Open Access   Article Go Back

Intelligent Anti-Theft Finding Scheme Towards Itrust Establishment in Delay Tolerant Networks Using VANET

B. Swetha1 , D.B. Rao2 , P.N. Rao3

Section:Research Paper, Product Type: Journal Paper
Volume-2 , Issue-9 , Page no. 50-56, Sep-2014

Online published on Oct 04, 2014

Copyright © B. Swetha, D.B. Rao, P.N. Rao . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: B. Swetha, D.B. Rao, P.N. Rao, “Intelligent Anti-Theft Finding Scheme Towards Itrust Establishment in Delay Tolerant Networks Using VANET,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.9, pp.50-56, 2014.

MLA Style Citation: B. Swetha, D.B. Rao, P.N. Rao "Intelligent Anti-Theft Finding Scheme Towards Itrust Establishment in Delay Tolerant Networks Using VANET." International Journal of Computer Sciences and Engineering 2.9 (2014): 50-56.

APA Style Citation: B. Swetha, D.B. Rao, P.N. Rao, (2014). Intelligent Anti-Theft Finding Scheme Towards Itrust Establishment in Delay Tolerant Networks Using VANET. International Journal of Computer Sciences and Engineering, 2(9), 50-56.

BibTex Style Citation:
@article{Swetha_2014,
author = {B. Swetha, D.B. Rao, P.N. Rao},
title = {Intelligent Anti-Theft Finding Scheme Towards Itrust Establishment in Delay Tolerant Networks Using VANET},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2014},
volume = {2},
Issue = {9},
month = {9},
year = {2014},
issn = {2347-2693},
pages = {50-56},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=253},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=253
TI - Intelligent Anti-Theft Finding Scheme Towards Itrust Establishment in Delay Tolerant Networks Using VANET
T2 - International Journal of Computer Sciences and Engineering
AU - B. Swetha, D.B. Rao, P.N. Rao
PY - 2014
DA - 2014/10/04
PB - IJCSE, Indore, INDIA
SP - 50-56
IS - 9
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
3554 3362 downloads 3514 downloads
  
  
           

Abstract

Malicious and selfish behaviors represent a serious threat against routing in Delay/Disruption Tolerant Networks (DTNs). Due to the unique network characteristics, designing a misbehavior detection scheme in DTN is regarded as a great challenge. In this paper, we propose iTrust, a probabilistic misbehavior detection scheme, for secure DTN routing towards efficient trust establishment. The basic idea of iTrust is introducing a periodically available Trusted Authority (TA) to judge the node�s behavior based on the collected routing evidences and probabilistically checking. A new VANET-based smart parking scheme (SPARK) for large parking lots provide three convenient services for drivers: 1) real-time parking navigation; 2) intelligent anti-theft protection; and 3) friendly parking information dissemination. TA could ensure the security of DTN routing at a reduced cost. To further improve the efficiency of the proposed scheme, we correlate detection probability with a node�s reputation, which allows a dynamic detection probability determined by the trust of the users. The extensive analysis and simulation results show that the proposed scheme substantiates the effectiveness and efficiency of the proposed scheme.

Key-Words / Index Term

VANET ,ITRUSTED , DTNS

References

[1] R. Lu, X. Lin, H. Zhu, and X. Shen, �SPARK: A New VANET-based Smart Parking Scheme for Large Parking Lots�, IEEE INFOCOM�09, April 2009.
[2]A. Lindgren, A. Doria, and O. Schelen, �Probabilistic routing in intermittently connected networks�,ACM SIGMOBILE CCR, vol. 7, no. 3, pp. 19�20, 2003.
[3]E.Daly and M. Haahr, �Social network analysis for routing in disconnected delay-tolerant MANETs, �Proc. MobiHoc, pp. 32�40, 2007.
[4] J. J. Jaramillo and R. Srikant, �Darwin: Distributed and adaptive Reputation mechanism for wireless ad-hoc networks� , Proc. MobiCom, 2007.
[5] H.Zhu, X.Lin, R.Lu, Y.Fan and X. Shen,�SMART:A Secure Multilayer Credit -Based Incentive Scheme for Delay-Tolerant Networks,� IEEE vol.58,no.8,pp.828-836,2009.
[6] S.Reidt, M.Srivatsa, S.Balfe,�The Fable of the Bees: Incentivizing Robust Revocation Decision Making in Ad Hoc Networks� inCCS�09,2009.
[7] E. Ayday, H. Lee and F. Fekri,�Trust Management and Adversary Detection for Delay Tolerant Networks,� inMilcom�10, 2010.
[8] B.B.Chen, M.C.Chan,�Mobicent:a Credit-Based Incentive System for Disruption Tolerant Network� IEEE INFOCOM�2010.
[9] A. Balasubramanian, B. N. Levine, and A. Venkataramani, �Dtn routing as a resource allocation problem,�Proc. ACM SIGCOMM, 2007.
[10] M. Dawande, J. Kalagnanam, P. Keskinocak, R. Ravi, and F. Salman, �Approximation algorithms for the multiple knapsack problem with assignment restrictions,�Journal of Combinatorial Optimization,vol.4, pp. 171�186, 2000.
[11] M. Granovetter, �The strength of weak ties,� The American Journal of Sociology, vol. 78, no. 6, 1973.
[12] A. Mislove, M. Marcon, K. P. Gummadi, Druschel, and Bhattacharjee, �Measurement and analysis of online social networks,�Proc. IMC, 2007.
[13] E. Gilbert and K. Karahalios, �Predicting tie strength with social media,�Proc. CHI, 2009.
[14] P. Hui, J. Crowcroft, and E. Yoneki, �Bubble rap: social-based forwarding in delay tolerant networks,� Proc. MobiHoc, pp. 241�250, 2008.
[15] V. Erramilli, A. Chaintreau, M. Crovella, and C. Diot, �Delegation Forwarding,�Proc. MobiHoc, 2008.