Cooperation Based Defense Mechanism against Selfish Nodes in DTNs

被引:5
|
作者
Bhoiwala, Jaina P. [1 ]
Jhaveri, Rutvij H. [1 ]
机构
[1] Shri Sad Vidya Mandal Inst Technol, POB 392001, Bharuch, Gujarat, India
关键词
Delay tolerant network; security; routing; selfishness; PRoPHET protocol;
D O I
10.1145/3136825.3136893
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While Delay Tolerant Networks (DTNs) have exposed to offer guaranteeing additions to infrastructure based networks, they introduce new issues. As the nodes in the DTNs use store-carry forward mechanism for routing, they need energy, battery power, bandwidth, memory or CPU utilization. Due to lack of these resources the node drops the packets. In this paper, firstly, we discuss different issues and research works carried out for selfish nodes' detection. Defending these selfish nodes accurately becomes vital in DTNs. In this paper, we present Cooperation Based Defense Mechanism (CBDM) against selfish nodes in DTNs. Furthermore, we study basic operations and security issues of Probabilistic Routing Protocol based on History Encounters and Transitivity (PRoPHET). This paper address a static mandatory cooperation scheme in which the nodes are forced to behave well. Moreover, a mechanism is used to calculate cooperation of selfishness of nodes by checking the number of sent messages and number of received messages. A bait detection scheme is used to confirm malicious behavior of suspicious nodes. Simulation results show that the proposed approach reduces the number of selfish nodes along with the decrease in the number of dropped packets and overhead ratio.
引用
收藏
页码:268 / 273
页数:6
相关论文
共 50 条
  • [31] A secure MANET routing protocol with resilience against byzantine behaviours of malicious or selfish nodes
    Crepeau, Claude
    Davis, Carlton R.
    Maheswaran, Muthucumaru
    21ST INTERNATIONAL CONFERENCE ON ADVANCED NETWORKING AND APPLICATIONS WORKSHOPS/SYMPOSIA, VOL 2, PROCEEDINGS, 2007, : 19 - +
  • [32] A Downlink Fairness Mechanism for Selfish Nodes in Multi-Hop Wireless Backhaul Networks
    Lee, Jeng-Farn
    Chen, Xin-Wei
    2010 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC 2010), 2010,
  • [33] A Hyper-Exponential Factor-Based Semi-Markov Prediction Mechanism for Selfish Rendezvous Nodes in MANETs
    Janakiraman, Sengathir
    Jayasingh, Bipin Bihari
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 108 (03) : 1493 - 1511
  • [34] A Pareto Survivor Function Based Cluster Head Selection Mechanism (PSFCHSM) to Mitigate Selfish Nodes in Wireless Sensor Networks
    Rajarajeswari, P. L.
    Karthikeyan, N. K.
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 381 - 391
  • [35] A Hyper-Exponential Factor-Based Semi-Markov Prediction Mechanism for Selfish Rendezvous Nodes in MANETs
    Sengathir Janakiraman
    Bipin Bihari Jayasingh
    Wireless Personal Communications, 2019, 108 : 1493 - 1511
  • [36] DEFENSE-MECHANISM AGAINST MENINGOCOCCUS
    CAPDEVILA, JA
    PAHISSA, A
    MEDICINA CLINICA, 1995, 105 (03): : 94 - 95
  • [37] Fuzzy-Based Trust Model for Detection of Selfish Nodes in MANETs
    Ullah, Zia
    Khan, Muhammad Saleem
    Ahmed, Idrees
    Javaid, Nadeem
    Khan, Majid I.
    IEEE 30TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS IEEE AINA 2016, 2016, : 965 - 972
  • [38] UTERINE DEFENSE MECHANISM AGAINST INFECTION
    GOODALL, JR
    AMERICAN JOURNAL OF OBSTETRICS AND GYNECOLOGY, 1945, 49 (04) : 532 - 541
  • [39] Game Theoretical Defense Mechanism Against Reputation Based Sybil Attacks
    Kumar, Bhupender
    Bhuyan, Bubu
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE, 2020, 167 : 2465 - 2477
  • [40] Multi-Defense Mechanism against DDoS in SDN based CDNi
    Nishat-I-Mowla
    Doh, Inshil
    Chae, Kijoon
    2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2014, : 447 - 451