An approach to detect malicious node for Delay Tolerant Networks

In Delay Tolerant Networks (DTNs), the information is transferred from its source to destination without end-to-end connectivity of the network. The Reputation-Based Trust Management Systems for MANETs do not apply to DTNs due to lack of end-to-end connectivity. The existing Iterative Trust Reputation Mechanism (ITRM) is effective in a detection of malicious node, however it faces from latency time, and hence, sometimes results in false detection of node considered as malicious node. The Proposed Modified Iterative algorithm for Detection of the malicious node for Delay-Tolerant Networks is based on clustering of Raters as per their ratings to Service Providers. The Raters are categorized as low priority, middle priority and high priority based on rating given to Service Provider. This has resulted into lowered amount of false positives and improvement in Service Provider reputation accuracy. The Proposed Modified Iterative algorithm for Detection of the malicious node for Delay-Tolerant Networks is compared with the existing ITRM algorithm and found that, the proposed algorithm has less time complexity and better accuracy of detection of malicious nodes.

[1]  Chrysanthos Dellarocas,et al.  Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior , 2000, EC '00.

[2]  Kevin R. Fall,et al.  A delay-tolerant network architecture for challenged internets , 2003, SIGCOMM '03.

[3]  Erman Ayday,et al.  Trust management and adversary detection for delay tolerant networks , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.

[4]  Erman Ayday,et al.  An iterative algorithm for trust and reputation management , 2009, 2009 IEEE International Symposium on Information Theory.

[5]  Erman Ayday,et al.  A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks , 2010, Ad Hoc Networks.

[6]  Faramarz Fekri,et al.  Results on the Improved Decoding Algorithm for Low-Density Parity-Check Codes Over the Binary Erasure Channel , 2007, IEEE Transactions on Information Theory.

[7]  W. T. Williams,et al.  Dissimilarity Analysis: a new Technique of Hierarchical Sub-division , 1964, Nature.

[8]  Giorgos Zacharia,et al.  Collaborative reputation mechanisms in electronic marketplaces , 1999, Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers.

[9]  Jörg Ott,et al.  The ONE simulator for DTN protocol evaluation , 2009, SIMUTools 2009.

[10]  Jean-Yves Le Boudec,et al.  The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks , 2003 .

[11]  Karl Aberer,et al.  Managing trust in a peer-2-peer information system , 2001, CIKM '01.

[12]  Ernesto Damiani,et al.  Choosing reputable servents in a P2P network , 2002, WWW.

[13]  Erman Ayday,et al.  An Iterative Algorithm for Trust Management and Adversary Detection for Delay-Tolerant Networks , 2012, IEEE Transactions on Mobile Computing.

[14]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[15]  S. Buchegger,et al.  Coping with False Accusations in Misbehavior Reputation Systems for Mobile Ad-hoc Networks , 2003 .