SlideShare a Scribd company logo
1 of 7
DETECTION OF MISBEHAVIOR IN
DELAY TOLERANT NETWORK USING
TRUST AUTHORITY
Abstract
Malicious and selfish behaviors represent a serious
threat against routing in delay/disruption tolerant networks
((DTNs). Due to the selfish nature and energy consuming,
selfish nodes are not willing to forward packets for others
without sufficient reward. Due to the malicious nature,
malicious nodes that drop packets or modifying the packets
to launch attacks (black hole or gray hole attack). In this
project, iTrust, a probabilistic misbehavior detection
scheme, for secure DTN routing toward efficient trust
establishment. In our model iTrust as the inspection game
and use game theoretical analysis, by setting an appropriate
probability. Correlate detection probability with a node’s
reputation, which allows a dynamic detection probability
determined by the trust of the users.
Existing System
 In existing system, incentive protocol, called Pi.
 Pi protocol can also thwart various attacks, which could be
launched by selfish DTN nodes.
 It doesn’t set a routing path in advance, but only need to
attach some incentive on the bundle.
 In the reward model, to achieve fairness.
Disadvantages
 Fails in privacy protection.
 High computation.
 Transmission overhead and verification cost is high.
 High variation in network condition.
Proposed System
 Misbehaviors Detection in most of which are based on
forwarding history verification.
 An efficient and adaptive misbehavior detection and
reputation management scheme is highly desirable in DTN
 TA, which could launch the probabilistic detection for the
target node and judge it by collecting the forwarding
history evidence from its upstream and downstream nodes.
 TA could punish or compensate the node based on its
behaviors.
Advantages
 Detect the malicious nodes effectively.
 More secure.
 Reduce computation cost.
 Reduce transmission overhead incurred by misbehavior
detection.
THANK YOU

More Related Content

Similar to Detect Misbehavior in DTNs Using Trust Authority

ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...IDES Editor
 
Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...
Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...
Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...Kishan Patel
 
Modelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless NetworksModelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless Networksijeei-iaes
 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...CSCJournals
 
Iaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detectionIaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detectionIaetsd Iaetsd
 
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...IRJET Journal
 
Review on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETsReview on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETsijtsrd
 
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachMitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachIJLT EMAS
 
Optimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning AlgorithmOptimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning Algorithmijtsrd
 
A survey of Network Intrusion Detection using soft computing Technique
A survey of Network Intrusion Detection using soft computing TechniqueA survey of Network Intrusion Detection using soft computing Technique
A survey of Network Intrusion Detection using soft computing Techniqueijsrd.com
 
An improvement to trust based cross layer security protocol against sybil att...
An improvement to trust based cross layer security protocol against sybil att...An improvement to trust based cross layer security protocol against sybil att...
An improvement to trust based cross layer security protocol against sybil att...Alexander Decker
 
A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...Pvrtechnologies Nellore
 
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...1crore projects
 
A comparative study on different trust based routing schemes in manet
A comparative study on different trust based routing schemes in manetA comparative study on different trust based routing schemes in manet
A comparative study on different trust based routing schemes in manetijwmn
 
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant NetworkDetecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant NetworkIRJET Journal
 
Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...LogicMindtech Nologies
 
IRJET- Analysis of Router Poisoning using Network Attacks
IRJET- Analysis of Router Poisoning using Network AttacksIRJET- Analysis of Router Poisoning using Network Attacks
IRJET- Analysis of Router Poisoning using Network AttacksIRJET Journal
 

Similar to Detect Misbehavior in DTNs Using Trust Authority (20)

ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
 
Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...
Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...
Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...
 
Modelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless NetworksModelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless Networks
 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
 
Iaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detectionIaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detection
 
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
 
Review on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETsReview on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETs
 
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachMitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
 
Optimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning AlgorithmOptimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning Algorithm
 
A survey of Network Intrusion Detection using soft computing Technique
A survey of Network Intrusion Detection using soft computing TechniqueA survey of Network Intrusion Detection using soft computing Technique
A survey of Network Intrusion Detection using soft computing Technique
 
M dgx mde0mdm=
M dgx mde0mdm=M dgx mde0mdm=
M dgx mde0mdm=
 
An improvement to trust based cross layer security protocol against sybil att...
An improvement to trust based cross layer security protocol against sybil att...An improvement to trust based cross layer security protocol against sybil att...
An improvement to trust based cross layer security protocol against sybil att...
 
A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...
 
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...
 
A comparative study on different trust based routing schemes in manet
A comparative study on different trust based routing schemes in manetA comparative study on different trust based routing schemes in manet
A comparative study on different trust based routing schemes in manet
 
L 1000 423
L 1000 423L 1000 423
L 1000 423
 
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant NetworkDetecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
 
06558266
0655826606558266
06558266
 
Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...
 
IRJET- Analysis of Router Poisoning using Network Attacks
IRJET- Analysis of Router Poisoning using Network AttacksIRJET- Analysis of Router Poisoning using Network Attacks
IRJET- Analysis of Router Poisoning using Network Attacks
 

More from John Ajish

ydchdfjdjgjfkhgchgkhhcghkgkkhkgkgkhkgckhgk
ydchdfjdjgjfkhgchgkhhcghkgkkhkgkgkhkgckhgkydchdfjdjgjfkhgchgkhhcghkgkkhkgkgkhkgckhgk
ydchdfjdjgjfkhgchgkhhcghkgkkhkgkgkhkgckhgkJohn Ajish
 
tturutruruutrrxfjvfjgjgddfjfjdgjfdjfjgjdfgj
tturutruruutrrxfjvfjgjgddfjfjdgjfdjfjgjdfgjtturutruruutrrxfjvfjgjgddfjfjdgjfdjfjgjdfgj
tturutruruutrrxfjvfjgjgddfjfjdgjfdjfjgjdfgjJohn Ajish
 
Afasdhdfvjukgkrgdfbdzthgsdhgjjkvdxfhdfhfdh
AfasdhdfvjukgkrgdfbdzthgsdhgjjkvdxfhdfhfdhAfasdhdfvjukgkrgdfbdzthgsdhgjjkvdxfhdfhfdh
AfasdhdfvjukgkrgdfbdzthgsdhgjjkvdxfhdfhfdhJohn Ajish
 
GJFJFJXFJFJGGJFGJKIKJCGXYGZDFJZDJKGXJNHV
GJFJFJXFJFJGGJFGJKIKJCGXYGZDFJZDJKGXJNHVGJFJFJXFJFJGGJFGJKIKJCGXYGZDFJZDJKGXJNHV
GJFJFJXFJFJGGJFGJKIKJCGXYGZDFJZDJKGXJNHVJohn Ajish
 
saasgsdgdsgsdgdszvvetfdfdsgAsafgfsdgsgsdg
saasgsdgdsgsdgdszvvetfdfdsgAsafgfsdgsgsdgsaasgsdgdsgsdgdszvvetfdfdsgAsafgfsdgsgsdg
saasgsdgdsgsdgdszvvetfdfdsgAsafgfsdgsgsdgJohn Ajish
 
WRASASgDGGS DDGBLFAfbJKCfaiGFBKsIgsdJBIGDSKJ
WRASASgDGGS DDGBLFAfbJKCfaiGFBKsIgsdJBIGDSKJWRASASgDGGS DDGBLFAfbJKCfaiGFBKsIgsdJBIGDSKJ
WRASASgDGGS DDGBLFAfbJKCfaiGFBKsIgsdJBIGDSKJJohn Ajish
 
DOGAODHGOHDODOOanffaHSFOHGHASOGHSOGHGHAOGHOGHAOGG
DOGAODHGOHDODOOanffaHSFOHGHASOGHSOGHGHAOGHOGHAOGGDOGAODHGOHDODOOanffaHSFOHGHASOGHSOGHGHAOGHOGHAOGG
DOGAODHGOHDODOOanffaHSFOHGHASOGHSOGHGHAOGHOGHAOGGJohn Ajish
 
FINAL REVIEWADAFASFSAFASFAFSFSGGaGGV HBKJS
FINAL REVIEWADAFASFSAFASFAFSFSGGaGGV HBKJSFINAL REVIEWADAFASFSAFASFAFSFSGGaGGV HBKJS
FINAL REVIEWADAFASFSAFASFAFSFSGGaGGV HBKJSJohn Ajish
 
ffzvVxvzxvzxvzvzxvvxzvzx xnbdn asxh aabckkz
ffzvVxvzxvzxvzvzxvvxzvzx xnbdn asxh  aabckkzffzvVxvzxvzxvzvzxvvxzvzx xnbdn asxh  aabckkz
ffzvVxvzxvzxvzvzxvvxzvzx xnbdn asxh aabckkzJohn Ajish
 
PROJECT REVIVE.pptx
PROJECT REVIVE.pptxPROJECT REVIVE.pptx
PROJECT REVIVE.pptxJohn Ajish
 
FINAL REVIEW.pptx
FINAL  REVIEW.pptxFINAL  REVIEW.pptx
FINAL REVIEW.pptxJohn Ajish
 

More from John Ajish (20)

ydchdfjdjgjfkhgchgkhhcghkgkkhkgkgkhkgckhgk
ydchdfjdjgjfkhgchgkhhcghkgkkhkgkgkhkgckhgkydchdfjdjgjfkhgchgkhhcghkgkkhkgkgkhkgckhgk
ydchdfjdjgjfkhgchgkhhcghkgkkhkgkgkhkgckhgk
 
tturutruruutrrxfjvfjgjgddfjfjdgjfdjfjgjdfgj
tturutruruutrrxfjvfjgjgddfjfjdgjfdjfjgjdfgjtturutruruutrrxfjvfjgjgddfjfjdgjfdjfjgjdfgj
tturutruruutrrxfjvfjgjgddfjfjdgjfdjfjgjdfgj
 
Afasdhdfvjukgkrgdfbdzthgsdhgjjkvdxfhdfhfdh
AfasdhdfvjukgkrgdfbdzthgsdhgjjkvdxfhdfhfdhAfasdhdfvjukgkrgdfbdzthgsdhgjjkvdxfhdfhfdh
Afasdhdfvjukgkrgdfbdzthgsdhgjjkvdxfhdfhfdh
 
GJFJFJXFJFJGGJFGJKIKJCGXYGZDFJZDJKGXJNHV
GJFJFJXFJFJGGJFGJKIKJCGXYGZDFJZDJKGXJNHVGJFJFJXFJFJGGJFGJKIKJCGXYGZDFJZDJKGXJNHV
GJFJFJXFJFJGGJFGJKIKJCGXYGZDFJZDJKGXJNHV
 
saasgsdgdsgsdgdszvvetfdfdsgAsafgfsdgsgsdg
saasgsdgdsgsdgdszvvetfdfdsgAsafgfsdgsgsdgsaasgsdgdsgsdgdszvvetfdfdsgAsafgfsdgsgsdg
saasgsdgdsgsdgdszvvetfdfdsgAsafgfsdgsgsdg
 
WRASASgDGGS DDGBLFAfbJKCfaiGFBKsIgsdJBIGDSKJ
WRASASgDGGS DDGBLFAfbJKCfaiGFBKsIgsdJBIGDSKJWRASASgDGGS DDGBLFAfbJKCfaiGFBKsIgsdJBIGDSKJ
WRASASgDGGS DDGBLFAfbJKCfaiGFBKsIgsdJBIGDSKJ
 
DOGAODHGOHDODOOanffaHSFOHGHASOGHSOGHGHAOGHOGHAOGG
DOGAODHGOHDODOOanffaHSFOHGHASOGHSOGHGHAOGHOGHAOGGDOGAODHGOHDODOOanffaHSFOHGHASOGHSOGHGHAOGHOGHAOGG
DOGAODHGOHDODOOanffaHSFOHGHASOGHSOGHGHAOGHOGHAOGG
 
FINAL REVIEWADAFASFSAFASFAFSFSGGaGGV HBKJS
FINAL REVIEWADAFASFSAFASFAFSFSGGaGGV HBKJSFINAL REVIEWADAFASFSAFASFAFSFSGGaGGV HBKJS
FINAL REVIEWADAFASFSAFASFAFSFSGGaGGV HBKJS
 
ffzvVxvzxvzxvzvzxvvxzvzx xnbdn asxh aabckkz
ffzvVxvzxvzxvzvzxvvxzvzx xnbdn asxh  aabckkzffzvVxvzxvzxvzvzxvvxzvzx xnbdn asxh  aabckkz
ffzvVxvzxvzxvzvzxvvxzvzx xnbdn asxh aabckkz
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
 
FINAL PPT.pdf
FINAL PPT.pdfFINAL PPT.pdf
FINAL PPT.pdf
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
 
PROJECT REVIVE.pptx
PROJECT REVIVE.pptxPROJECT REVIVE.pptx
PROJECT REVIVE.pptx
 
1 REVIEW.pptx
1  REVIEW.pptx1  REVIEW.pptx
1 REVIEW.pptx
 
FINAL REVIEW.pptx
FINAL  REVIEW.pptxFINAL  REVIEW.pptx
FINAL REVIEW.pptx
 
ppt1.ppt
ppt1.pptppt1.ppt
ppt1.ppt
 

Recently uploaded

mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 

Recently uploaded (20)

Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 

Detect Misbehavior in DTNs Using Trust Authority

  • 1. DETECTION OF MISBEHAVIOR IN DELAY TOLERANT NETWORK USING TRUST AUTHORITY
  • 2. Abstract Malicious and selfish behaviors represent a serious threat against routing in delay/disruption tolerant networks ((DTNs). Due to the selfish nature and energy consuming, selfish nodes are not willing to forward packets for others without sufficient reward. Due to the malicious nature, malicious nodes that drop packets or modifying the packets to launch attacks (black hole or gray hole attack). In this project, iTrust, a probabilistic misbehavior detection scheme, for secure DTN routing toward efficient trust establishment. In our model iTrust as the inspection game and use game theoretical analysis, by setting an appropriate probability. Correlate detection probability with a node’s reputation, which allows a dynamic detection probability determined by the trust of the users.
  • 3. Existing System  In existing system, incentive protocol, called Pi.  Pi protocol can also thwart various attacks, which could be launched by selfish DTN nodes.  It doesn’t set a routing path in advance, but only need to attach some incentive on the bundle.  In the reward model, to achieve fairness.
  • 4. Disadvantages  Fails in privacy protection.  High computation.  Transmission overhead and verification cost is high.  High variation in network condition.
  • 5. Proposed System  Misbehaviors Detection in most of which are based on forwarding history verification.  An efficient and adaptive misbehavior detection and reputation management scheme is highly desirable in DTN  TA, which could launch the probabilistic detection for the target node and judge it by collecting the forwarding history evidence from its upstream and downstream nodes.  TA could punish or compensate the node based on its behaviors.
  • 6. Advantages  Detect the malicious nodes effectively.  More secure.  Reduce computation cost.  Reduce transmission overhead incurred by misbehavior detection.