Cooperation Based Defense Mechanism against Selfish Nodes in DTNs

被引:5
|
作者
Bhoiwala, Jaina P. [1 ]
Jhaveri, Rutvij H. [1 ]
机构
[1] Shri Sad Vidya Mandal Inst Technol, POB 392001, Bharuch, Gujarat, India
关键词
Delay tolerant network; security; routing; selfishness; PRoPHET protocol;
D O I
10.1145/3136825.3136893
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While Delay Tolerant Networks (DTNs) have exposed to offer guaranteeing additions to infrastructure based networks, they introduce new issues. As the nodes in the DTNs use store-carry forward mechanism for routing, they need energy, battery power, bandwidth, memory or CPU utilization. Due to lack of these resources the node drops the packets. In this paper, firstly, we discuss different issues and research works carried out for selfish nodes' detection. Defending these selfish nodes accurately becomes vital in DTNs. In this paper, we present Cooperation Based Defense Mechanism (CBDM) against selfish nodes in DTNs. Furthermore, we study basic operations and security issues of Probabilistic Routing Protocol based on History Encounters and Transitivity (PRoPHET). This paper address a static mandatory cooperation scheme in which the nodes are forced to behave well. Moreover, a mechanism is used to calculate cooperation of selfishness of nodes by checking the number of sent messages and number of received messages. A bait detection scheme is used to confirm malicious behavior of suspicious nodes. Simulation results show that the proposed approach reduces the number of selfish nodes along with the decrease in the number of dropped packets and overhead ratio.
引用
收藏
页码:268 / 273
页数:6
相关论文
共 50 条
  • [41] CoCoWa: A Collaborative Contact-Based Watchdog for Detecting Selfish Nodes
    Hernandez-Orallo, Enrique
    Serrat Olmos, Manuel David
    Cano, Juan-Carlos
    Calafate, Carlos T.
    Manzoni, Pietro
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2015, 14 (06) : 1162 - 1175
  • [43] Scenario-based defense mechanism against vulnerabilities in Lagrange-based DMPC
    Maestre, Jose M.
    Velarde, Pablo
    Ishii, Hideaki
    Negenborn, Rudy R.
    CONTROL ENGINEERING PRACTICE, 2021, 114
  • [44] NEUTROPHIL MACROPHAGE COOPERATION IN THE HOST DEFENSE AGAINST MYCOBACTERIAL INFECTIONS
    SILVA, MT
    NAZARE, M
    SILVA, T
    APPELBERG, R
    MICROBIAL PATHOGENESIS, 1989, 6 (05) : 369 - 380
  • [45] A Reputation Based Incentive Mechanism for Selfish BitTorrent System
    Wang Miao
    Zhang Yujun
    Meng Xuying
    2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 1348 - 1353
  • [46] Reliability factor-based mathematical model for isolating selfish nodes in MANETs
    Department of Computer Science and Engineering, Pondicherry Engineering College, EC Road, Pillaichavady, Pondicherry - 605014, India
    Int. J. Inf. Commun. Technol., 3-4 (403-421):
  • [47] An auction based AODV protocol for mobile ad hoc networks with selfish nodes
    Demir, Cenker
    Comaniciu, Cristina
    2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 3351 - 3356
  • [48] Social Contribution-Based Routing Protocol for Vehicular Network with Selfish Nodes
    Gong, Haigang
    Yu, Lingfei
    Zhang, Xue
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [49] Implementation of an SDN-based Security Defense Mechanism Against DDoS Attacks
    Lin, Hsiao-Chung
    Wang, Ping
    JOINT 2016 INTERNATIONAL CONFERENCE ON ECONOMICS AND MANAGEMENT ENGINEERING (ICEME 2016) AND INTERNATIONAL CONFERENCE ON ECONOMICS AND BUSINESS MANAGEMENT (EBM 2016), 2016, : 377 - 383
  • [50] EUROPEAN COOPERATION IN SPACE-BASED DEFENSE
    不详
    SPACE POLICY, 1991, 7 (04) : 337 - 337