scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Trust Calculation and Route Discovery for Delay Tolerant Networks

TL;DR: A novel model-based methodology for delay tolerant networks for extreme distances and trust based techniques to ensure secure routing in Delay Tolerant Network environments in the presence of well-behaved, selfish and malicious nodes are developed.
Abstract: With the advancement in networking technologies and emerging applications that work on different protocols, the basic usage of networks, i.e., transferring by packets and global connectivity has to be maintained. The Delay Tolerant Networks (DTNs) are characterized by high end-to-end latency, frequent disconnection, and opportunistic communication over unreliable wireless links. In this paper, we designed a dynamic trust management protocol for secure routing optimization in Delay Tolerant Network(DTN) environments in the presence of well-behaved, selfish and malicious nodes. We develop a novel model-based methodology for delay tolerant networks for extreme distances and trust based techniques to ensure secure routing.
Citations
More filters
Journal ArticleDOI
TL;DR: A new routing algorithm based on Bayesian Network (BN) is proposed to construct the prediction model, which intends to predict the movement patterns of nodes in the real VDTN scenarios and can improve the delivery ratio with a minor forwarding overhead.
Abstract: Delay Tolerant Networks (DTNs) are novel wireless mobile networks, which suffer from frequent disruption, high latency, and the lack of a complete path from source to destination. Vehicular Delay Tolerant Network (VDTN) is a special type of DTNs with vehicles as nodes. In VDTN, most nodes have specific movement patterns, however, traditional routing algorithms in DTNs do not take this characteristic into considerations very well. In this paper, a new routing algorithm based on Bayesian Network (BN) is proposed to construct the prediction model, which intends to predict the movement patterns of nodes in the real VDTN scenarios. Firstly, a comprehensive BN model is established, where more attributes of nodes are selected to improve the accuracy of the model prediction. Then, considering the complexity of the structure learning problem of BN, a novel structure learning algorithm, K2 algorithm based on Genetic Algorithm (K2-GA), is proposed to search the optimal BN structure efficiently. At last, Junction Tree Algorithm (JTA) is adopted in the inference of BN, which can accelerate the inference process through variable elimination and calculation sharing for large scale BN. The simulation results show that the proposed VDTN routing algorithm based on the BN model can improve the delivery ratio with a minor forwarding overhead.

17 citations


Cites background from "Trust Calculation and Route Discove..."

  • ...Hence, Delay Tolerant Networks (DTNs) are proposed to cope with the lack of connectivity between source and destination [1]....

    [...]

Journal ArticleDOI
01 Jan 2021
TL;DR: An honesty‐based democratic scheme (HBDS) is introduced where vehicles with higher honesty level are elected as heads—during the process, and performance results show that the proposed scheme dominates current schemes in terms of packet delivery probability, packet delivery delay, number of packets drop, and overhead ratio.

6 citations

Posted Content
TL;DR: An Honesty based Democratic Scheme (HBDS) is introduced where vehicles with higher honesty level are elected as heads -- during the process and the proposed scheme dominates current schemes in terms of packet delivery probability, packet delivery delay, number of packets drop, and overhead ratio.
Abstract: Many Internet of things (IoT) applications have been developed and implemented on unreliable wireless networks like the Delay tolerant network (DTN), however, efficient data transfer in DTN is still an important issue for the IoT applications. One of the application areas of DTN is Vehicular Delay Tolerant Network (VDTN) where the network faces communication disruption due to lack of end-to-end relay route. It is challenging as some of the nodes show selfish behavior to preserve their resources like memory, and energy level and become non-cooperative. In this article, an Honesty based Democratic Scheme (HBDS) is introduced where vehicles with higher honesty level are elected as heads -- during the process. Vehicles involved in the process would maximize their rewards (reputation) through active participation in the network activities whereas nodes with non-cooperative selfish behavior are punished. The honesty level of the heads is analyzed using Vickrey, Clarke, and Groves (VCG) model. The mathematical model and algorithms developed in the proposed HBDS technique are simulated using the VDTNSim framework to evaluate their efficiency. The performance results show that the proposed scheme dominates current schemes in terms of packet delivery probability, packet delivery delay, number of packets drop, and overhead ratio.

3 citations

Book ChapterDOI
01 Nov 2022
TL;DR: In this paper , a bibliometric analysis by designating referred papers using research objectives, citations, publishers, article efficiency and article type has been performed to cater a perception for researchers, students, experts and publishers to investigate modern research trends in the area of delay-tolerant networks.
Abstract: Delay-tolerant networks (DTNs) have potential of working in disconnected environment and tolerate high delays. Due to its promising service behaviour, researchers are encouraged to work in the area of DTNs. Over the last few years a verity of work has been carried out in the area of DTNs. To enlighten the researchers about current trends and to understand the scope of further research, 134 research papers have been referred and formulated a graphical and organized perspective. We have performed a bibliometric analysis by designating referred papers using research objectives, citations, publishers, article efficiency and article type. This analysis would cater a perception for researchers, students, experts and publishers to investigate modern research trends in the area of delay-tolerant networks.
References
More filters
Journal ArticleDOI
TL;DR: A dynamic trust management protocol for secure routing optimization in DTN environments in the presence of well-behaved, selfish and malicious nodes is designed and validated and can effectively trade off message overhead and message delay for a significant gain in delivery ratio.
Abstract: Delay tolerant networks (DTNs) are characterized by high end-to-end latency, frequent disconnection, and opportunistic communication over unreliable wireless links. In this paper, we design and validate a dynamic trust management protocol for secure routing optimization in DTN environments in the presence of well-behaved, selfish and malicious nodes. We develop a novel model-based methodology for the analysis of our trust protocol and validate it via extensive simulation. Moreover, we address dynamic trust management, i.e., determining and applying the best operational settings at runtime in response to dynamically changing network conditions to minimize trust bias and to maximize the routing application performance. We perform a comparative analysis of our proposed routing protocol against Bayesian trust-based and non-trust based (PROPHET and epidemic) routing protocols. The results demonstrate that our protocol is able to deal with selfish behaviors and is resilient against trust-related attacks. Furthermore, our trust-based routing protocol can effectively trade off message overhead and message delay for a significant gain in delivery ratio. Our trust-based routing protocol operating under identified best settings outperforms Bayesian trust-based routing and PROPHET, and approaches the ideal performance of epidemic routing in delivery ratio and message delay without incurring high message or protocol maintenance overhead.

198 citations

Journal ArticleDOI
TL;DR: This article presents a comprehensive survey of routing protocols proposed for routing in Vehicular Delay Tolerant Networks (VDTN) in vehicular environment, focusing on a special type of VANET, where the vehicular traffic is sparse and direct end-to-end paths between communicating parties do not always exist.

155 citations

Journal ArticleDOI
TL;DR: This paper gives the first comparison of SAODV and TAODV, two MANET routing protocols, which address routing security through cryptographic and trust-based means respectively, and provides performance comparisons on actual resource-limited hardware.

74 citations


"Trust Calculation and Route Discove..." refers background in this paper

  • ...The traditional networks [1], [2] work efficiently for interconnecting communication devices across globe using TCP/IP protocol [3], [4] suite ensuring end to end delivery, short and fixed delays, symmetric data rates and existing infrastructure [5]....

    [...]

Proceedings ArticleDOI
07 May 2006
TL;DR: This paper describes the store-and-forward and custody transfer concepts that are used in DTNs, and presents simulation results that illustrate the usefulness of the custody transfer feature, and a message ferry in improving the end-to-end message delivery ratio.
Abstract: Delay and disruption tolerant networks have been proposed to address data communication challenges in network scenarios where an instantaneous end-to-end path between a source and destination may not exist, and the links between nodes may be opportunistic, predictably connectable, or periodically-(dis)connected. In this paper, we describe the store-and-forward and custody transfer concepts that are used in DTNs. Then, we present simulation results that illustrate the usefulness of the custody transfer feature, and a message ferry in improving the end-to-end message delivery ratio in a multihop scenario where link availability can be as low as 20%. In particular, our results indicate that one can achieve a delivery ratio as high as 90-99% with appropriate buffer allocations. We also provide some preliminary insights on the design factors that influence the end to end delivery ratio, e.g., the link availability patterns and buffer allocation strategies.

72 citations


"Trust Calculation and Route Discove..." refers background in this paper

  • ...The traditional networks [1], [2] work efficiently for interconnecting communication devices across globe using TCP/IP protocol [3], [4] suite ensuring end to end delivery, short and fixed delays, symmetric data rates and existing infrastructure [5]....

    [...]

Journal ArticleDOI
TL;DR: A provenance-based trust framework, namely PROVEST (PROVEnance-baSed Trust model), that aims to achieve accurate peer-to-peer trust assessment and maximize the delivery of correct messages received by destination nodes while minimizing message delay and communication cost under resource-constrained network environments is proposed.
Abstract: Delay tolerant networks (DTNs) are often encountered in military network environments where end-to-end connectivity is not guaranteed due to frequent disconnection or delay. This work proposes a provenance-based trust framework, namely PROVEST (PROVEnance-baSed Trust model) that aims to achieve accurate peer-to-peer trust assessment and maximize the delivery of correct messages received by destination nodes while minimizing message delay and communication cost under resource-constrained network environments. Provenance refers to the history of ownership of a valued object or information. We leverage the interdependency between trustworthiness of information source and information itself in PROVEST. PROVEST takes a data-driven approach to reduce resource consumption in the presence of selfish or malicious nodes while estimating a node's trust dynamically in response to changes in the environmental and node conditions. This work adopts a model-based method to evaluate the performance of PROVEST (i.e., trust accuracy and routing performance) using Stochastic Petri Nets. We conduct a comparative performance analysis of PROVEST against existing trust-based and non-trust-based DTN routing protocols to analyze the benefits of PROVEST. We validate PROVEST using a real dataset of DTN mobility traces.

46 citations


"Trust Calculation and Route Discove..." refers background or methods in this paper

  • ...In DTN architecture [4], [5], [10], types of nodes are as follow: Regular node, SDTN Name register(DNR), DTN gateway....

    [...]

  • ...While social ties cover more than just friendship, we consider friendship as a major factor for determining a node’s socially selfish behaviour [4], [10]....

    [...]

  • ...Also, due to absence of trusted centralized authority, we need trust-based scheme [8] for secure routing [4], [5], [10], [11]....

    [...]