Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 4/2019

05-07-2018

Intention aware misbehavior detection for post-disaster opportunistic communication over peer-to-peer DTN

Authors: Chandrima Chakrabarti, Siuli Roy, Souvik Basu

Published in: Peer-to-Peer Networking and Applications | Issue 4/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Delay tolerant network (DTN) has been successfully proposed for setting up emergency post disaster communication networks when normal communication infrastructure is typically incapacitated. DTN being a network where participating nodes transmit messages to the final destination in multiple hops, its success depends on the cooperation of these participating nodes. Performance of such cooperation based networks get severely affected by misbehaving nodes that do not participate in message forwarding either due to reasons that are beyond its control (non-availability of appropriate forwarders, decreasing battery life, etc.) or out of certain malicious intentions. The misbehavior detection schemes, proposed so far, rarely investigate the actual intention behind misbehavior of participating nodes and do not attempt to restore the reputation of falsely alleged nodes. In this paper, we propose iDetect, a reputation based intention aware misbehavior detection scheme that uses contextual evidences to analyze the intention behind a node’s misbehavior. The scheme boosts the low reputation of incorrectly ostracized nodes and includes them in future communication. Re-inclusion of these nodes increases the number of genuine forwarders in the network which, in turn, assists in efficient delivery of crucial post disaster situational messages. Results of extensive simulation, using ONE simulator, substantiate the effectiveness of the proposed iDetect scheme over state-of-the-art competing schemes, in terms of detection ratio, availability ratio, etc. while not compromising on standard network performance in a post disaster communication scenario.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Luo H, Kravets R, Abdelzaher T (2010) The-day-after networks: a first-response edge-network architecture for disaster relief. NSF NeTS FIND Initiative Luo H, Kravets R, Abdelzaher T (2010) The-day-after networks: a first-response edge-network architecture for disaster relief. NSF NeTS FIND Initiative
3.
go back to reference Fall, K., et al.: A disruption-tolerant architecture for secure and efficient disaster response communications. In Proceedings of ISCRAM 2010 Fall, K., et al.: A disruption-tolerant architecture for secure and efficient disaster response communications. In Proceedings of ISCRAM 2010
4.
go back to reference Chenji, H., et al.: A wireless sensor, AdHoc and delay tolerant network system for disaster response. Technical report. LENSS-09-02, 2011 Chenji, H., et al.: A wireless sensor, AdHoc and delay tolerant network system for disaster response. Technical report. LENSS-09-02, 2011
5.
go back to reference Ntareme H, Zennaro M, Pehrson B (2011) Delay tolerant network on smartphones. Applications or communication challenged areas In Proceedings of ExtremeCom:1–7 Ntareme H, Zennaro M, Pehrson B (2011) Delay tolerant network on smartphones. Applications or communication challenged areas In Proceedings of ExtremeCom:1–7
6.
go back to reference Campillo AM, Crowcroft J, Yoneki E, Martı R (2013) Evaluating opportunistic networks in disaster scenarios. J Netw Comput Appl 36(2013):870–880CrossRef Campillo AM, Crowcroft J, Yoneki E, Martı R (2013) Evaluating opportunistic networks in disaster scenarios. J Netw Comput Appl 36(2013):870–880CrossRef
7.
go back to reference Jain S, Demmer M, Patra R, Fall K (2005) Using redundancy to cope with failures in a delay tolerant network. In Proceedings of SIGCOMM 35:109–120CrossRef Jain S, Demmer M, Patra R, Fall K (2005) Using redundancy to cope with failures in a delay tolerant network. In Proceedings of SIGCOMM 35:109–120CrossRef
8.
go back to reference Ren J, Zhang Y, Zhang K, Shen XS (2015) Exploiting mobile crowdsourcing for pervasive cloud services: challenges and solutions. IEEE Commun Mag 53(3):98–105CrossRef Ren J, Zhang Y, Zhang K, Shen XS (2015) Exploiting mobile crowdsourcing for pervasive cloud services: challenges and solutions. IEEE Commun Mag 53(3):98–105CrossRef
9.
go back to reference Chakrabarti C, Banerjee A, Roy S (2014) An observer-based distributed scheme for selfish-node detection in a post-disaster communication environment using delay tolerant network. In Proceedings of AIMoC:151–156 Chakrabarti C, Banerjee A, Roy S (2014) An observer-based distributed scheme for selfish-node detection in a post-disaster communication environment using delay tolerant network. In Proceedings of AIMoC:151–156
10.
go back to reference Chakrabarti C, Roy S (2015) Adapting mobility of observers for quick reputation assignment in a sparse post-disaster communication network. In Proceedings of AIMoC:29–35 Chakrabarti C, Roy S (2015) Adapting mobility of observers for quick reputation assignment in a sparse post-disaster communication network. In Proceedings of AIMoC:29–35
11.
go back to reference Basu, S, Bhattacharjee, S., Roy, S., Bandyopadhyay, S.: SAGE-PRoPHET: a security aided and group encounter based PRoPHET routing protocol for dissemination of post disaster situational data. In Proceedings of ACM ICDCN, 2015, Article No. 20 Basu, S, Bhattacharjee, S., Roy, S., Bandyopadhyay, S.: SAGE-PRoPHET: a security aided and group encounter based PRoPHET routing protocol for dissemination of post disaster situational data. In Proceedings of ACM ICDCN, 2015, Article No. 20
12.
go back to reference Basu, S., Roy, S.: A group-based multilayer encryption scheme for secure dissemination of post-disaster situational data using peer-to-peer delay tolerant network. In Proceedings of IEEE ICACCI, 2014, pp. 1566–1572 Basu, S., Roy, S.: A group-based multilayer encryption scheme for secure dissemination of post-disaster situational data using peer-to-peer delay tolerant network. In Proceedings of IEEE ICACCI, 2014, pp. 1566–1572
13.
go back to reference Ayday E, Lee H, Fekri F (2010) Trust management and adversary detection for DTN. In Proceedings of MILCOM Ayday E, Lee H, Fekri F (2010) Trust management and adversary detection for DTN. In Proceedings of MILCOM
14.
go back to reference Karaliopoulos M (2009) Assessing the vulnerability of DTN data relaying schemes to node selfishness. IEEE Commun Lett 13(12):923–925CrossRef Karaliopoulos M (2009) Assessing the vulnerability of DTN data relaying schemes to node selfishness. IEEE Commun Lett 13(12):923–925CrossRef
15.
go back to reference Li, N., Das, S. K.: Radon: reputation-assisted data forwarding in opportunistic networks. In proceedings of MobiOpp 2010, pp. 8–14 Li, N., Das, S. K.: Radon: reputation-assisted data forwarding in opportunistic networks. In proceedings of MobiOpp 2010, pp. 8–14
16.
go back to reference Miao, J., Hasan, O., Mokhtar, S B., Brunie, L., Yim, K.: An analysis of strategies for preventing selfish behavior in mobile delay tolerant networks. In proceedings of IMIS 2012, pp. 208–215 Miao, J., Hasan, O., Mokhtar, S B., Brunie, L., Yim, K.: An analysis of strategies for preventing selfish behavior in mobile delay tolerant networks. In proceedings of IMIS 2012, pp. 208–215
17.
go back to reference Ren J, Zhang Y, Zhang K, Shen XS (2016) Adaptive and channel-aware detection of selective forwarding attacks in wireless sensor networks. IEEE Trans Wirel Commun 15(5):3718–3731CrossRef Ren J, Zhang Y, Zhang K, Shen XS (2016) Adaptive and channel-aware detection of selective forwarding attacks in wireless sensor networks. IEEE Trans Wirel Commun 15(5):3718–3731CrossRef
18.
go back to reference Shakshuki EM, Kang N, Sheltami TR (2013) EAACK—A secure intrusion-detection system for MANETs. IEEE Trans Ind Electron 60(3):1089–1098CrossRef Shakshuki EM, Kang N, Sheltami TR (2013) EAACK—A secure intrusion-detection system for MANETs. IEEE Trans Ind Electron 60(3):1089–1098CrossRef
19.
go back to reference Michiardi P, Molva R (2002) CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of IFIP TC6/TC11 working conference on communications and multimedia security: advanced communications and multimedia security, pp 107–121 Michiardi P, Molva R (2002) CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of IFIP TC6/TC11 working conference on communications and multimedia security: advanced communications and multimedia security, pp 107–121
20.
go back to reference Sun D, Zhao H, Cheng S (2016) A novel membership cloud model based trust evaluation model for vehicular ad hoc network of T-CPS. Security and Communication Networks 9(18):5710–5723CrossRef Sun D, Zhao H, Cheng S (2016) A novel membership cloud model based trust evaluation model for vehicular ad hoc network of T-CPS. Security and Communication Networks 9(18):5710–5723CrossRef
21.
go back to reference Zhao H et al (2018) Dynamic trust model for vehicular cyber-physical systems. International Journal of Network Security 20(1):157–167 Zhao H et al (2018) Dynamic trust model for vehicular cyber-physical systems. International Journal of Network Security 20(1):157–167
22.
go back to reference Hao H, Rongxing L, Cheng H, Zonghua Z (2016) PTRS: a privacy-preserving trust-based relay selection scheme in VANETs. Peer-to-Peer Networking and Applications 10(5):1204–1218 Hao H, Rongxing L, Cheng H, Zonghua Z (2016) PTRS: a privacy-preserving trust-based relay selection scheme in VANETs. Peer-to-Peer Networking and Applications 10(5):1204–1218
23.
go back to reference Xu S, Li M, Chen Y, Shu L, Gu X (2013) A cooperation scheme based on reputation for opportunistic networks. In Proceedings of ComManTel:289–294 Xu S, Li M, Chen Y, Shu L, Gu X (2013) A cooperation scheme based on reputation for opportunistic networks. In Proceedings of ComManTel:289–294
24.
go back to reference Zhang X, Wang X, Liu A, Zhang Q, Tang C (2011) Reputation-based scheme for delay tolerant networks. In Proceedings of ICCSNT:974–978 Zhang X, Wang X, Liu A, Zhang Q, Tang C (2011) Reputation-based scheme for delay tolerant networks. In Proceedings of ICCSNT:974–978
25.
go back to reference Wei L, Zhu H, Cao Z, Shen X (2011) MobiID: a user-centric and social-aware reputation based incentive scheme for delay/disruption tolerant networks. In: Proceedings of ADHOC-NOW, pp 177–190 Wei L, Zhu H, Cao Z, Shen X (2011) MobiID: a user-centric and social-aware reputation based incentive scheme for delay/disruption tolerant networks. In: Proceedings of ADHOC-NOW, pp 177–190
26.
go back to reference Zhu H, Du S, Gao Z, Dong M, Cao Z (2014) A probabilistic misbehavior detection scheme toward efficient trust establishment in delay-tolerant networks. IEEE Transactions on Parallel And Distributed Systems 25(1):22–32CrossRef Zhu H, Du S, Gao Z, Dong M, Cao Z (2014) A probabilistic misbehavior detection scheme toward efficient trust establishment in delay-tolerant networks. IEEE Transactions on Parallel And Distributed Systems 25(1):22–32CrossRef
27.
go back to reference Basu S, Biswas A, Roy S, DasBit S (2018) Wise-PRoPHET: a watchdog supervised PRoPHET for reliable dissemination of post disaster situational information over smartphone based DTN. J Netw Comput Appl 109(2018):11–23CrossRef Basu S, Biswas A, Roy S, DasBit S (2018) Wise-PRoPHET: a watchdog supervised PRoPHET for reliable dissemination of post disaster situational information over smartphone based DTN. J Netw Comput Appl 109(2018):11–23CrossRef
28.
go back to reference Yusuo H, Danqi W, Hui Z, Feng W (2014) SocialTrust: enabling long-term social cooperation in peer-to-peer services. Peer-to-Peer Networking and Applications 7(4):525–538CrossRef Yusuo H, Danqi W, Hui Z, Feng W (2014) SocialTrust: enabling long-term social cooperation in peer-to-peer services. Peer-to-Peer Networking and Applications 7(4):525–538CrossRef
29.
go back to reference Wozniak S, Rossberg M, Schaefer G (2013) Towards trustworthy mobile social networking Services for Disaster Response. In: Proceedings of PerNEM in conjunction with PerCom, pp 1–6 Wozniak S, Rossberg M, Schaefer G (2013) Towards trustworthy mobile social networking Services for Disaster Response. In: Proceedings of PerNEM in conjunction with PerCom, pp 1–6
30.
go back to reference Ren J, Zhang Y, Zhang K, Shen XS (2015) SACRM: social aware crowdsourcing with reputation Management in Mobile Sensing. Comput Commun 65(1):55–65CrossRef Ren J, Zhang Y, Zhang K, Shen XS (2015) SACRM: social aware crowdsourcing with reputation Management in Mobile Sensing. Comput Commun 65(1):55–65CrossRef
31.
go back to reference Keranen, A., Ott, J. and Karkkainen, T.: The ONE simulator for DTN protocol evaluation. In Proceedings of SIMUTools 2009, Article No. 55 Keranen, A., Ott, J. and Karkkainen, T.: The ONE simulator for DTN protocol evaluation. In Proceedings of SIMUTools 2009, Article No. 55
32.
go back to reference Rifa-Pous H, Herrera-Joancomarti J (2011) Computational and energy costs of cryptographic algorithms on handheld devices. In: Proceedings of future internet, pp 31–48 Rifa-Pous H, Herrera-Joancomarti J (2011) Computational and energy costs of cryptographic algorithms on handheld devices. In: Proceedings of future internet, pp 31–48
33.
go back to reference Bhattacharjee S, Roy S, Bandyopadhyay S (2014) Exploring an energy-efficient DTN framework supporting disaster Management Services in Post Disaster Relief Operation. Wirel Netw 21(3):1033–1046CrossRef Bhattacharjee S, Roy S, Bandyopadhyay S (2014) Exploring an energy-efficient DTN framework supporting disaster Management Services in Post Disaster Relief Operation. Wirel Netw 21(3):1033–1046CrossRef
34.
go back to reference Uddin YS, Nicol DM, Abdelzaher TF, Kravets RH (2009) A post-disaster mobility model for delay tolerant networking. In Proceedings of WSC:2785–2796 Uddin YS, Nicol DM, Abdelzaher TF, Kravets RH (2009) A post-disaster mobility model for delay tolerant networking. In Proceedings of WSC:2785–2796
35.
go back to reference Wang B, Chen X, Chang W (2014) 2014. A light-weight trust-based QoS routing algorithm for AdHoc networks. Pervasive Mobile Computing 13(2014):164–180CrossRef Wang B, Chen X, Chang W (2014) 2014. A light-weight trust-based QoS routing algorithm for AdHoc networks. Pervasive Mobile Computing 13(2014):164–180CrossRef
36.
go back to reference Park Y, Sur C, Kim H, Ree KH (2017) A reliable incentive scheme using Bitcoin on cooperative vehicular ad hoc networks. INPRA 5(4):34–41 Park Y, Sur C, Kim H, Ree KH (2017) A reliable incentive scheme using Bitcoin on cooperative vehicular ad hoc networks. INPRA 5(4):34–41
37.
go back to reference Moinet, A., Darties, B., & Baril, J.: Blockchain based trust & authentication for decentralized sensor networks. CoRR, abs/170601730. 2017 Moinet, A., Darties, B., & Baril, J.: Blockchain based trust & authentication for decentralized sensor networks. CoRR, abs/170601730. 2017
Metadata
Title
Intention aware misbehavior detection for post-disaster opportunistic communication over peer-to-peer DTN
Authors
Chandrima Chakrabarti
Siuli Roy
Souvik Basu
Publication date
05-07-2018
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 4/2019
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-018-0667-8

Other articles of this Issue 4/2019

Peer-to-Peer Networking and Applications 4/2019 Go to the issue

Premium Partner