278 research outputs found

    HYMAD: Hybrid DTN-MANET Routing for Dense and Highly Dynamic Wireless Networks

    Full text link
    In this paper we propose HYMAD, a Hybrid DTN-MANET routing protocol which uses DTN between disjoint groups of nodes while using MANET routing within these groups. HYMAD is fully decentralized and only makes use of topological information exchanges between the nodes. We evaluate the scheme in simulation by replaying real life traces which exhibit this highly dynamic connectivity. The results show that HYMAD outperforms the multi-copy Spray-and-Wait DTN routing protocol it extends, both in terms of delivery ratio and delay, for any number of message copies. Our conclusion is that such a Hybrid DTN-MANET approach offers a promising venue for the delivery of elastic data in mobile ad-hoc networks as it retains the resilience of a pure DTN protocol while significantly improving performance.Comment: 7 pages, 6 figure

    Narrowband delay tolerant protocols for WSN applications. Characterization and selection guide

    Get PDF
    This article focuses on delay tolerant protocols for Wireless Sensor Network (WSN) applications, considering both established and new protocols. We obtained a comparison of their characteristics by implementing all of them on an original platform for network simulation, and by testing their behavior on a common test-bench. Thereafter, matching the requirements linked to each application with the performances achieved in the test-bench, allowed us to define an application oriented protocol selection guide

    Swarm-based Intelligent Routing (SIR) - a new approach for efficient routing in content centric delay tolerant networks

    Get PDF
    This paper introduces Swarm-based Intelligent Routing (SIR), a swarm intelligence based approach used for routing content in content centric Pocket Switched Networks. We first formalize the notion of optimal path in DTN, then introduce a swarm intelligence based routing protocol adapted to content centric DTN that use a publish/subscribe communication paradigm. The protocol works in a fully decentralized way in which nodes do not have any knowledge about the global topology. Nodes, via opportunistic contacts, update utility functions which synthesizes their spatio-temporal proximity from the content subscribers. This individual behavior applied by each node leads to the collective formation of gradient fields between content subscribers and content providers. Therefore, content routing simply sums up to follow the steepest slope along these gradient fields to reach subscribers who are located at the minima of the field. Via real traces analysis and simulation, we demonstrate the existence and relevance of such gradient field and show routing performance improvements when compared to classical routing protocols previously defined for information routing in DTN

    Pervasive intelligent routing in content centric delay tolerant networks

    Get PDF
    This paper introduces a Swarm-Intelligence based Routing protocol (SIR) that aims to efficiently route information in content centric Delay Tolerant Networks (CCDTN) also dubbed pocket switched networks. First, this paper formalizes the notion of optimal path in CCDTN and introduces an original and efficient algorithm to process these paths in dynamic graphs. The properties and some invariant features of these optimal paths are analyzed and derived from several real traces. Then, this paper shows how optimal path in CCDTN can be found and used from a fully distributed swarm-intelligence based approach of which the global intelligent behavior (i.e. shortest path discovery and use) emerges from simple peer to peer interactions applied during opportunistic contacts. This leads to the definition of the SIR routing protocol of which the consistency, efficiency and performances are demonstrated from intensive representative simulations

    Using Neighborhood Beyond One Hop in Disruption-Tolerant Networks

    Full text link
    Most disruption-tolerant networking (DTN) protocols available in the literature have focused on mere contact and intercontact characteristics to make forwarding decisions. Nevertheless, there is a world behind contacts: just because one node is not in contact with some potential destination, it does not mean that this node is alone. There may be interesting end-to-end transmission opportunities through other nearby nodes. Existing protocols miss such possibilities by maintaining a simple contact-based view of the network. In this paper, we investigate how the vicinity of a node evolves through time and whether such information can be useful when routing data. We observe a clear tradeoff between routing performance and the cost for monitoring the neighborhood. Our analyses suggest that limiting a node's neighborhood view to three or four hops is more than enough to significantly improve forwarding efficiency without incurring prohibitive overhead.Comment: 5 pages, 5 figures, 1 tabl

    Towards Opportunistic Data Dissemination in Mobile Phone Sensor Networks

    Get PDF
    Recently, there has been a growing interest within the research community in developing opportunistic routing protocols. Many schemes have been proposed; however, they differ greatly in assumptions and in type of network for which they are evaluated. As a result, researchers have an ambiguous understanding of how these schemes compare against each other in their specific applications. To investigate the performance of existing opportunistic routing algorithms in realistic scenarios, we propose a heterogeneous architecture including fixed infrastructure, mobile infrastructure, and mobile nodes. The proposed architecture focuses on how to utilize the available, low cost short-range radios of mobile phones for data gathering and dissemination. We also propose a new realistic mobility model and metrics. Existing opportunistic routing protocols are simulated and evaluated with the proposed heterogeneous architecture, mobility models, and transmission interfaces. Results show that some protocols suffer long time-to-live (TTL), while others suffer short TTL. We show that heterogeneous sensor network architectures need heterogeneous routing algorithms, such as a combination of Epidemic and Spray and Wait

    Impact of content storage and retrieval mechanisms on the performance of vehicular delay-tolerant networks

    Get PDF
    “Copyright © [2010] IEEE. Reprinted from 18th International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2010). ISBN: 978-1-4244-8663-2 . This material is posted here with permission of the IEEE. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to [email protected]. By choosing to view this document, you agree to all provisions of the copyright laws protecting it.”Vehicular Delay-Tolerant Networking (VDTN) is a new disruptive network architecture based on the concept of delay tolerant networks (DTNs). VDTNs handle non-real time applications using vehicles to carry messages on their buffers, relaying them only when a proper contact opportunity occurs. Therefore, the network performance is directly affected by the storage capacity and message retrieving of intermediate nodes. This paper proposes a suitable content storage and retrieval (CSR) mechanism for VDTN networks. This CSR solution adds additional information on control labels of the setup message associated to the corresponding data bundle (aggregated traffic) that defines and applies caching and forwarding restrictions on network traffic (data bundles). Furthermore, this work presents a performance analysis and evaluation of CSR mechanisms over a VDTN application scenario, using a VDTN testbed. This work presents the comparison of the network behavior and performance using two DTN routing protocols, Epidemic and Spray and Wait, with and without CSR mechanisms. The results show that CSR mechanisms improve the performance of VDTN networks significantly.Part of this work has been supported by the Instituto de Telecomunicações, Next Generation Networks and Applications Group (NetGNA), Portugal in the framework of the Project VDTN@Lab, and by the Euro-NF Network of Excellence from the Seventh Framework Programme of EU, in the framework of the Specific Joint Research Project VDTN

    Improved search methods for assessing Delay-Tolerant Networks vulnerability to colluding strong heterogeneous attacks

    Get PDF
    Increasingly more digital communication is routed among wireless, mobile computers over ad-hoc, unsecured communication channels. In this paper, we design two stochastic search algorithms (a greedy heuristic, and an evolutionary algorithm) which automatically search for strong insider attack methods against a given ad-hoc, delay-tolerant communication protocol, and thus expose its weaknesses. To assess their performance, we apply the two algorithms to two simulated, large-scale mobile scenarios (of different route morphology) with 200 nodes having free range of movement. We investigate a choice of two standard attack strategies (dropping messages and flooding the network), and four delay-tolerant routing protocols: First Contact, Epidemic, Spray and Wait, and MaxProp. We find dramatic drops in performance: replicative protocols (Epidemic, Spray and Wait, MaxProp), formerly deemed resilient, are compromised to different degrees (delivery rates between 24% and 87%), while a forwarding protocol (First Contact) is shown to drop delivery rates to under 5% — in all cases by well-crafted attack strategies and with an attacker group of size less than 10% the total network size. Overall, we show that the two proposed methods combined constitute an effective means to discover (at design-time) and raise awareness about the weaknesses and strengths of existing ad-hoc, delay-tolerant communication protocols against potential malicious cyber-attacks
    corecore