Downloads: 126 | Views: 274
Research Paper | Computer Science & Engineering | India | Volume 3 Issue 1, January 2014 | Popularity: 6.2 / 10
Enhanced Channel Estimation and Traffic Monitoring for Misbehaviour Nodes in Disruption Tolerant Networks
M. Rubini, N. Tajunisha
Abstract: In disruption tolerant networks (DTNs), the malicious nodes can be detected by watchdog and pathrater solutions. To address the problem of noise between the nodes, a distributed scheme has been used to detect the packet dropping in DTNs, where a node is used to keep a few signed contact records of its previous contacts, based on it the next contacted node is detected whether the node has dropped any packet. Since misbehaving nodes may misreport the contact records in order to avoid being detected, a small part of each of the contact record is disseminated to a certain number of witness nodes. A scheme to mitigate routing misbehaviour by limiting the number of packets forwarded to the misbehaving nodes is used. Thus the misbehaving nodes ensure low packet delivery, throughput, end to end latency and more energy consumption. So a Channel Aware Detection (CAD) algorithm is used to enhance the above metrics and to limit the traffic flowing to the misbehaving nodes. The CAD algorithm is used based on two strategies, the channel based estimation and traffic monitoring. If the monitored loss rate at particular hops exceeds the estimated normal loss rate, those nodes identified will be taken as attackers. The NS2 simulation shows that the solutions are efficient and effectively enhance routing misbehaviour.
Keywords: Detection of misbehaving nodes, network security, routing with peer id
Edition: Volume 3 Issue 1, January 2014
Pages: 158 - 164
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Informative Article, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022
Pages: 1497 - 1500Innovative Approach to Mitigate Man-in-the-Middle Attacks in Secure Communication Channels
Arnab Dey
Downloads: 4 | Weekly Hits: ⮙2 | Monthly Hits: ⮙4
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024
Pages: 779 - 789Machine Learning-Based Detection of Synonymous IP Flood Attacks on Server Infrastructure
Surbhi Batra, Chandra Sekhar Dash
Downloads: 5 | Weekly Hits: ⮙5 | Monthly Hits: ⮙5
Analysis Study Research Paper, Computer Science & Engineering, Saudi Arabia, Volume 13 Issue 3, March 2024
Pages: 1927 - 1929Optimizing Network Security through Inline Sandbox Deployment: A Practical Approach with Trellix
Tahir Bashir
Downloads: 8 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Review Papers, Computer Science & Engineering, India, Volume 13 Issue 3, March 2024
Pages: 882 - 886Maximizing Cyber Security through Machine Learning and Data Analysis for Advanced Threat Detection and Mitigation
Manupreet Kaur
Downloads: 103 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1728 - 1731Key Management in Wireless Sensor Networks - A Review
Majida C V, Sandhya V