Intelligent Anti-Theft Finding Scheme Towards Itrust Establishment in Delay Tolerant Networks Using VANET
B. Swetha1 , D.B. Rao2 , P.N. Rao3
Section:Research Paper, Product Type: Journal Paper
Volume-2 ,
Issue-9 , Page no. 50-56, Sep-2014
Online published on Oct 04, 2014
Copyright © B. Swetha, D.B. Rao, P.N. Rao . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: B. Swetha, D.B. Rao, P.N. Rao, “Intelligent Anti-Theft Finding Scheme Towards Itrust Establishment in Delay Tolerant Networks Using VANET,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.9, pp.50-56, 2014.
MLA Style Citation: B. Swetha, D.B. Rao, P.N. Rao "Intelligent Anti-Theft Finding Scheme Towards Itrust Establishment in Delay Tolerant Networks Using VANET." International Journal of Computer Sciences and Engineering 2.9 (2014): 50-56.
APA Style Citation: B. Swetha, D.B. Rao, P.N. Rao, (2014). Intelligent Anti-Theft Finding Scheme Towards Itrust Establishment in Delay Tolerant Networks Using VANET. International Journal of Computer Sciences and Engineering, 2(9), 50-56.
BibTex Style Citation:
@article{Swetha_2014,
author = {B. Swetha, D.B. Rao, P.N. Rao},
title = {Intelligent Anti-Theft Finding Scheme Towards Itrust Establishment in Delay Tolerant Networks Using VANET},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2014},
volume = {2},
Issue = {9},
month = {9},
year = {2014},
issn = {2347-2693},
pages = {50-56},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=253},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=253
TI - Intelligent Anti-Theft Finding Scheme Towards Itrust Establishment in Delay Tolerant Networks Using VANET
T2 - International Journal of Computer Sciences and Engineering
AU - B. Swetha, D.B. Rao, P.N. Rao
PY - 2014
DA - 2014/10/04
PB - IJCSE, Indore, INDIA
SP - 50-56
IS - 9
VL - 2
SN - 2347-2693
ER -
VIEWS | XML | |
3554 | 3362 downloads | 3514 downloads |
Abstract
Malicious and selfish behaviors represent a serious threat against routing in Delay/Disruption Tolerant Networks (DTNs). Due to the unique network characteristics, designing a misbehavior detection scheme in DTN is regarded as a great challenge. In this paper, we propose iTrust, a probabilistic misbehavior detection scheme, for secure DTN routing towards efficient trust establishment. The basic idea of iTrust is introducing a periodically available Trusted Authority (TA) to judge the node�s behavior based on the collected routing evidences and probabilistically checking. A new VANET-based smart parking scheme (SPARK) for large parking lots provide three convenient services for drivers: 1) real-time parking navigation; 2) intelligent anti-theft protection; and 3) friendly parking information dissemination. TA could ensure the security of DTN routing at a reduced cost. To further improve the efficiency of the proposed scheme, we correlate detection probability with a node�s reputation, which allows a dynamic detection probability determined by the trust of the users. The extensive analysis and simulation results show that the proposed scheme substantiates the effectiveness and efficiency of the proposed scheme.
Key-Words / Index Term
VANET ,ITRUSTED , DTNS
References
[1] R. Lu, X. Lin, H. Zhu, and X. Shen, �SPARK: A New VANET-based Smart Parking Scheme for Large Parking Lots�, IEEE INFOCOM�09, April 2009.
[2]A. Lindgren, A. Doria, and O. Schelen, �Probabilistic routing in intermittently connected networks�,ACM SIGMOBILE CCR, vol. 7, no. 3, pp. 19�20, 2003.
[3]E.Daly and M. Haahr, �Social network analysis for routing in disconnected delay-tolerant MANETs, �Proc. MobiHoc, pp. 32�40, 2007.
[4] J. J. Jaramillo and R. Srikant, �Darwin: Distributed and adaptive Reputation mechanism for wireless ad-hoc networks� , Proc. MobiCom, 2007.
[5] H.Zhu, X.Lin, R.Lu, Y.Fan and X. Shen,�SMART:A Secure Multilayer Credit -Based Incentive Scheme for Delay-Tolerant Networks,� IEEE vol.58,no.8,pp.828-836,2009.
[6] S.Reidt, M.Srivatsa, S.Balfe,�The Fable of the Bees: Incentivizing Robust Revocation Decision Making in Ad Hoc Networks� inCCS�09,2009.
[7] E. Ayday, H. Lee and F. Fekri,�Trust Management and Adversary Detection for Delay Tolerant Networks,� inMilcom�10, 2010.
[8] B.B.Chen, M.C.Chan,�Mobicent:a Credit-Based Incentive System for Disruption Tolerant Network� IEEE INFOCOM�2010.
[9] A. Balasubramanian, B. N. Levine, and A. Venkataramani, �Dtn routing as a resource allocation problem,�Proc. ACM SIGCOMM, 2007.
[10] M. Dawande, J. Kalagnanam, P. Keskinocak, R. Ravi, and F. Salman, �Approximation algorithms for the multiple knapsack problem with assignment restrictions,�Journal of Combinatorial Optimization,vol.4, pp. 171�186, 2000.
[11] M. Granovetter, �The strength of weak ties,� The American Journal of Sociology, vol. 78, no. 6, 1973.
[12] A. Mislove, M. Marcon, K. P. Gummadi, Druschel, and Bhattacharjee, �Measurement and analysis of online social networks,�Proc. IMC, 2007.
[13] E. Gilbert and K. Karahalios, �Predicting tie strength with social media,�Proc. CHI, 2009.
[14] P. Hui, J. Crowcroft, and E. Yoneki, �Bubble rap: social-based forwarding in delay tolerant networks,� Proc. MobiHoc, pp. 241�250, 2008.
[15] V. Erramilli, A. Chaintreau, M. Crovella, and C. Diot, �Delegation Forwarding,�Proc. MobiHoc, 2008.