A Review on Detection of Malicious Node in Delay Tolerance Network

Authors

  • Farhat Un Nisa  M.Tech. Scholar, Department of CSE, SUSCET Tangori Mohali, Punjab, India
  • Deepinder Kaur  Assistant Professor, Department of CSE, SUSCET Tangori, Mohali, Punjab, India

Keywords:

Delay tolerant networks, store-carry-and-forward

Abstract

TODAY, The use of a wireless network enables enterprises to avoid the costly process of introducing cables into buildings or as a connection between different equipment locations. The basis of wireless systems are radio waves, an implementation that takes place at the physical level of network structure. Wireless network is installations a method by which homes, telecommunications networks and enterprise (business) avoid the costly process of introducing cables into a building, or as a connection between various equipment locations. Delay tolerant networks (DTNs), such as sensor networks with scheduled intermittent connectivity, vehicular DTNs that disseminate location-dependent information, and pocket-switched networks that allow humans to communicate without network infrastructure, are highly partitioned networks that may suffer from frequent disconnectivity. In DTNs, the in-transit messages, also named bundles, can be sent over an existing link and buffered at the next hop until the next link in the path appears. This message propagation process is usually referred to as the “store-carry-and-forward” strategy, and the routing is decided in an “opportunistic” fashion. We aim to evaluate the added effect of the presence of malicious nodes on ad hoc network performance, and determine appropriate measures to detect malicious nodes. A malicious node advertising itself as having a valid route to the destination. With this intension the attacker consumes or intercepts the packet without any forwarding. An attacker can completely modify the packet and generate fake information, this cause the network traffic diverted or dropped. Let H be a malicious node. When H receives a Route Request, it sends back a Route Reply immediately, which constructs the data and can be transmitted by itself with the shortest path. So S receives Route Reply and it is replaced by H->S. then H receives all the data from S. In this research we propose a new assesment based scheme for detection of Malicious Nodes in DTN. And examine different strategies for prevention to malicious nodes as well as Compare out come proposed scheme with the earliest established schemes.

References

  1. https://www.techopedia.com/definition/26186/wireless-network.
  2. http://searchnetworking.techtarget.com/feature/Introduction-to-wireless-networks-from-The-book-of-wireless
  3. https://www.techopedia.com/definition/26186/wireless-network
  4. http://computernetworkingnotes.com/wireless-networking-on-cisco-router/types-of-wireless-networks.html
  5. http://searchnetworking.techtarget.com/definition/disruption-tolerant-network
  6. https://en.wikipedia.org/wiki/History_of_delay-tolerant_networking
  7. http://cse.unl.edu/~wsun/DTNapp.pdf
  8. https://www.techopedia.com/definition/25927/routing-protocol
  9. http://www.ijcaonline.org/journal/number17/pxc387557.pdf
  10. http://www.ijcaonline.org/volume20/number4/pxc3873251.pdf

Downloads

Published

2021-01-30

Issue

Section

Research Articles

How to Cite

[1]
Farhat Un Nisa, Deepinder Kaur, " A Review on Detection of Malicious Node in Delay Tolerance Network, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 8, Issue 1, pp.25-27, January-February-2022.