) and stores it in its own storage. The ER includes the identities of two nodes, the ER sequence numbers assigned by them, the encounter timestamp and the lists of sent and received messages between the two parties and their signatures. 3.3 Detecting for colluding Attacks When two nodes are communicating via intermediate node some time individuals adversaries launches an attacker first receives messages from other nodes but later drops them with a certain probability. Blackhole attacker drops all received messages (dropping probability = 100%) while greyhole attacker drops partially (dropping probability lower than 100 percent). The dropping occurs even if the attacker still has enough buffer to store messages , Introduces a SDBG, which could launch the trusted authority based watchdog for the target node and judge it by collecting the forwarding history evidence from its upstream and downstream nodes. Each node maintains a local black list which lists malicious nodes that it detects as blackhole or greyhole attackers If any node is detected as committing either misbehaviors, authority will punish it accordingly and then trusted authority add blacklist and send malicious node name to all nodes. . To further improve the performance of the proposed Statistical-based Detection on scheme, we introduce a reputation system, in which the inspection probability could vary along with the target node’s reputation. Under the reputation system, a node with a good reputation will be checked with a lower probability while a bad reputation node could be checked with a higher probability. 4. RESULT AND ANALYSIS Finding the route and detecting the black hole and grey hole attacks has been implemented and the results are shown below: Fig-3: Finding the route International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
  • 4. © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1726 Fig-4: Detecting Greyhole and Blackhole Attacks 5. CONCLUSION AND FUTURE WORK: We propose a method SDBG that can successfully prevent not only individual attackers but also cooperating attackers. The simulation results show that SDBG can detect colluding malicious nodes with high detection rate and low false positive rate when varying the number of colluding nodes and with a wide range of packet- dropping probability and different routing protocols. REFERENCES [1] M. Chuah, P. Yang, and J. Han, “A ferry-based intrusion detection scheme for sparsely connected ad-hoc networks,” in Proc. 4th Annu. Int. Conf. Workshop Security Emerging Ubiquitous Comput., 2007. [2] Y. Ren, M. Chuah, J. Yang, and Y. Chen, “MUTON: Detecting malicious nodes in disrupt-tolerant networks,” in Proc. IEEE Wire- less Commun. Netw. Conf., 2010. [3] Z. Gao, H. Zhu, S. Du, C. Xiao, and R. Lu, “PMDS: A probabilistic misbehavior detection scheme toward efficient trust establish- ment in Delay-tolerant networks,” IEEE Trans. Parallel Distrib. Syst., Jan. 2014. [4] N. Li and S. K. Das, “A trust-based framework for data forward- ing in opportunistic networks,” Elsevier J. Ad Hoc Netw., 2013. [5] F. Li, J. Wu, and A. Srinivasan,, “Thwarting blackhole attacks in disrupt-tolerant networks using encounter tickets,” in Proc. INFOCOMM, 2009. [6] Y. Guo, S. Schildt, and L. Wolf, “Detecting blackhole and greyhole attacks in vehicular delay tolerant networks,” in Proc. IEEE 5th Int. Conf. Commun. Syst. Netw., Jan. 2013. [7] Q. Li and G. Cao, “Mitigating routing misbehaviors in disruption tolerant networks,” IEEE Trans. Inf. Forensics Security, Apr. 2012. [8] J. Ott and D. Kutscher, “A disconnection-tolerant transport for drive-thru internet environments,” in Proc. IEEE 24th Annu. Joint Conf. Comput. Commun. Soc., Mar. 2005. [9] J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine, “Maxprop: Routing for vehicle-based disruption-tolerant networks,” in Proc. IEEE Int. Conf. Comput. Commun., Barcelona, Spain, Apr. 2006. [10] M. J. Khabbaz, C. M. Assi, and W. F. Fawaz, “Disruption- tolerant networking: A comprehensive survey on recent developments and persisting challenges,” in Proc. IEEE Commun. Surveys Tuts., 2012. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072