Abstract
Delay tolerant network (DTN) has been successfully proposed for setting up emergency post disaster communication networks when normal communication infrastructure is typically incapacitated. DTN being a network where participating nodes transmit messages to the final destination in multiple hops, its success depends on the cooperation of these participating nodes. Performance of such cooperation based networks get severely affected by misbehaving nodes that do not participate in message forwarding either due to reasons that are beyond its control (non-availability of appropriate forwarders, decreasing battery life, etc.) or out of certain malicious intentions. The misbehavior detection schemes, proposed so far, rarely investigate the actual intention behind misbehavior of participating nodes and do not attempt to restore the reputation of falsely alleged nodes. In this paper, we propose iDetect, a reputation based intention aware misbehavior detection scheme that uses contextual evidences to analyze the intention behind a node’s misbehavior. The scheme boosts the low reputation of incorrectly ostracized nodes and includes them in future communication. Re-inclusion of these nodes increases the number of genuine forwarders in the network which, in turn, assists in efficient delivery of crucial post disaster situational messages. Results of extensive simulation, using ONE simulator, substantiate the effectiveness of the proposed iDetect scheme over state-of-the-art competing schemes, in terms of detection ratio, availability ratio, etc. while not compromising on standard network performance in a post disaster communication scenario.
Similar content being viewed by others
References
International Federation of Red Cross and Red Crescent Societies. 2013. World Disasters Report 2013 - Focus on technology and the future of humanitarian action. http://www.ifrc.org/PageFiles/134658/WDR%202013%20complete.pdf
Luo H, Kravets R, Abdelzaher T (2010) The-day-after networks: a first-response edge-network architecture for disaster relief. NSF NeTS FIND Initiative
Fall, K., et al.: A disruption-tolerant architecture for secure and efficient disaster response communications. In Proceedings of ISCRAM 2010
Chenji, H., et al.: A wireless sensor, AdHoc and delay tolerant network system for disaster response. Technical report. LENSS-09-02, 2011
Ntareme H, Zennaro M, Pehrson B (2011) Delay tolerant network on smartphones. Applications or communication challenged areas In Proceedings of ExtremeCom:1–7
Campillo AM, Crowcroft J, Yoneki E, Martı R (2013) Evaluating opportunistic networks in disaster scenarios. J Netw Comput Appl 36(2013):870–880
Jain S, Demmer M, Patra R, Fall K (2005) Using redundancy to cope with failures in a delay tolerant network. In Proceedings of SIGCOMM 35:109–120
Ren J, Zhang Y, Zhang K, Shen XS (2015) Exploiting mobile crowdsourcing for pervasive cloud services: challenges and solutions. IEEE Commun Mag 53(3):98–105
Chakrabarti C, Banerjee A, Roy S (2014) An observer-based distributed scheme for selfish-node detection in a post-disaster communication environment using delay tolerant network. In Proceedings of AIMoC:151–156
Chakrabarti C, Roy S (2015) Adapting mobility of observers for quick reputation assignment in a sparse post-disaster communication network. In Proceedings of AIMoC:29–35
Basu, S, Bhattacharjee, S., Roy, S., Bandyopadhyay, S.: SAGE-PRoPHET: a security aided and group encounter based PRoPHET routing protocol for dissemination of post disaster situational data. In Proceedings of ACM ICDCN, 2015, Article No. 20
Basu, S., Roy, S.: A group-based multilayer encryption scheme for secure dissemination of post-disaster situational data using peer-to-peer delay tolerant network. In Proceedings of IEEE ICACCI, 2014, pp. 1566–1572
Ayday E, Lee H, Fekri F (2010) Trust management and adversary detection for DTN. In Proceedings of MILCOM
Karaliopoulos M (2009) Assessing the vulnerability of DTN data relaying schemes to node selfishness. IEEE Commun Lett 13(12):923–925
Li, N., Das, S. K.: Radon: reputation-assisted data forwarding in opportunistic networks. In proceedings of MobiOpp 2010, pp. 8–14
Miao, J., Hasan, O., Mokhtar, S B., Brunie, L., Yim, K.: An analysis of strategies for preventing selfish behavior in mobile delay tolerant networks. In proceedings of IMIS 2012, pp. 208–215
Ren J, Zhang Y, Zhang K, Shen XS (2016) Adaptive and channel-aware detection of selective forwarding attacks in wireless sensor networks. IEEE Trans Wirel Commun 15(5):3718–3731
Shakshuki EM, Kang N, Sheltami TR (2013) EAACK—A secure intrusion-detection system for MANETs. IEEE Trans Ind Electron 60(3):1089–1098
Michiardi P, Molva R (2002) CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of IFIP TC6/TC11 working conference on communications and multimedia security: advanced communications and multimedia security, pp 107–121
Sun D, Zhao H, Cheng S (2016) A novel membership cloud model based trust evaluation model for vehicular ad hoc network of T-CPS. Security and Communication Networks 9(18):5710–5723
Zhao H et al (2018) Dynamic trust model for vehicular cyber-physical systems. International Journal of Network Security 20(1):157–167
Hao H, Rongxing L, Cheng H, Zonghua Z (2016) PTRS: a privacy-preserving trust-based relay selection scheme in VANETs. Peer-to-Peer Networking and Applications 10(5):1204–1218
Xu S, Li M, Chen Y, Shu L, Gu X (2013) A cooperation scheme based on reputation for opportunistic networks. In Proceedings of ComManTel:289–294
Zhang X, Wang X, Liu A, Zhang Q, Tang C (2011) Reputation-based scheme for delay tolerant networks. In Proceedings of ICCSNT:974–978
Wei L, Zhu H, Cao Z, Shen X (2011) MobiID: a user-centric and social-aware reputation based incentive scheme for delay/disruption tolerant networks. In: Proceedings of ADHOC-NOW, pp 177–190
Zhu H, Du S, Gao Z, Dong M, Cao Z (2014) A probabilistic misbehavior detection scheme toward efficient trust establishment in delay-tolerant networks. IEEE Transactions on Parallel And Distributed Systems 25(1):22–32
Basu S, Biswas A, Roy S, DasBit S (2018) Wise-PRoPHET: a watchdog supervised PRoPHET for reliable dissemination of post disaster situational information over smartphone based DTN. J Netw Comput Appl 109(2018):11–23
Yusuo H, Danqi W, Hui Z, Feng W (2014) SocialTrust: enabling long-term social cooperation in peer-to-peer services. Peer-to-Peer Networking and Applications 7(4):525–538
Wozniak S, Rossberg M, Schaefer G (2013) Towards trustworthy mobile social networking Services for Disaster Response. In: Proceedings of PerNEM in conjunction with PerCom, pp 1–6
Ren J, Zhang Y, Zhang K, Shen XS (2015) SACRM: social aware crowdsourcing with reputation Management in Mobile Sensing. Comput Commun 65(1):55–65
Keranen, A., Ott, J. and Karkkainen, T.: The ONE simulator for DTN protocol evaluation. In Proceedings of SIMUTools 2009, Article No. 55
Rifa-Pous H, Herrera-Joancomarti J (2011) Computational and energy costs of cryptographic algorithms on handheld devices. In: Proceedings of future internet, pp 31–48
Bhattacharjee S, Roy S, Bandyopadhyay S (2014) Exploring an energy-efficient DTN framework supporting disaster Management Services in Post Disaster Relief Operation. Wirel Netw 21(3):1033–1046
Uddin YS, Nicol DM, Abdelzaher TF, Kravets RH (2009) A post-disaster mobility model for delay tolerant networking. In Proceedings of WSC:2785–2796
Wang B, Chen X, Chang W (2014) 2014. A light-weight trust-based QoS routing algorithm for AdHoc networks. Pervasive Mobile Computing 13(2014):164–180
Park Y, Sur C, Kim H, Ree KH (2017) A reliable incentive scheme using Bitcoin on cooperative vehicular ad hoc networks. INPRA 5(4):34–41
Moinet, A., Darties, B., & Baril, J.: Blockchain based trust & authentication for decentralized sensor networks. CoRR, abs/170601730. 2017
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Chakrabarti, C., Roy, S. & Basu, S. Intention aware misbehavior detection for post-disaster opportunistic communication over peer-to-peer DTN. Peer-to-Peer Netw. Appl. 12, 705–723 (2019). https://doi.org/10.1007/s12083-018-0667-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-018-0667-8