Encounted Malware Using Spyware In Delay Tolerant Network

B Estheramma, G Dayanandam, Dr. T . V. Rao


Delay Tolerant Network (DTN) have some kind of system attributes because of which discovering a pernicious and narrow minded conduct in the system is incredible test in DTN. So framework with iTrust, a probabilistic mischief identification plan for secure DTN steering towards proficient trust foundation is proposed here. The essential sign of iTrust is introducing an intermittently existing Trusted Authority (TA) to judge the hubs to conduct in light of the gathered directing confirmations and probabilistic assessment. It additionally gives verification in secure way to all the clients in correspondence system. Proposed framework will distinguish every one of the sorts of assault happened in the system and recognize the malevolent client in system. Trouble making of hub speaks to a genuine danger against directing in deferral tolerant system. In this paper primarily center to enhance the bundle misfortune amid the transmission of parcel one hub to another, furthermore it manages childish and pernicious hub. This paper presents an intermittently accessible trusted power. TA judges any hub in the system by gathering the history proof from upstream and downstream hub. TA could rebuff and remunerate the hub in light of its practices. Every hub must pay the store before it joins into the systems, and the store will be paid after, then the hub leave if there is no mischievousactivitiesof hub. This paper additionally concentrates on security between the hubs in DTN. We presented a mystery key which is created and utilized to share the information. The mystery key is consequently changed when the hub joins a system and leaves a system in light of quick randomized calculation. So we can expand the level of security in postponed tolerant system.


Delay Tolerant Networks (DTN), Network Security, Trust Management.


Wei Peng, Student Member, IEEE, Feng Li, Member, IEEE, Xukai Zou, Member, IEEE, and Jie Wu, Fellow, IEEE Transactions on parallel and distributed systems, vol. 25, NO. 1, January 2014.

Haojin Zhu, Suguo Du, ZhaoyuGao, Mianxiong Dong, and Zhenfu Cao, “A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks”, IEEE transactions on parallel and distributedsystems,vol.25,no.1,january2014.

Q. Li, S. Zhu, and G. Cao, “Routing in Socially Selfish DelayTolerant Networks,” Proc. IEEE INFOCOM ’10, 2010.

H. Zhu, X. Lin, R. Lu, Y. Fan, and X. Shen, “SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks,” IEEE Trans. Vehicular Technology, vol. 58, no. 8,pp. 828-836, 2009.

Q. Li and G. Cao, “Mitigating Routing Misbehavior in Disruption Tolerant Networks,” IEEE Trans. Information Forensics and Security,vol. 7, no. 2, pp. 664-675, Apr. 2012.

R. Lu, X. Lin, H. Zhu, and X. Shen, “Pi: A Practical Incentive Protocol for Delay Tolerant Networks,” IEEE Trans. Wireless Comm., vol. 9, no. 4, pp. 1483-1493, Apr. 2010.

E. Ayday, H. Lee, and F. Fekri, “Trust Management and Adversary DetectionforDelayTolerantNetworks,”Proc.MilitaryComm.Conf.( Milcom’10), 2010.

B.B. Chen and M.C. Chan, “Mobicent: A Credit-BasedIncentive System for Disruption-Tolerant Network,” Proc. IEEEINFOCOM’10,2010.

A. Lindgren and A. Doria, “Probabilistic Routing Protocol for Intermittently Connected Networks,” draft-lindgren-dtnrgprophet-03, 2007.

W. Gao and G. Cao, “User-Centric Data DisseminationinDisruptionTolerant Networks,” Proc. IEEE INFOCOM ’11, 2011.

T. Hossmann, T. Spyropoulos, and F. Legendre, “Know the Neighbor: Towards Optimal Mapping of Contacts to Social Graphs for DTN Routing,” Proc. IEEE INFOCOM ’10, 2010.

O. Younis, M. Krunz, and S. Ramasubramanian, “Node ClusteringinWirelessSensorNetworks:RecentDevelopmentsandDeploymentChallenges,”IEEENetwork, vol.20,no.3,pp.20-25,May/June2006.

S. Bandyopadhyay and E. Coyle, “An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks,” Proc.IEEE INFOCOM, vol. 3, pp. 1713-1723, Mar.2003.

Vahdat, Amin; Becker, David (2000), "Epidemic routing for partially connected ad hoc networks", Technical Report CS-2000- 06, Duke University.

Harminder Singh Bindra, AmritLalSangal,” Considerations and Open Issues in Delay Tolerant Network’S (DTNs) Security”, Department of Computer Science and Engineering, NIT Jalandhar, Punjab, India, June 2, 2010.



  • There are currently no refbacks.

Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.