Cooperation Based Defense Mechanism against Selfish Nodes in DTNs

被引:5
|
作者
Bhoiwala, Jaina P. [1 ]
Jhaveri, Rutvij H. [1 ]
机构
[1] Shri Sad Vidya Mandal Inst Technol, POB 392001, Bharuch, Gujarat, India
关键词
Delay tolerant network; security; routing; selfishness; PRoPHET protocol;
D O I
10.1145/3136825.3136893
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While Delay Tolerant Networks (DTNs) have exposed to offer guaranteeing additions to infrastructure based networks, they introduce new issues. As the nodes in the DTNs use store-carry forward mechanism for routing, they need energy, battery power, bandwidth, memory or CPU utilization. Due to lack of these resources the node drops the packets. In this paper, firstly, we discuss different issues and research works carried out for selfish nodes' detection. Defending these selfish nodes accurately becomes vital in DTNs. In this paper, we present Cooperation Based Defense Mechanism (CBDM) against selfish nodes in DTNs. Furthermore, we study basic operations and security issues of Probabilistic Routing Protocol based on History Encounters and Transitivity (PRoPHET). This paper address a static mandatory cooperation scheme in which the nodes are forced to behave well. Moreover, a mechanism is used to calculate cooperation of selfishness of nodes by checking the number of sent messages and number of received messages. A bait detection scheme is used to confirm malicious behavior of suspicious nodes. Simulation results show that the proposed approach reduces the number of selfish nodes along with the decrease in the number of dropped packets and overhead ratio.
引用
收藏
页码:268 / 273
页数:6
相关论文
共 50 条
  • [21] Detecting Selfish Nodes and Motivating Cooperation in Mobile Ad-hoc Networks
    AbdelMohsen, Doaa
    Abdelkader, Tamer
    2015 TENTH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2015, : 301 - 306
  • [22] An incentive-based fairness mechanism for multi-hop wireless backhaul networks with selfish nodes
    Lee, JengFarn
    Liao, Wanjiun
    Chen, Meng Chang
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (02) : 697 - 704
  • [23] Best neighbor strategy to enforce cooperation among selfish nodes in wireless ad hoc network
    Komathy, K.
    Narayanasamy, P.
    COMPUTER COMMUNICATIONS, 2007, 30 (18) : 3721 - 3735
  • [24] SimRouter : Message routing based on Similarity and Relative Probable Positions of nodes in DTNs
    Kumar, Gaurav
    Singh, Yatindra Nath
    2021 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION, NETWORKS AND SATELLITE (COMNETSAT 2021), 2021, : 231 - 238
  • [25] Load balancing mechanism and selfish nodes detection in peer-to-peer network
    Liu, M., 1600, Asian Network for Scientific Information (12):
  • [26] Study on Throughput of Network with Selfish Nodes Based on IEEE 802.15.4
    Li, Haiping
    Mao, Jianlin
    Guo, Ning
    Zhang, Bin
    ADVANCED RESEARCH ON COMPUTER EDUCATION, SIMULATION AND MODELING, PT I, 2011, 175 : 411 - 417
  • [27] Analysing credit based ARAN to detect selfish nodes in MANET
    Kurkure, A. M.
    Chaudhari, Bhakti
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN ENGINEERING AND TECHNOLOGY RESEARCH (ICAETR), 2014,
  • [28] Publish or Perish: A Backward-Compatible Defense Against Selfish Mining in Bitcoin
    Zhang, Ren
    Preneel, Bart
    TOPICS IN CRYPTOLOGY - CT-RSA 2017, 2017, 10159 : 277 - 292
  • [29] A nodes cooperation based multi-path transmission mechanism for wireless sensor network
    Ji, Peng
    Wu, Cheng-Dong
    Zhang, Yun-Zhou
    Zhang, Jian
    Dongbei Daxue Xuebao/Journal of Northeastern University, 2010, 31 (SUPPL. 2): : 279 - 282
  • [30] Natural cooperation in wireless networks: When can selfish nodes cooperate without extrinsic incentive mechanisms?
    Department of Electrical and Computer Engineering, Worcester Polytechnic Institute, Worcester, MA, United States
    IEEE Signal Process Mag, 2009, 5 (98-106):