Skip to main content
Log in

Intention aware misbehavior detection for post-disaster opportunistic communication over peer-to-peer DTN

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Delay tolerant network (DTN) has been successfully proposed for setting up emergency post disaster communication networks when normal communication infrastructure is typically incapacitated. DTN being a network where participating nodes transmit messages to the final destination in multiple hops, its success depends on the cooperation of these participating nodes. Performance of such cooperation based networks get severely affected by misbehaving nodes that do not participate in message forwarding either due to reasons that are beyond its control (non-availability of appropriate forwarders, decreasing battery life, etc.) or out of certain malicious intentions. The misbehavior detection schemes, proposed so far, rarely investigate the actual intention behind misbehavior of participating nodes and do not attempt to restore the reputation of falsely alleged nodes. In this paper, we propose iDetect, a reputation based intention aware misbehavior detection scheme that uses contextual evidences to analyze the intention behind a node’s misbehavior. The scheme boosts the low reputation of incorrectly ostracized nodes and includes them in future communication. Re-inclusion of these nodes increases the number of genuine forwarders in the network which, in turn, assists in efficient delivery of crucial post disaster situational messages. Results of extensive simulation, using ONE simulator, substantiate the effectiveness of the proposed iDetect scheme over state-of-the-art competing schemes, in terms of detection ratio, availability ratio, etc. while not compromising on standard network performance in a post disaster communication scenario.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. International Federation of Red Cross and Red Crescent Societies. 2013. World Disasters Report 2013 - Focus on technology and the future of humanitarian action. http://www.ifrc.org/PageFiles/134658/WDR%202013%20complete.pdf

  2. Luo H, Kravets R, Abdelzaher T (2010) The-day-after networks: a first-response edge-network architecture for disaster relief. NSF NeTS FIND Initiative

  3. Fall, K., et al.: A disruption-tolerant architecture for secure and efficient disaster response communications. In Proceedings of ISCRAM 2010

  4. Chenji, H., et al.: A wireless sensor, AdHoc and delay tolerant network system for disaster response. Technical report. LENSS-09-02, 2011

  5. Ntareme H, Zennaro M, Pehrson B (2011) Delay tolerant network on smartphones. Applications or communication challenged areas In Proceedings of ExtremeCom:1–7

  6. Campillo AM, Crowcroft J, Yoneki E, Martı R (2013) Evaluating opportunistic networks in disaster scenarios. J Netw Comput Appl 36(2013):870–880

    Article  Google Scholar 

  7. Jain S, Demmer M, Patra R, Fall K (2005) Using redundancy to cope with failures in a delay tolerant network. In Proceedings of SIGCOMM 35:109–120

    Article  Google Scholar 

  8. Ren J, Zhang Y, Zhang K, Shen XS (2015) Exploiting mobile crowdsourcing for pervasive cloud services: challenges and solutions. IEEE Commun Mag 53(3):98–105

    Article  Google Scholar 

  9. Chakrabarti C, Banerjee A, Roy S (2014) An observer-based distributed scheme for selfish-node detection in a post-disaster communication environment using delay tolerant network. In Proceedings of AIMoC:151–156

  10. Chakrabarti C, Roy S (2015) Adapting mobility of observers for quick reputation assignment in a sparse post-disaster communication network. In Proceedings of AIMoC:29–35

  11. Basu, S, Bhattacharjee, S., Roy, S., Bandyopadhyay, S.: SAGE-PRoPHET: a security aided and group encounter based PRoPHET routing protocol for dissemination of post disaster situational data. In Proceedings of ACM ICDCN, 2015, Article No. 20

  12. Basu, S., Roy, S.: A group-based multilayer encryption scheme for secure dissemination of post-disaster situational data using peer-to-peer delay tolerant network. In Proceedings of IEEE ICACCI, 2014, pp. 1566–1572

  13. Ayday E, Lee H, Fekri F (2010) Trust management and adversary detection for DTN. In Proceedings of MILCOM

  14. Karaliopoulos M (2009) Assessing the vulnerability of DTN data relaying schemes to node selfishness. IEEE Commun Lett 13(12):923–925

    Article  Google Scholar 

  15. Li, N., Das, S. K.: Radon: reputation-assisted data forwarding in opportunistic networks. In proceedings of MobiOpp 2010, pp. 8–14

  16. Miao, J., Hasan, O., Mokhtar, S B., Brunie, L., Yim, K.: An analysis of strategies for preventing selfish behavior in mobile delay tolerant networks. In proceedings of IMIS 2012, pp. 208–215

  17. Ren J, Zhang Y, Zhang K, Shen XS (2016) Adaptive and channel-aware detection of selective forwarding attacks in wireless sensor networks. IEEE Trans Wirel Commun 15(5):3718–3731

    Article  Google Scholar 

  18. Shakshuki EM, Kang N, Sheltami TR (2013) EAACK—A secure intrusion-detection system for MANETs. IEEE Trans Ind Electron 60(3):1089–1098

    Article  Google Scholar 

  19. Michiardi P, Molva R (2002) CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of IFIP TC6/TC11 working conference on communications and multimedia security: advanced communications and multimedia security, pp 107–121

    Google Scholar 

  20. Sun D, Zhao H, Cheng S (2016) A novel membership cloud model based trust evaluation model for vehicular ad hoc network of T-CPS. Security and Communication Networks 9(18):5710–5723

    Article  Google Scholar 

  21. Zhao H et al (2018) Dynamic trust model for vehicular cyber-physical systems. International Journal of Network Security 20(1):157–167

    Google Scholar 

  22. Hao H, Rongxing L, Cheng H, Zonghua Z (2016) PTRS: a privacy-preserving trust-based relay selection scheme in VANETs. Peer-to-Peer Networking and Applications 10(5):1204–1218

    Google Scholar 

  23. Xu S, Li M, Chen Y, Shu L, Gu X (2013) A cooperation scheme based on reputation for opportunistic networks. In Proceedings of ComManTel:289–294

  24. Zhang X, Wang X, Liu A, Zhang Q, Tang C (2011) Reputation-based scheme for delay tolerant networks. In Proceedings of ICCSNT:974–978

  25. Wei L, Zhu H, Cao Z, Shen X (2011) MobiID: a user-centric and social-aware reputation based incentive scheme for delay/disruption tolerant networks. In: Proceedings of ADHOC-NOW, pp 177–190

    Google Scholar 

  26. Zhu H, Du S, Gao Z, Dong M, Cao Z (2014) A probabilistic misbehavior detection scheme toward efficient trust establishment in delay-tolerant networks. IEEE Transactions on Parallel And Distributed Systems 25(1):22–32

    Article  Google Scholar 

  27. Basu S, Biswas A, Roy S, DasBit S (2018) Wise-PRoPHET: a watchdog supervised PRoPHET for reliable dissemination of post disaster situational information over smartphone based DTN. J Netw Comput Appl 109(2018):11–23

    Article  Google Scholar 

  28. Yusuo H, Danqi W, Hui Z, Feng W (2014) SocialTrust: enabling long-term social cooperation in peer-to-peer services. Peer-to-Peer Networking and Applications 7(4):525–538

    Article  Google Scholar 

  29. Wozniak S, Rossberg M, Schaefer G (2013) Towards trustworthy mobile social networking Services for Disaster Response. In: Proceedings of PerNEM in conjunction with PerCom, pp 1–6

    Google Scholar 

  30. Ren J, Zhang Y, Zhang K, Shen XS (2015) SACRM: social aware crowdsourcing with reputation Management in Mobile Sensing. Comput Commun 65(1):55–65

    Article  Google Scholar 

  31. Keranen, A., Ott, J. and Karkkainen, T.: The ONE simulator for DTN protocol evaluation. In Proceedings of SIMUTools 2009, Article No. 55

  32. Rifa-Pous H, Herrera-Joancomarti J (2011) Computational and energy costs of cryptographic algorithms on handheld devices. In: Proceedings of future internet, pp 31–48

    Google Scholar 

  33. Bhattacharjee S, Roy S, Bandyopadhyay S (2014) Exploring an energy-efficient DTN framework supporting disaster Management Services in Post Disaster Relief Operation. Wirel Netw 21(3):1033–1046

    Article  Google Scholar 

  34. Uddin YS, Nicol DM, Abdelzaher TF, Kravets RH (2009) A post-disaster mobility model for delay tolerant networking. In Proceedings of WSC:2785–2796

  35. Wang B, Chen X, Chang W (2014) 2014. A light-weight trust-based QoS routing algorithm for AdHoc networks. Pervasive Mobile Computing 13(2014):164–180

    Article  Google Scholar 

  36. Park Y, Sur C, Kim H, Ree KH (2017) A reliable incentive scheme using Bitcoin on cooperative vehicular ad hoc networks. INPRA 5(4):34–41

    Google Scholar 

  37. Moinet, A., Darties, B., & Baril, J.: Blockchain based trust & authentication for decentralized sensor networks. CoRR, abs/170601730. 2017

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Souvik Basu.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chakrabarti, C., Roy, S. & Basu, S. Intention aware misbehavior detection for post-disaster opportunistic communication over peer-to-peer DTN. Peer-to-Peer Netw. Appl. 12, 705–723 (2019). https://doi.org/10.1007/s12083-018-0667-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-018-0667-8

Keywords

Navigation