Trust and Reputation Management for Secure Communication in DTNs  
  Authors : Vrinda A; Arun Anoop M

 

Delay/Disruption Tolerant Networks (DTNs) have been identified as one of the key areas in the field of wireless communication, wherein sparseness and delay are particularly high. These characteristics pose several challenges to the security of DTNs. DTNs’ links on an end-to-end path do not exist for a long time, and hence intermediate nodes may need to store, carry, and wait for opportunities to transfer data packets toward their destinations. Hence, DTNs are much more general than MANETs in the mobile network space. A security mechanism for DTNs is developed here which enables us to evaluate the nodes based on their behavior during their past interactions and to detect misbehavior due to Byzantine adversaries, selfish nodes, and faulty nodes. An approach to trust and reputation management is implemented which serves to ensure secure communication and isolates malicious nodes which may attack the network and reduces network performance in terms of reliability and security.

 

Published In : IJCAT Journal Volume 1, Issue 6

Date of Publication : 31 July 2014

Pages : 245 - 248

Figures :02

Tables : --

Publication Link : Trust and Reputation Management for Secure Communication in DTNs

 

 

 

Vrinda A : She obtained her BTech in Information Technology from university of Calicut in the year 2007. She was a member of faculty in the department of information technology at Amrita School Of Engineering,ettimadai, Coimbatore from 2007 to 2009.Later she took up employment as lecturer in department of information technology in MESCE,kuttippuram, kerala. Presently she is pursuing her MTech programme in computer science and engineering at MESCE kuttippuram. She has 5 years of teaching experience. Her research interests covers areas of network security, cryptography and mobile ad-hoc networks.

Arun Anoop M : He obtained his BTech in Computer Science and Engineering from cochin university in the year 2008.He completed his PG diploma in information security and system administration from DOEACC center, NIT , Calicut and obtained his MTech in Information Technology from kalasalingam university in the year 2011.Presently he is working as Assistant Professor in Computer Science and Engineering, MESCE, kuttippuram, kerala.Before joining MESCE he has worked as teaching assistant in information technology in kalasalingam university, krishnankoil, Tamilnadu. He is having 3.6 years of teaching experience. He has attended many workshops, FDPs and conferences. His areas of interest are network security, wireless sensor networks, protocol design, formal languages and theoretical computer science. He has presented 3 papers in National and International Conferences. He has published 8 journals and guided 6 Mtech students.

 

 

 

 

 

 

 

Delay-Tolerant Networks

Trust

Reputation

Misbehaviour

Secure Communication

The security mechanism implemented here effectively isolates malicious nodes in a network .The simulation results highlights the need for a much more effective method to improve the packet delivery ratio due to the short range contact or intermittent connectivity in DTNs. The throughput also doesn’t show much improvement with varying number of nodes. A method to improve PDR and throughput could be considered in the future for effective secure communication in DTNs.

 

 

 

 

 

 

 

 

 

[1] Ing-Ray Chen,Fenye Bao,MoonJeong Chang and Jin- Hee Cho "Dynamic Trust management for Delay tolerant networks and its application to secure routing" IEEE Transactions on parallel and distributed system ,2013

[2] P Srilega and Nagajyothi M E , "Minimised Delay and Adversary detection in DTNs" International Journal of Engineering Science Invention ,April 2013

[3] Sangeetha R and Krishnammal N, "Detection of routing attacks in Disruption tolerant networks" The international journal of engineering and science,2013

[4] Zhaovu Gao,Haojin Zhu,Suguo Du,Chengxin Xiao and Rongxing Lu, "PMDS:A probabilistic misbehaviour detection scheme in DTN" IEEE Signal Proc. Mag,2012

[5 ]Erman Ayday and Faramarz Fekri, "An iterative algorithm for trust management and adversary detection for delay-tolerant networks" IEEE Transactions on mobile computing,September 2012.

[6] Ing-Ray Chen,Fenye Bao,MoonJeong Chang and Jin- Hee Cho, "Integrated Social and Qos Trust based routing in Delay Tolerant Networks" Springer,2012

[7] Gianluca Dini and Angelica Lo Duca, "A reputation based approach to tolerating misbehaving carriers in Delay tolerant networks" IEEE International conference,2010

[8] Rabin patra,Sonesh Surana,Sergu Nedevschi "Hierarchical Identity based cryptography for End-to- End security in DTNs" IEEE International Conference,2008

[9] Sonja buchegger and Jean-Y ves Le Boudec "Robust Reputation System for P2P and Mobile adhoc networks" National Competence center in research on mobile information and communication systems,2004

[10] Sepandar D Kamvar ,Mario T Schlosser and Hector Garcia-molina "The EigenTrust Algorithm for reputation management in P2P Networks" ACM international conference, May 2003

[11] K liu,J.Deng,P.K Varshney and K Balakrishnan, "An Acknowledgement-based approach for the detection of routing misbehaviour detection in MANETs" IEEE transactions on mobile computing,2007

[12] K .Fall, "A delay-tolerant network architecture for challenged internets" Proceedings of ACM SIGCOMM,2003