This work presents a new DTN routing algorithm, called Encounter-Based Routing (EBR), which maximizes delivery ratios while minimizing overhead and delay, and presents a means of securing EBR against black hole denial- of-service attacks.
Abstract:
Current work in routing protocols for delay and disruption tolerant networks leverage epidemic-style algorithms that trade off injecting many copies of messages into the network for increased probability of message delivery. However, such techniques can cause a large amount of contention in the network, increase overall delays, and drain each mobile node's limited battery supply. We present a new DTN routing algorithm, called Encounter-Based Routing (EBR), which maximizes delivery ratios while minimizing overhead and delay. Furthermore, we present a means of securing EBR against black hole denial- of-service attacks. EBR achieves up to a 40% improvement in message delivery over the current state-of-the-art, as well as achieving up to a 145% increase in goodput. Also, we further show how EBR outperforms other protocols by introduce three new composite metrics that better characterize DTN routing performance.
TL;DR: This article considers the term ICNs as Delay/Disruption Tolerant Networks (DTNs) for the purpose of generalization, since DTNs have been envisioned for different applications with a large number of proposed routing algorithms.
TL;DR: The light is shed over the latest advancements in each of the above-mentioned research sectors and highlight pending open issues in Each of them.
TL;DR: This paper first breaks up existing routing strategies into a small number of common and tunable routing modules, and shows how and when a given routing module should be used, depending on the set of network characteristics exhibited by the wireless application.
TL;DR: This paper provides a taxonomy for opportunistic routing proposals, based on their routing objectives as well as the optimization tools and approaches used in the routing design, and identifies and discusses the main future research directions related to the opportunistic routed design, optimization, and deployment.
TL;DR: This paper presents a comprehensive survey of recent social-aware routing protocols, which offer an insight into how to utilize social relationships to design efficient and applicable routing algorithms in DTNs.
TL;DR: An ad-hoc network is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure and the proposed routing algorithm is quite suitable for a dynamic self starting network, as required by users wishing to utilize ad- hoc networks.
TL;DR: This work introduces Epidemic Routing, where random pair-wise exchanges of messages among mobile hosts ensure eventual message delivery and achieves eventual delivery of 100% of messages with reasonable aggregate resource consumption in a number of interesting scenarios.
TL;DR: A new routing scheme, called Spray and Wait, that "sprays" a number of copies into the network, and then "waits" till one of these nodes meets the destination, which outperforms all existing schemes with respect to both average message delivery delay and number of transmissions per message delivered.
TL;DR: A probabilistic routing protocol for intermittently connected networks where there is no guarantee that a fully connected path between source and destination exist at any time, rendering traditional routing protocols unable to deliver messages between hosts.
TL;DR: The evaluations show that MaxProp performs better than protocols that have access to an oracle that knows the schedule of meetings between peers, and performs well in a wide variety of DTN environments.
Q1. Why do the authors only present results for the disaster scenario mobility model?
Due to space constraints, the authors only present results for the disaster scenario mobility model and only vary the number of nodes in the system.
Q2. What can be done to reduce the number of replicas?
Using probabilistic L values and changing the variance and mean can allow applications to compromise and not require exact decisions about the number of allowable replicas.
Q3. Why does EBR perform poorly in the disaster scenario?
Due to the more uniform nature of per node rate of encounters, EBR does not perform as well as it does in the disaster scenario mobility model.
Q4. What is the primary purpose of tracking the rate of encounter?
The primary purpose of tracking the rate of encounter is to intelligently decide how many replicas of a message a node should transfer during a contact opportunity.
Q5. What are the primary metrics that are used to penalize protocols for performing poorly?
Composite metrics are able to penalize protocols for performing poorly in individual primary metrics, giving a more complete picture of protocol performance.
Q6. What is the worrisome result of a DoS attack?
One of the most worrisome results is the possibility of a denial-ofservice (DoS) attack where malicious nodes act as “black holes”.
Q7. How many runs are averaged over the RWP mobility model?
When the offered load is varied using the RWP mobility model, the MaxProp data is averaged over three runs, with all other data averaged over ten runs.
Q8. Why did the authors not evaluate it in all of their scenarios?
The authors evaluated this metric in all of their scenarios; however, since it closely correlates to goodput, those results were omitted due to space constraints.
Q9. What is the main criticism of flooding-based protocols?
While quota-based protocols are much better stewards of network resources than their flooding-based counterparts, one possible criticism is their inability to successfully deliver a comparable amount of messages.
Q10. What is the simplest way to track a node’s rate of encounter?
In EBR, information about a node’s rate of encounter is a purely local metric and can be tracked using a small number of variables.