47,137 research outputs found

    Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Networks

    Get PDF
    Delay Tolerant Networks (DTNs) have established the connection to source and destination. For example this often faces disconnection and unreliable wireless connections. A delay tolerant network (DTNs) provides a network imposes disruption or delay. The delay tolerant networks operate in limited resources such as memory size, central processing unit. Trust management protocol uses a dynamic threshold updating which overcomes the problems .The dynamic threshold update reduces the false detection probability of the malicious nodes. The system proposes a secure routing management schemes to adopt information security principles successfully. It analyzes the basic security principles and operations for trust authentication which is applicable in delay tolerant networks (DTNs).For security the proposed system identifies the store and forward approach in network communications and analyzes the routing in cases like selfish contact and collaboration contact methods. The proposed method identifies ZRP protocol scheme and it enhances the scheme using methods namely distributed operation, mobility, delay analysis, security association and trust modules. This security scheme analyzes the performance analysis and proposed algorithm based on parameter time, authentication, security, and secure routing. From this analysis, this research work identifies the issues in DTNs secure routing and enhances ZRP (Zone Routing Protocol) by suggesting an authentication principle as a noted security principle for extremely information security concepts

    Opportunistic Key Management in Delay Tolerant Networks

    Get PDF
    Key Management is considered to be a challenging task in Delay Tolerant Networks (DTNs) operating in environments with adverse communication conditions such as space, due to the practical limitations and constraints prohibiting effective closed loop communications. In this paper we propose opportunistic key management as a more suitable solution for key management in networks requiring opportunistic behaviour. We show that opportunistic key management is better exploited and utilized when used in conjunction with routing decisions by security aware DTN nodes

    Reliable Multicast in Heterogeneous Mobile Ad-hoc Networks

    Get PDF
    In disaster scenarios, communication infrastructure could be damaged orcompletely failed. Mobile Ad-hoc Networks (MANETs) can be used to substitutefailed communication devices and thus to enable communication. As group communicationis an important part in disaster scenarios, multicast will be used to addressseveral nodes. In this paper, we propose our new reliable multicast protocol RMDA(Reliable Multicast over Delay Tolerant Mobile Ad hoc Networks). We introducean efficient group management approach and a new method for reliable multicastdelivery over Delay Tolerant Networks. We show, that our protocol is adaptive todifferent kinds of MANETs, e.g. with or without clusterheads, respectively. Forthose without, we use our name resolution over adaptive routing approach

    An Energy-Efficient MAC Protocol Using Dynamic Queue Management for Delay-Tolerant Mobile Sensor Networks

    Get PDF
    Conventional MAC protocols for wireless sensor network perform poorly when faced with a delay-tolerant mobile network environment. Characterized by a highly dynamic and sparse topology, poor network connectivity as well as data delay-tolerance, delay-tolerant mobile sensor networks exacerbate the severe power constraints and memory limitations of nodes. This paper proposes an energy-efficient MAC protocol using dynamic queue management (EQ-MAC) for power saving and data queue management. Via data transfers initiated by the target sink and the use of a dynamic queue management strategy based on priority, EQ-MAC effectively avoids untargeted transfers, increases the chance of successful data transmission, and makes useful data reach the target terminal in a timely manner. Experimental results show that EQ-MAC has high energy efficiency in comparison with a conventional MAC protocol. It also achieves a 46% decrease in packet drop probability, 79% increase in system throughput, and 25% decrease in mean packet delay

    Cryptographic Key Management in Delay Tolerant Networks (DTNs): A survey

    Get PDF
    Since their appearance at the dawn of the second millennium, Delay or Disruption Tolerant Networks (DTNs) have gradually evolved, spurring the development of a variety of methods and protocols for making them more secure and resilient. In this context, perhaps, the most challenging problem to deal with is that of cryptographic key management. To the best of our knowledge, the work at hand is the first to survey the relevant literature and classify the various so far proposed key management approaches in such a restricted and harsh environment. Towards this goal, we have grouped the surveyed key management methods into three major categories depending on whether the particular method copes with a) security initialization, b) key establishment, and c) key revocation. We have attempted to provide a concise but fairly complete evaluation of the proposed up-to-date methods in a generalized way with the aim of offering a central reference point for future research

    Cryptographic Key Management in Delay Tolerant Networks (DTNs): A survey

    Get PDF
    Since their appearance at the dawn of the second millennium, Delay or Disruption Tolerant Networks (DTNs) have gradually evolved, spurring the development of a variety of methods and protocols for making them more secure and resilient. In this context, perhaps, the most challenging problem to deal with is that of cryptographic key management. To the best of our knowledge, the work at hand is the first to survey the relevant literature and classify the various so far proposed key management approaches in such a restricted and harsh environment. Towards this goal, we have grouped the surveyed key management methods into three major categories depending on whether the particular method copes with a) security initialization, b) key establishment, and c) key revocation. We have attempted to provide a concise but fairly complete evaluation of the proposed up-to-date methods in a generalized way with the aim of offering a central reference point for future research

    Chapter 9 : Reliable data streaming over delay-tolerant networks (DTNs)

    Get PDF
    Reviews the different types of DTN and shows how they can be applied in satellite and deep-space communications, vehicular and underwater communications, and during large-scale disasters Considers the potential for rapid selection and dissemination of urgent messages is considered Reviews the breadth of areas in which DTN is already providing solutions and the prospects for its wider adoption Description Part one looks at delay-tolerant network architectures and platforms including DTN for satellite communications and deep-space communications, underwater networks, networks in developing countries, vehicular networks and emergency communications. Part two covers delay-tolerant network routing, including issues such as congestion control, naming, addressing and interoperability. Part three explores services and applications in delay-tolerant networks, such as web browsing, social networking and data streaming. Part four discusses enhancing the performance, reliability, privacy and security of delay-tolerant networks. Chapters cover resource sharing, simulation and modeling and testbeds. Readership Providing an important overview for postgraduate students and academic researchers in electronics, computer engineering, telecommunications and networking; R&D managers in industrial sectors such as wireless technology, electronics, telecommunications, networking and information technology, as well as such groups as the military and disaster management organisation

    Decoupling 5G network control: Centralised coordination and distributed adaptation

    Get PDF
    © 2018 by CC BY-NC. Fifth generation mobile networks (5G) will be featured by miniaturised cells and massive dense deployment. Traditional centralised network control cannot adapt to high signalling delay, and is therefore not scalable for future 5G networks.To address this issue, we adopt the software-defined networking (SDN) approach of decoupled network control and data transmission. In particular, delay-sensitive interference suppression for data transmission is decoupled from delay-tolerant topology control and base station coordination. This substantially alleviates the requirement of network control on delay and complexity, hence simplifying 5G control plane design, reducing signalling overhead, and enhancing network scalability. Case studies show that our decoupled network control is effective for timely interference mitigation and reliable topology management. The stability and scalability of our approach are also demonstrated

    A Taxonomy on Misbehaving Nodes in Delay Tolerant Networks

    Get PDF
    Delay Tolerant Networks (DTNs) are type of Intermittently Connected Networks (ICNs) featured by long delay, intermittent connectivity, asymmetric data rates and high error rates. DTNs have been primarily developed for InterPlanetary Networks (IPNs), however, have shown promising potential in challenged networks i.e. DakNet, ZebraNet, KioskNet and WiderNet. Due to unique nature of intermittent connectivity and long delay, DTNs face challenges in routing, key management, privacy, fragmentation and misbehaving nodes. Here, misbehaving nodes i.e. malicious and selfish nodes launch various attacks including flood, packet drop and fake packets attack, inevitably overuse scarce resources (e.g., buffer and bandwidth) in DTNs. The focus of this survey is on a review of misbehaving node attacks, and detection algorithms. We firstly classify various of attacks depending on the type of misbehaving nodes. Then, detection algorithms for these misbehaving nodes are categorized depending on preventive and detective based features. The panoramic view on misbehaving nodes and detection algorithms are further analyzed, evaluated mathematically through a number of performance metrics. Future directions guiding this topic are also presented

    Bounded message delay with threshold time constraint in delay tolerant networks (DTNs)

    Get PDF
    © 2016 IEEE. Routing in previous research works for bounded delay in Delay-Tolerant Networks (DTNs) tried their best to impose bounded delay on the message delivery. However, the existing routing protocols had a lot of issues due to the infinite buffer size and bandwidth assumption, where these resources are limited in realistic environment. In this paper, we modify and extend epidemic routing using ordinary differential equations (ODEs) to distribute message copies among the potential relay nodes to achieve the assigned threshold delay. In particular, we consider the delay requirements in DTNs by analyzing the relationship among the finite buffer threshold delivery delay and the selected relay nodes for packet forwarding. In addition, the proposed scheme defined a utility value in its message field for every forwarding relay node to update remaining TTL value each time. Furthermore, the scheme also utilize the buffer management model to further improve its performance. The considered performance metrics are delivery delay, delivery ratio and buffer occupancy (usage). Extensive simulation results show that the proposed scheme can minimize the delivery delay and uses less resource than epidemic routing to deliver the message timely in DTN environment
    • …
    corecore