Open Access   Article Go Back

Mitigating Routing Misbehavior in Disruption Tolerant Networks

S. Devadharshini1 , R. Vadivel2

Section:Research Paper, Product Type: Journal Paper
Volume-10 , Issue-5 , Page no. 30-35, May-2022

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v10i5.3035

Online published on May 31, 2022

Copyright © S. Devadharshini, R. Vadivel . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S. Devadharshini, R. Vadivel, “Mitigating Routing Misbehavior in Disruption Tolerant Networks,” International Journal of Computer Sciences and Engineering, Vol.10, Issue.5, pp.30-35, 2022.

MLA Style Citation: S. Devadharshini, R. Vadivel "Mitigating Routing Misbehavior in Disruption Tolerant Networks." International Journal of Computer Sciences and Engineering 10.5 (2022): 30-35.

APA Style Citation: S. Devadharshini, R. Vadivel, (2022). Mitigating Routing Misbehavior in Disruption Tolerant Networks. International Journal of Computer Sciences and Engineering, 10(5), 30-35.

BibTex Style Citation:
@article{Devadharshini_2022,
author = {S. Devadharshini, R. Vadivel},
title = {Mitigating Routing Misbehavior in Disruption Tolerant Networks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2022},
volume = {10},
Issue = {5},
month = {5},
year = {2022},
issn = {2347-2693},
pages = {30-35},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5464},
doi = {https://doi.org/10.26438/ijcse/v10i5.3035}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v10i5.3035}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5464
TI - Mitigating Routing Misbehavior in Disruption Tolerant Networks
T2 - International Journal of Computer Sciences and Engineering
AU - S. Devadharshini, R. Vadivel
PY - 2022
DA - 2022/05/31
PB - IJCSE, Indore, INDIA
SP - 30-35
IS - 5
VL - 10
SN - 2347-2693
ER -

VIEWS PDF XML
196 303 downloads 164 downloads
  
  
           

Abstract

Destructive Tolerance Network (DTN) can drop packets received by selfish or malicious nodes. These routing malfunctions slow down packet delivery and waste system resources such as power and bandwidth. Techniques have been proposed to mitigate routing malfunctions in mobile ad hoc networks, but they cannot be applied directly to DTN due to the intermittent connections between the nodes. To address this issue, we propose a distributed method to detect packet drops on the DTN. In our scheme, the node should keep a signed contact record for the previous contact. Based on this, the next node to contact can determine if the node dropped the packet. Rogue nodes can falsely report contact records to avoid detection, so a small portion of each contact record is distributed to the specified number of watch nodes and the appropriate contact record. Can be collected to identify rogue nodes. We also propose a scheme to mitigate incorrect routing behavior by limiting the number of packets forwarded to malicious nodes. Trace-based simulations show that our solution is efficient and can effectively mitigate routing fraud.

Key-Words / Index Term

Disruption Tolerant Networks, Detection, Mitigation, Routing Misbehaviour, Security

References

[1] W. Gao and G. Cao, “User-centric data dissemination in disruption tolerant networks,” in Proc. IEEE INFOCOM, pp. 3119–3127, 2011.
[2] H. Yang, J. Shu, X. Meng, and S. Lu, “Scan: Self-organized network-layer security in mobile ad hoc networks,” IEEE J. Sel. Areas Commun., vol. 24, no. 2, pp. 261–273, 2006.
[3] K. Fall, “Providing fault-tolerant ad-hoc routing service in adversarial environments,” in Proc. SIGCOMM, pp. 27–34, 2003.
[4] J. Burgess, B. Gallagher, D. Jensen, and B. Levine, “Maxprop: Routing for vehicle-based disruption-tolerant networks,” in Proc. IEEE INFOCOM, pp. 1–11, 2006.
[5] E. Daly and M. Haahr, “Social network analysis for routing in disconnected delay-tolerant manets,” in Proc. ACM MobiHoc, pp.32–40, 2007.
[6] V. Erramilli, A. Chaintreau,M. Crovella, and C. Diot, “Delegation forwarding,” in Proc. ACM MobiHoc, pp. 251–260, 2008.
[7] S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehaviorin mobile ad hoc networks,” in Proc. ACM MobiCom, pp.255–265, 2000.
[8] H. Yang, J. Shu, X. Meng, and S. Lu, “Scan: Self-organized network-layer security in mobile ad hoc networks,” IEEE J. Sel. AreasCommun., vol. 24, no. 2, pp. 261–273, 2006.
[9] K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, “An acknowledgment-based approach for the detection of routing misbehavior inMANETs,” IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536–550, May 2007.
[10] B. Burns, O. Brock, and B.N. Levine. “MV routing and capacity building in disruption tolerant networks”. In Proc. IEEE INFOCOM, pp.398– 408, March 2017.
[11] J. Davis, A. Fagg, and B.N. Levine. “Wearable Computers and Packet Transport Mechanisms in Highly Partitioned Ad hoc Networks”. In Proc. IEEE Intl. Symposium on Wearable Computers, pp.141–148, October 2018.
[12] J. Yang and C.-K. Lee Y. Chen, M. Ammar. ”Ferry Replacement Protocols In Sparse Manet Message Ferrying Systems”. In Proc. IEEE Wireless Communications and Networking (WCNC), March 2005.
[13] W. Zhao and M. Ammar. Message Ferrying: Proactive Routing In Highly-Partitioned Wireless Ad Hoc Networks. In Proc. IEEE Workshop on Future Trends in Distributed Computing Systems, May 2003.
[14] W. Zhao, M. Ammar, and E. Zegura. A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad hoc Networks. In Proc. ACM Mobihoc, May 2004.
[15] W. Zhao, M. Ammar, and E. Zegura. Controlling the mobility of multiple data transport ferries in a delay-tolerant network. In IEEE INFOCOM, 2005.
[16]Yookesh, T. L., et al. "Efficiency of iterative filtering method for solving Volterra fuzzy integral equations with a delay and material investigation." Materials today: Proceedings 47: 6101-6104, 2021.
[17]Kumar E. Boopathi, and V. Thiagarasu. "Segmentation using Fuzzy Membership Functions: An Approach." IJCSE, Vol.5, Issue.3, pp.101-105, 2017.