Recognition of Misbehaviour Actions in Delay Tolerant Networks using Trusted Authority

International Journal of Computer Trends and Technology (IJCTT)          
© 2018 by IJCTT Journal
Volume-59 Number-2
Year of Publication : 2018
Authors : J. Dhinesh, Dr.K.Siva Sankar, J.P.Jayan
DOI :  10.14445/22312803/IJCTT-V59P117


J. Dhinesh, Dr.K.Siva Sankar, J.P.Jayan "Recognition of Misbehaviour Actions in Delay Tolerant Networks using Trusted Authority". International Journal of Computer Trends and Technology (IJCTT) V59(2):99-102, May 2018. ISSN:2231-2803. Published by Seventh Sense Research Group.

Due to the exclusive network features, planning a misconductdiscoverystructure in DTN is observed as an excessive experiment. In this work, a misconduct discovery structure, for protected DTN routing neareffectualfaithformation. The simple knowledge of iTrust is presenting a occasionallyobtainable Trusted Authority (TA) to justice the node’s performance established on the composed suggestions. iTrust use the game hypotheticalinvestigation to prove that, by scenery an suitableexaminationprospect, TA could guarantee the protection of DTN routing at a compactcharge. To additionaladvance the competence of the planned structure, which allows prospect resolute by the faith of the operators. The wide spread investigation then reproduction consequences prove the efficiency and competence of the plannedprocess.

[1] R. Lu, X. Lin, H. Zhu, and X. Shen, “SPARK: A New VANETBased Smart Parking Scheme for Large Parking Lots,” Proc. IEEE INFOCOM ’09, Apr. 2009.
[2] Hossmann, T. Spyropoulos, and F. Legendre, “Know the Neighbor: Towards Optimal Mapping of Contacts to Social Graphs for DTN Routing,” Proc. IEEE INFOCOM ’10, 2010.
[3] Li, S. Zhu, and G. Cao, “Routing in Socially Selfish Delay- Tolerant Networks,” Proc. IEEE INFOCOM ’10, 2010.Griffiths M., Educational Research for Social Justice, Open University Press, pp. 38-39, 1998.
[4] Zhu, X. Lin, R. Lu, Y. Fan, and X. Shen, “SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks,” IEEE Trans. Vehicular Technology, vol. 58, no. 8, pp. 828-836, 2009.
[5] Zhu, X. Lin, R. Lu, P.-H. Ho, and X. Shen, “SLAB: Secure Localized Authentication and Billing Scheme for Wireless Mesh Networks,” IEEE Trans. Wireless Comm., vol. 17, no. 10, pp. 3858- 3868, Oct. 2008.
[6] Li and G. Cao, “Mitigating Routing Misbehavior in Disruption Tolerant Networks,” IEEE Trans. Information Forensics and Security, vol. 7, no. 2, pp. 664-675, Apr. 2012.
[7] Marti, T.J. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” Proc. ACM MobiCom ’00, 2000.

DTN, iTrust ,TA