Downloads: 126
Research Paper | Computer Science & Engineering | India | Volume 3 Issue 1, January 2014
Enhanced Channel Estimation and Traffic Monitoring for Misbehaviour Nodes in Disruption Tolerant Networks
M. Rubini | N. Tajunisha
Abstract: In disruption tolerant networks (DTNs), the malicious nodes can be detected by watchdog and pathrater solutions. To address the problem of noise between the nodes, a distributed scheme has been used to detect the packet dropping in DTNs, where a node is used to keep a few signed contact records of its previous contacts, based on it the next contacted node is detected whether the node has dropped any packet. Since misbehaving nodes may misreport the contact records in order to avoid being detected, a small part of each of the contact record is disseminated to a certain number of witness nodes. A scheme to mitigate routing misbehaviour by limiting the number of packets forwarded to the misbehaving nodes is used. Thus the misbehaving nodes ensure low packet delivery, throughput, end to end latency and more energy consumption. So a Channel Aware Detection (CAD) algorithm is used to enhance the above metrics and to limit the traffic flowing to the misbehaving nodes. The CAD algorithm is used based on two strategies, the channel based estimation and traffic monitoring. If the monitored loss rate at particular hops exceeds the estimated normal loss rate, those nodes identified will be taken as attackers. The NS2 simulation shows that the solutions are efficient and effectively enhance routing misbehaviour.
Keywords: Detection of misbehaving nodes, network security, routing with peer id
Edition: Volume 3 Issue 1, January 2014,
Pages: 158 - 164
How to Cite this Article?
M. Rubini, N. Tajunisha, "Enhanced Channel Estimation and Traffic Monitoring for Misbehaviour Nodes in Disruption Tolerant Networks", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=10011401, Volume 3 Issue 1, January 2014, 158 - 164, #ijsrnet
How to Share this Article?
Similar Articles with Keyword 'network security'
Downloads: 102
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1728 - 1731Key Management in Wireless Sensor Networks - A Review
Majida C V | Sandhya V [4]
Downloads: 103
Research Paper, Computer Science & Engineering, Bahrain, Volume 5 Issue 10, October 2016
Pages: 1112 - 1116Network Security Mechanism Based On Static Internet Protocol Addressing
Ahmed D. Asad