A PROBABILISTIC MISBEHAVIOR DETECTION SCHEME TOWARD EFFICIENT TRUST ESTABLISHMENT IN DELAY-TOLERANT NETWORK ABSTRACT: Malicious and selfish behaviors represent a serious threat against routing in delay/disruption tolerant networks (DTNs). Due to the unique network characteristics, designing a misbehavior detection scheme in DTN is regarded as a great challenge. In this paper, itrust, a probabilistic misbehavior detection scheme, for secure DTN routing toward efficient trust establishment. Mobile Ad hoc networks (MANETs) are susceptible to having their effective operation compromised by a variety of security attacks because of the features like unreliability of wireless links between nodes, constantly changing topology, restricted battery power, lack of centralized control and others. Nodes may misbehave either because they are malicious and deliberately wish to disrupt the network, or because they are selfish and wish to conserve their own limited resources such as power. we proposed present a mechanism that enables the detection of nodes that exhibit packet forwarding misbehavior. The approach is based on the usage of techniques which will be used in parallel in such a way that the results generated by one of them are further processed by the other to finally generate the list of misbehaving nodes. The basic idea of trust is introducing a periodically available Trusted Authority (TA) to judge the node’s behavior based on the collected routing evidences and probabilistically checking. We model trust as the inspection game and use game theoretical analysis to demonstrate that, by setting an appropriate investigation probability, TA could ensure the security of DTN routing at a reduced cost. To further improve the efficiency of the proposed scheme, we correlate detection probability with a node’s reputation, which allows a dynamic detection probability determined by the trust of the users. The extensive analysis and simulation results demonstrate the Effectiveness and efficiency of the proposed scheme using AODV Protocol. EXISTING SYSTEM: An ad hoc network nature is the main cause for making it more Vulnerable to wireless attacks. Ad hoc nodes are wireless in nature that makes it Prone. Due to the unique network characteristics, designing a misbehavior detection scheme in DTN is regarded as a great challenge. Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. Each must forward traffic so it’s making data transition problem. When we sending our data to destination in the techniques will not give more security, we don’t know the accurate selfish node in our infrastructure Ad-hoc network so in this also main drawback of our wireless Network. Another Problem it will drop more dropping packets, making time delay, reduce delivery ratio, as well as throughput because of selfish node. In iTrust scheme, the energy of node is easily reduced. And also unwanted storage of Contact history, Delegation history, forwarding history. PROPOSED SYSTEM: Mobile ad hoc networks (MANET) rely on the cooperation of all the participating nodes. The more nodes cooperate to transfer traffic, the more powerful a MANET gets. AODV protocol itself incurs a low checking overhead. However, to prevent malicious users from providing fake data transmission, calculate the dropping and losing packet size, packet delivery ratio for optimal estimation. Here we implementing and finding the dropping packets for optimal estimation for AODV. Path Tracing Algorithm to detect the malicious attack using per hop distance and pixel wise measurements link frequent appearance count parameters using AODV. So we can detect accurate misbehave person. Therefore there is a strong motivation for a node to deny packet forwarding to others, while at the same time using their services to deliver own data. SOFTWARE SPECIFICATION: HARDWARE SPECIFICATION: Processor : Intel Pentium III or higher RAM : 1 GB or higher Hard Disk : 40 GB or higher Mother Board : Intel 845 g chipset or higher I/O : Optical mouse and keyboard SOFTWARE SPECIFICATION: Operating system : Linux-Mint15 Programming : Network Simulator 2.35 Language Used : TCL and C++ Network Modeling Tool: Dia or Ns2