SlideShare a Scribd company logo
1 of 7
DETECTION OF MISBEHAVIOR IN
DELAY TOLERANT NETWORK USING
TRUST AUTHORITY
Abstract
Malicious and selfish behaviors represent a serious
threat against routing in delay/disruption tolerant networks
((DTNs). Due to the selfish nature and energy consuming,
selfish nodes are not willing to forward packets for others
without sufficient reward. Due to the malicious nature,
malicious nodes that drop packets or modifying the packets
to launch attacks (black hole or gray hole attack). In this
project, iTrust, a probabilistic misbehavior detection
scheme, for secure DTN routing toward efficient trust
establishment. In our model iTrust as the inspection game
and use game theoretical analysis, by setting an appropriate
probability. Correlate detection probability with a node’s
reputation, which allows a dynamic detection probability
determined by the trust of the users.
Existing System
 In existing system, incentive protocol, called Pi.
 Pi protocol can also thwart various attacks, which could be
launched by selfish DTN nodes.
 It doesn’t set a routing path in advance, but only need to
attach some incentive on the bundle.
 In the reward model, to achieve fairness.
Disadvantages
 Fails in privacy protection.
 High computation.
 Transmission overhead and verification cost is high.
 High variation in network condition.
Proposed System
 Misbehaviors Detection in most of which are based on
forwarding history verification.
 An efficient and adaptive misbehavior detection and
reputation management scheme is highly desirable in DTN
 TA, which could launch the probabilistic detection for the
target node and judge it by collecting the forwarding
history evidence from its upstream and downstream nodes.
 TA could punish or compensate the node based on its
behaviors.
Advantages
 Detect the malicious nodes effectively.
 More secure.
 Reduce computation cost.
 Reduce transmission overhead incurred by misbehavior
detection.
THANK YOU

More Related Content

Similar to PPT.ppt

Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...
Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...
Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...
Kishan Patel
 
Optimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning AlgorithmOptimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning Algorithm
ijtsrd
 
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...
1crore projects
 

Similar to PPT.ppt (20)

ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
 
Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...
Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...
Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...
 
Modelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless NetworksModelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless Networks
 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
 
Iaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detectionIaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detection
 
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
 
Review on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETsReview on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETs
 
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachMitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
 
Optimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning AlgorithmOptimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning Algorithm
 
A survey of Network Intrusion Detection using soft computing Technique
A survey of Network Intrusion Detection using soft computing TechniqueA survey of Network Intrusion Detection using soft computing Technique
A survey of Network Intrusion Detection using soft computing Technique
 
M dgx mde0mdm=
M dgx mde0mdm=M dgx mde0mdm=
M dgx mde0mdm=
 
An improvement to trust based cross layer security protocol against sybil att...
An improvement to trust based cross layer security protocol against sybil att...An improvement to trust based cross layer security protocol against sybil att...
An improvement to trust based cross layer security protocol against sybil att...
 
A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...
 
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...
 
A comparative study on different trust based routing schemes in manet
A comparative study on different trust based routing schemes in manetA comparative study on different trust based routing schemes in manet
A comparative study on different trust based routing schemes in manet
 
L 1000 423
L 1000 423L 1000 423
L 1000 423
 
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant NetworkDetecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
 
06558266
0655826606558266
06558266
 
Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...
 
IRJET- Analysis of Router Poisoning using Network Attacks
IRJET- Analysis of Router Poisoning using Network AttacksIRJET- Analysis of Router Poisoning using Network Attacks
IRJET- Analysis of Router Poisoning using Network Attacks
 

More from John Ajish

ydchdfjdjgjfkhgchgkhhcghkgkkhkgkgkhkgckhgk
ydchdfjdjgjfkhgchgkhhcghkgkkhkgkgkhkgckhgkydchdfjdjgjfkhgchgkhhcghkgkkhkgkgkhkgckhgk
ydchdfjdjgjfkhgchgkhhcghkgkkhkgkgkhkgckhgk
John Ajish
 
tturutruruutrrxfjvfjgjgddfjfjdgjfdjfjgjdfgj
tturutruruutrrxfjvfjgjgddfjfjdgjfdjfjgjdfgjtturutruruutrrxfjvfjgjgddfjfjdgjfdjfjgjdfgj
tturutruruutrrxfjvfjgjgddfjfjdgjfdjfjgjdfgj
John Ajish
 
Afasdhdfvjukgkrgdfbdzthgsdhgjjkvdxfhdfhfdh
AfasdhdfvjukgkrgdfbdzthgsdhgjjkvdxfhdfhfdhAfasdhdfvjukgkrgdfbdzthgsdhgjjkvdxfhdfhfdh
Afasdhdfvjukgkrgdfbdzthgsdhgjjkvdxfhdfhfdh
John Ajish
 
GJFJFJXFJFJGGJFGJKIKJCGXYGZDFJZDJKGXJNHV
GJFJFJXFJFJGGJFGJKIKJCGXYGZDFJZDJKGXJNHVGJFJFJXFJFJGGJFGJKIKJCGXYGZDFJZDJKGXJNHV
GJFJFJXFJFJGGJFGJKIKJCGXYGZDFJZDJKGXJNHV
John Ajish
 
saasgsdgdsgsdgdszvvetfdfdsgAsafgfsdgsgsdg
saasgsdgdsgsdgdszvvetfdfdsgAsafgfsdgsgsdgsaasgsdgdsgsdgdszvvetfdfdsgAsafgfsdgsgsdg
saasgsdgdsgsdgdszvvetfdfdsgAsafgfsdgsgsdg
John Ajish
 
WRASASgDGGS DDGBLFAfbJKCfaiGFBKsIgsdJBIGDSKJ
WRASASgDGGS DDGBLFAfbJKCfaiGFBKsIgsdJBIGDSKJWRASASgDGGS DDGBLFAfbJKCfaiGFBKsIgsdJBIGDSKJ
WRASASgDGGS DDGBLFAfbJKCfaiGFBKsIgsdJBIGDSKJ
John Ajish
 
DOGAODHGOHDODOOanffaHSFOHGHASOGHSOGHGHAOGHOGHAOGG
DOGAODHGOHDODOOanffaHSFOHGHASOGHSOGHGHAOGHOGHAOGGDOGAODHGOHDODOOanffaHSFOHGHASOGHSOGHGHAOGHOGHAOGG
DOGAODHGOHDODOOanffaHSFOHGHASOGHSOGHGHAOGHOGHAOGG
John Ajish
 
FINAL REVIEWADAFASFSAFASFAFSFSGGaGGV HBKJS
FINAL REVIEWADAFASFSAFASFAFSFSGGaGGV HBKJSFINAL REVIEWADAFASFSAFASFAFSFSGGaGGV HBKJS
FINAL REVIEWADAFASFSAFASFAFSFSGGaGGV HBKJS
John Ajish
 
ffzvVxvzxvzxvzvzxvvxzvzx xnbdn asxh aabckkz
ffzvVxvzxvzxvzvzxvvxzvzx xnbdn asxh  aabckkzffzvVxvzxvzxvzvzxvvxzvzx xnbdn asxh  aabckkz
ffzvVxvzxvzxvzvzxvvxzvzx xnbdn asxh aabckkz
John Ajish
 

More from John Ajish (20)

ydchdfjdjgjfkhgchgkhhcghkgkkhkgkgkhkgckhgk
ydchdfjdjgjfkhgchgkhhcghkgkkhkgkgkhkgckhgkydchdfjdjgjfkhgchgkhhcghkgkkhkgkgkhkgckhgk
ydchdfjdjgjfkhgchgkhhcghkgkkhkgkgkhkgckhgk
 
tturutruruutrrxfjvfjgjgddfjfjdgjfdjfjgjdfgj
tturutruruutrrxfjvfjgjgddfjfjdgjfdjfjgjdfgjtturutruruutrrxfjvfjgjgddfjfjdgjfdjfjgjdfgj
tturutruruutrrxfjvfjgjgddfjfjdgjfdjfjgjdfgj
 
Afasdhdfvjukgkrgdfbdzthgsdhgjjkvdxfhdfhfdh
AfasdhdfvjukgkrgdfbdzthgsdhgjjkvdxfhdfhfdhAfasdhdfvjukgkrgdfbdzthgsdhgjjkvdxfhdfhfdh
Afasdhdfvjukgkrgdfbdzthgsdhgjjkvdxfhdfhfdh
 
GJFJFJXFJFJGGJFGJKIKJCGXYGZDFJZDJKGXJNHV
GJFJFJXFJFJGGJFGJKIKJCGXYGZDFJZDJKGXJNHVGJFJFJXFJFJGGJFGJKIKJCGXYGZDFJZDJKGXJNHV
GJFJFJXFJFJGGJFGJKIKJCGXYGZDFJZDJKGXJNHV
 
saasgsdgdsgsdgdszvvetfdfdsgAsafgfsdgsgsdg
saasgsdgdsgsdgdszvvetfdfdsgAsafgfsdgsgsdgsaasgsdgdsgsdgdszvvetfdfdsgAsafgfsdgsgsdg
saasgsdgdsgsdgdszvvetfdfdsgAsafgfsdgsgsdg
 
WRASASgDGGS DDGBLFAfbJKCfaiGFBKsIgsdJBIGDSKJ
WRASASgDGGS DDGBLFAfbJKCfaiGFBKsIgsdJBIGDSKJWRASASgDGGS DDGBLFAfbJKCfaiGFBKsIgsdJBIGDSKJ
WRASASgDGGS DDGBLFAfbJKCfaiGFBKsIgsdJBIGDSKJ
 
DOGAODHGOHDODOOanffaHSFOHGHASOGHSOGHGHAOGHOGHAOGG
DOGAODHGOHDODOOanffaHSFOHGHASOGHSOGHGHAOGHOGHAOGGDOGAODHGOHDODOOanffaHSFOHGHASOGHSOGHGHAOGHOGHAOGG
DOGAODHGOHDODOOanffaHSFOHGHASOGHSOGHGHAOGHOGHAOGG
 
FINAL REVIEWADAFASFSAFASFAFSFSGGaGGV HBKJS
FINAL REVIEWADAFASFSAFASFAFSFSGGaGGV HBKJSFINAL REVIEWADAFASFSAFASFAFSFSGGaGGV HBKJS
FINAL REVIEWADAFASFSAFASFAFSFSGGaGGV HBKJS
 
ffzvVxvzxvzxvzvzxvvxzvzx xnbdn asxh aabckkz
ffzvVxvzxvzxvzvzxvvxzvzx xnbdn asxh  aabckkzffzvVxvzxvzxvzvzxvvxzvzx xnbdn asxh  aabckkz
ffzvVxvzxvzxvzvzxvvxzvzx xnbdn asxh aabckkz
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
 
FINAL PPT.pdf
FINAL PPT.pdfFINAL PPT.pdf
FINAL PPT.pdf
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
 
PROJECT REVIVE.pptx
PROJECT REVIVE.pptxPROJECT REVIVE.pptx
PROJECT REVIVE.pptx
 
1 REVIEW.pptx
1  REVIEW.pptx1  REVIEW.pptx
1 REVIEW.pptx
 
FINAL REVIEW.pptx
FINAL  REVIEW.pptxFINAL  REVIEW.pptx
FINAL REVIEW.pptx
 
ppt1.ppt
ppt1.pptppt1.ppt
ppt1.ppt
 

Recently uploaded

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Recently uploaded (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 

PPT.ppt

  • 1. DETECTION OF MISBEHAVIOR IN DELAY TOLERANT NETWORK USING TRUST AUTHORITY
  • 2. Abstract Malicious and selfish behaviors represent a serious threat against routing in delay/disruption tolerant networks ((DTNs). Due to the selfish nature and energy consuming, selfish nodes are not willing to forward packets for others without sufficient reward. Due to the malicious nature, malicious nodes that drop packets or modifying the packets to launch attacks (black hole or gray hole attack). In this project, iTrust, a probabilistic misbehavior detection scheme, for secure DTN routing toward efficient trust establishment. In our model iTrust as the inspection game and use game theoretical analysis, by setting an appropriate probability. Correlate detection probability with a node’s reputation, which allows a dynamic detection probability determined by the trust of the users.
  • 3. Existing System  In existing system, incentive protocol, called Pi.  Pi protocol can also thwart various attacks, which could be launched by selfish DTN nodes.  It doesn’t set a routing path in advance, but only need to attach some incentive on the bundle.  In the reward model, to achieve fairness.
  • 4. Disadvantages  Fails in privacy protection.  High computation.  Transmission overhead and verification cost is high.  High variation in network condition.
  • 5. Proposed System  Misbehaviors Detection in most of which are based on forwarding history verification.  An efficient and adaptive misbehavior detection and reputation management scheme is highly desirable in DTN  TA, which could launch the probabilistic detection for the target node and judge it by collecting the forwarding history evidence from its upstream and downstream nodes.  TA could punish or compensate the node based on its behaviors.
  • 6. Advantages  Detect the malicious nodes effectively.  More secure.  Reduce computation cost.  Reduce transmission overhead incurred by misbehavior detection.