Investigating Performance of Extended Epidemic Routing Protocol of DTN under Routing Attack

Size: px
Start display at page:

Download "Investigating Performance of Extended Epidemic Routing Protocol of DTN under Routing Attack"

Transcription

1 Investigating Performance of Extended Epidemic Routing Protocol of DTN under Routing Attack Harminder Singh Bindra 1, A L Sangal 2 1 Research Scholar, Department of CSE, DR B R Ambedkar National Institute of Technology Jalandhar, India 2 Professor, Principal, DAV Institute of Engineering and Technology, Jalandhar, India Abstract - Nodes in the DTN work on the foundation of cooperation in the network. When working in a cooperative manner, these nodes consume some network resources like bandwidth, buffer space etc. Like any other networks, DTNs are also prone to the malicious nodes and different attacks. In this work, we have proposed an attack model comprising of falsification of extended routing protocol metadata information combined with drop all attack. We have proposed the attack model definition and analyzed the performance of extended Epidemic routing protocol of DTN under this attack model. From the simulation results, we analyzed that the delivery probability of extended Epidemic routing protocols is greatly affected by the proposed attack model whereas the DTN routing protocols are proved to be robust against the individual attacks when implemented independently of each other. Keywords: Delay Tolerant Networks, Epidemic, Spray & Wait, Prophet, Delivery probability, Average latency, Overhead ratio. 1 Introduction Traditionally, data networks are sculpted by linking graphs whereby the continuation of at least one end-to-end passage among any source-destination duet is endlessly certain. In these networks, any random bond between two network nodes is thought to be bidirectional sustaining symmetric data rates with slight error chances and latency (i.e. Round-trip time is in the order of milliseconds). In these networks, packets are not thought to survive in a node s buffer for a prolonged time period. On the foundation of these fundamental suppositions, the Internet was planned and its most universally used protocols, predominantly the TCP/IP protocol suite, were planned. On the other hand, these suppositions do not clutch when scheming existing and newly budding wireless networks, particularly those which are to be deployed in acute environments (e.g. Battlefields, volcanic regions, deep oceans, deep space, developing regions, etc.). Under such demanding environment, these networks suffer from extensive delays, acute bandwidth limitations, widespread mobility of nodes, recurrent power outages and frequent communication hindrance. Wireless networks operational under these demanding conditions experiences connectivity which becomes noticeably discontinuous and no uninterrupted end-to-end path(s) between any source-destination pair can be assured [1]. Popular examples of such irregularly connected networks (ICNs) scenarios are satellites, deep space probes, Wireless Sensor Networks (WSNs), Mobile Wireless Sensor Net- works (MWSNs) and Sensor/Actuator Networks (SANs) deployed in acute regions, Mobile Ad-Hoc Networks (MANETs) in general consisting of nodes (e.g. GPSs, PDAs, Cellular Phones, Tracking devices, Laptops, etc.) mounted over endlessly moving objects [1]. Numerous study interests spotlight on developing new approaches for routing in delay tolerant network atmosphere. These routing schemes in general use the store-carry-and- forward approach, where intermediate nodes keep the message until encounter other nodes to set up new links in the path to the destination [2]. DTN Routing protocols can be generally categorized on two bases: (1) on the basis of the number of copies and (2) on the basis of knowledge of future contact opportunities and message patterns. On the basis of the number of copies, we have Single-copy routing schemes which use only one copy per message and significantly reduce the resource requirements but suffer from long delays and low delivery ratios. Other one is Multi-copy routing schemes has a high probability of delivery and lower delays at the cost of buffer space and more message transfers. This work is related to the security issues of the extended routing protocols [20] and studies the robustness of these protocols against the attack model proposed in this work. Section 2 summarizes prior related work on routing in disrupted environment and the attacks on the delay tolerant networks. Section 3 details the system model. In this section, the details about the security assumptions, routing model and simulation settings are discussed. Section 4 detail the attack model proposed in this paper. This section emphasis on the step by step description of the attack model for this work. In Section 5, results obtained from the simulation study are discussed. In this, the results are discussed for

2 the three metrics i.e. delivery probability, overhead ratio and average latency under the varying buffer size of the nodes. Section 6 concludes the study and lists the results obtained in this study. 2 RELATED WORK Basic DTN routing algorithms rely only on node movement, and no other information is used for the establishment of the communication link. Examples of primary DTN routing are Custody Transfer and Epidemic Routing. In order to get better performance of DTN routing, numerous mechanisms have been implemented in diverse DTN routing protocols [1], [2], [3], [4], [5], [6]. These mechanisms often take account of duplication of packets to several nodes so as to raise the probability of delivery and to lessen the delivery latency. In a sole contact, only restricted packets may be exchanged among two portable nodes. As an effect, the orders of packet transmit, which depends on the precedence a node acquaintances with every packet, has momentous impact on the general performance. Replication- based DTN routing protocols vary principally on how each packet s precedence is determined. Software of DTN study projects uses an arbitrary algorithm to reproduce node movement while mobility in actual existence has a knowable pattern. Certain DTN routing algorithms are designed to exploit this expected action of node mobility for predicting message delivery in a probabilistic approach [7]. There are numerals of additional proactive approaches to routing which are made achievable by stronger assumptions such as awareness of connectivity model and be in command of peer movement [8-14]. By and large the routing protocols of DTN deal with their buffers as first-in-first-out (FIFO) queues [15]. A further approach is Drop Least Encountered (DLE) algorithm [16] which proposed dropping messages with the lowest likelihood of delivering and various work deployed this dropping technique [7,10,12,17]. The problem associated to the existence of copy of the previously delivered communication in multi copy routing design was studied by Bindra et. al. in [18]. It was assessed that if the copies are removed at the same instance when the one of the data bundle is conveyed then there is the possibility for step up in the performance of the routing protocols. Further Bindra et. al. in [19] proposed a message deletion policy for multi-copy routing scheme and analyzed the buffer occupancy of the nodes under this extended routing protocol (with proposed message deletion policy). Simulation results show that the extended routing protocol proposed in this work greatly relaxes the buffers of the nodes enabling them to handle more and more messages, which in turn improve the efficiency of the routing protocol. It also helps in preventing the nodes from buffer overflow problem and relaxes the resource utilization of the nodes. In year 2013, Bindra et. al. in [20] studied the performance of different routing protocol with the proposed buffer management scheme. This scheme helped in preventing the nodes from excessive utilization of resources. It was analyzed that the extended routing protocols (with this new buffer management scheme) performed with improved delivery probability values with reduced overhead ratio and lower average latency value. Performance of DTN routing protocols not only depend on the factors considered above but also depend on the attacks by the malicious nodes. There are numerous studies on securing the routing protocols of MANETs which focuses on securing the path establishment process [21], [22], [23], [24], [25], [26]. But these schemes cannot be used in securing the DTN as in DTN there is intermittent connectivity and no end-to-end path exist for all sourcedestination pair at all the time. 3 SYSTEM MODEL In this section, we describe the system model of the network used for the analysis. This section also explains the security assumptions, mobility model, scenario, interface, node group, message creation specific settings. We evaluated the robustness of Extended routing protocols of DTN in the presence of attacking node. All the evaluations were performed using our simulator modified from ONE simulator [28], a simulator developed specifically for the DTN simulations. 1.1 Security Assumption In this work, we have assumed that the relay nodes do not perform any authentication on the authenticity of the packets. Due to this non availability of this authentication service, the malicious nodes can add the fake metadata into the network i.e. the malicious nodes can add false delivery information of the packets into the network. Another assumption made for this study is the lack of global knowledge of topology of the network to the nodes of the network. If this information is available in the network, the malicious nodes can perform much more damage to the routing performance. We have shown that, even in the absence of this information, yet our proposed attack model degrades the performance of the routing protocols to a great extent. 1.2 Routing Model The routing protocol used in our evaluation is the extended version of Epidemic Routing Protocol [20]. The considered protocol is a replication-based DTN routing protocol. MaxProp which is also a replication based protocol has been shown to provide robustness against various attacks [17]. It offers better throughput than several other strategies such as Epidemic [1], Prophet [3] and Spray and Wait [2]. The overall routing model

3 implemented is shown in figure 1 and 2. Fig 1: Flowchart for the base Routing Protocols of DTN 4 ATTACK MODEL In [27], four general attacks Drop All, Random flooding, Invert routing metadata, and Acknowledgement counterfeiting were experimentally shown to be ineffective. Although the above attacks may be ineffective, many variant of these attacks are still possible. In addition, these attacks can be pooled to support each other. Our proposed attack consists of falsification of extended routing protocol metadata information combined with drop all attack. In our extended DTN routing protocol, the network wide message delivery information is propagated to remove the existing replicas of the delivered information [20]. But if the malicious nodes are present in the network, they can inject the false delivery information Fig 2: Flowchart for the Extended Routing Protocol of DTN in the network about the packets present in the buffer of this node and drop all the packets which are present in the buffer. The detailed attack model is represented below. The figure 3(a) shows the behavior of normal node. In normal nodes, when two nodes come in the communication range of each other, they populate and exchange the del_msgs lists. Further details about the del_msgs lists and normal behavior of nodes are given in work by Bindra et al. [20]. But if one of the connected nodes or both are malicious, then the behavior of malicious node is depicted in figure 3(b). When these nodes get connected, first of all it reads all the messages from its collection and adds their ids in the del_msgs list and drop all the messages.

4 Figure 3: a) Behavior of Normal Node 5 RESULTS AND DISCUSSION In this section, we discuss the results of the simulations of the system model and attack model presented in section 3 and section 4. To study the attack Figure 3: b) Behavior of Malicious Node model, simulations are carried out in our simulator that was modified from ONE simulator [28], simulator designed for DTN simulations. The detailed simulation setup is presented in Table 1. Table 1: Simulation Configuration Scenario Setting Name simulateconnection updateinterval endtime Default_scenario True 0.1 s s Interface Specific Setting Name Type Transmit Speed Transmit Range btinterface SimpleBroadcastInterface 250k 30 m Node Group Specific Settings Shortest Path Movement Extended Version of [Epidemic] 5-35M 300, 900 s 1 btinterface 0.5, 1.5 m/s 120 mins 40 Movement Model Router Buffer size Wait Time No of Interfaces interface1 Speed Msg Ttl No of Hosts Message Creation Parameters

5 Events.nr of 1 Events1.class Events1.interval Events1.size Events1.hosts Events1.prefix Message Event Generator 15,30 s 250k, 2M 0, 39 M Movement Model Settings MovementModel.rngSeed MovementModel.worldSize MovementModel.warmup , 3400 m 1000 s Style Bold and Italic : Category Heading A. The Impact on Delivery Probability From the fig 4 (a), we analyze that the presence of the attacker node reduces delivery probability of extended protocols. In case of epidemic routing protocol, there is 23% decrease in delivery probability when only 4% of attacker nodes are present. If we increase % of attacking nodes, there is larger decrease in delivery probability. B. The Impact on Overhead Ratio From fig 4(b), it is clear that there is a significant increase in the Over Head Ratio when proposed attack is implemented. When 20% attacking nodes are present, there Bold: Attribute Italic : Attribute value Attribute which is varied is 115% increase in overhead ratio for epidemic routing C. The Impact on Average Latency Results obtained from the simulative study show interesting results for the average latency. Figure 4(c) show that there is an improvement in Average Latency experienced by delivered message. This is because of fact that now buffer is further relaxed as more packets are being deleted due to proposed attack model. Thus remaining packets have to wait for less amount of time in buffer queue. It is observed that average latency value improves by 65% for epidemic routing when20% attacking nodes are added. (a) (b) (c) Figure 4: (a) Delivery Probability under attack model (b) Overhead Ratio under Attack model (c) Average Latency under attack model need of the authentication service in the routing protocols so that these attacks can be prevented. 6 CONCLUSION Routing metadata that are employed in DTN routing to improve resource utilization can be exploited by attackers to improve the effectiveness of attacks. We have presented an attacks model - comprising of falsification of extended routing protocol metadata information combined with drop all attack - that demonstrates how attackers can exploit routing metadata to improve the effectiveness of attacks. Earlier works from the literature say that the DTN routing protocols are robust to the routing attacks. But the attack model proposed above which is a combination of two attacks is effective enough to degrade the performance of the extended routing protocols of DTN. The simulation results show that the addition of attacker nodes in the network decreases the delivery probability, increases the overhead ratio and decreases the average latency. From the results, it can be analyzed that the effectiveness of the attack increases when the combination of the attacks is employed in collaboration. So from these results we can conclude that there is the In the future, we will try to provide the preventive measures or the authentication service to prevent the attacks and to preserve the performance of these extended routing protocols even in the presence of the attacking nodes. REFERENCES [1] A. Vahdat and D. Becker, Epidemic routing for partially connected ad hoc networks, Department of Computer Science, Duke University, Durham, NC, Tech. Rep., [2] T. Spyropoulos, K. Psounis, and C. S. Raghavendra, Spray and wait: an efficient routing scheme for intermittently connected mobile networks, in WDTN 05: Proceeding of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking. New York, NY, USA: ACM Press, 2005, pp [3] A. Lindgren, A. Doria, and O. Schele n, Probabilistic routing in intermittently connected

6 networks, Lecture Notes in Computer Science, vol.3126, pp , January [4] B. Burns, O. Brock, and B. Levine, Mv routing and capacity building in disruption tolerant networks, vol. 1, 2005, pp vol. 1. [5] J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine, MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networking, in Proceedings of IEEE Infocom 2006, Barcelona, Spain, April 2006.[Online]. Available: nfocom2006. [6] A. Balasubramanian, B. N. Levine, and A. Venkataramani, DTN Routing as a Resource Allocation Problem, in Proc. ACM Sigcomm, Kyoto, Japan, August [Online]. [7] Lindgren, A., Doria, A., & Schel, O. (2003). Probabilistic routing in intermittently connected networks. SIGMOBILE Mobile Computing and Communications Review, 7 (3), [8] Jain, S., Fall, K., & Patra, R. (2004). Routing in a delay tolerant network. SIGMOBILE Computing and Communications Review, 34(4), [9]. Wenrui, Z., & Ammar, M. H. Message ferrying: Proactive routing in highly-partitioned wireless ad hoc networks. pp [10]. Sarafijanovic-Djukic, N., Grossglauser, M., & Mitrou, N., et al. (2004). Last encounter routing under random waypoint mobility NETWORKING Networking technologies, services, and protocols; performance of computer and communication networks; mobile and wireless communications, Lecture Notes in Computer Science, pp : Berlin, Heidelberg: Springer. [11] Zhao, W., Ammar, M., & Zegura, E. (2004). A message ferrying approach for data delivery in sparse mobile ad hoc networks. In Proceedings of the 5th ACM international symposium on Mobile ad hoc networking and computing (pp ). Tokyo, Japan: Roppongi Hills. [12]. Burns, B., Brock, O., & Levine, B. N. (2005, March). MV routing and capacity building in disruption tolerant networks. In INFOCOM th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE (Vol. 1, pp ). IEEE. [13] Yang, J., Chen, Y., Ammar, M., & Lee, C. (2005, March). Ferry replacement protocols in sparse manet message ferrying systems. In Wireless communications and networking conference, 2005 IEEE(Vol. 4, pp ). IEEE. [14] Zhao, W., Ammar, M., & Zegura, E. (2005, March). Controlling the mobility of multiple date transport ferries in a delay-tolerant network. In INFOCOM th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE (Vol. 2, pp ). IEEE. [15]. Vahdat, A., & Becker, D. (2000). Epidemic routing for partially connected ad hoc networks. [16] James, A. D. Wearable computers as packet transport mechanisms in highly-partitioned ad-hoc networks. pp [17]. Grossglauser, M., & Vetterli, M. Locating nodes with EASE: Last encounter routing in ad hoc networks through mobility diffusion. vol. 3. pp [18] Harminder Singh Bindra, A L Sangal, Need of Removing Delivered Message Replica from Delay Tolerant Network - A Problem Definition I. J. Computer Network and Information Security, Vol. 4, No. 12, November 2012, [19] Harminder Singh Bindra, A. L. Sangal, Analyzing Buffer Occupancy of the Nodes under Acknowledged Delay Tolerant Network s Routing Protocols, Communications in Computer and Information Science, Springer Berlin Heidelberg, 2013, [20] Harminder Singh Bindra, A. L. Sangal, Extension of Delay Tolerant Network s Routing Protocols for Preventing Excessive Utilization of Resources, Wireless Pers Communication, Springer Science Business Media New York [21] D. Djenouri and N. Badache, Struggling against selfishness and black hole attacks in manets, Wirel. Commun. Mob. Comput., vol. 8, no. 6, pp , [22] D. Hongmei, L. Wei, and A. Dharma P., Routing security in wireless ad hoc networks, IEEE Communications magazine, October [23] Y. C. Hu, A. Perrig, and D. B. Johnson, Packet leashes:a defense against wormhole attacks in wireless networks, vol. 3, 2003, pp vol.3. [24] Cristina and H. Rubens, An on-demand secure routing protocol resilient to Byzantine failures, in ACM Workshop on Wireless Security (WiSe), Atlanta, Georgia, September [25] S. Yi, P. Naldurg, and R. Kravets, A security-aware routing protocol for wireless ad hoc networks, in in: Proceedings of ACM Symposium on Mobile Ad Hoc Networking and Computing (Mobihoc), 2001, pp [26] Y. chun Hu, Rushing attacks and defense in wireless ad hoc network routing protocols, in in ACM Workshop on Wireless Security (WiSe), 2003, pp [27]J. Burgess, G. D. Bissias, M. D. Corner, and B. N. Levine, Surviving attacks on disruption-tolerant networks without authentication, in MobiHoc 07: Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing. Montreal, Quebec, Canada: ACM Press, 2007, pp [28] A. Kernen, J. Ott, and T. Kinen, The ONE simulator for DTN protocol evaluation, in Proceedings of the 2nd International Conference on Simulation Tools and Techniques, Rome, Italy, 2009, pp

Need of Removing Delivered Message Replica from Delay Tolerant Network - A Problem Definition

Need of Removing Delivered Message Replica from Delay Tolerant Network - A Problem Definition I. J. Computer Network and Information Security, 2012, 12, 59-64 Published Online November 2012 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2012.12.06 Need of Removing Delivered Message Replica

More information

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES B.Poonguzharselvi 1 and V.Vetriselvi 2 1,2 Department of Computer Science and Engineering, College of Engineering Guindy, Anna University Chennai,

More information

Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay

Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay Conference on Advances in Communication and Control Systems 2013 (CAC2S 2013) Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay Anjula

More information

Application of Graph Theory in DTN Routing

Application of Graph Theory in DTN Routing Application of Graph Theory in DTN Routing Madan H. T. 1, Shabana Sultana 2 1 M. Tech. (CNE), NIE, Mysuru 2 Associate Professor, Dept. of Computer Science & Eng., NIE, Mysuru Abstract: Delay tolerant network

More information

Energy Consumption and Performance of Delay Tolerant Network Routing Protocols under Different Mobility Models

Energy Consumption and Performance of Delay Tolerant Network Routing Protocols under Different Mobility Models 2016 7th International Conference on Intelligent Systems, Modelling and Simulation Energy Consumption and Performance of Delay Tolerant Network Routing Protocols under Different Mobility Models Bhed Bahadur

More information

Archna Rani [1], Dr. Manu Pratap Singh [2] Research Scholar [1], Dr. B.R. Ambedkar University, Agra [2] India

Archna Rani [1], Dr. Manu Pratap Singh [2] Research Scholar [1], Dr. B.R. Ambedkar University, Agra [2] India Volume 4, Issue 3, March 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Evaluation

More information

Routing in Delay Tolerant Networks (DTN)

Routing in Delay Tolerant Networks (DTN) Int. J. Communications, Network and System Sciences, 2011, 4, 53-58 doi:10.4236/ijcns.2011.41006 Published Online January 2011 (http://www.scirp.org/journal/ijcns) Routing in Delay Tolerant Networks (DTN)

More information

Design and Implementation of Improved Routing Algorithm for Energy Consumption in Delay Tolerant Network

Design and Implementation of Improved Routing Algorithm for Energy Consumption in Delay Tolerant Network IJIRST International Journal for Innovative Research in Science & Technology Volume 3 Issue 07 December 2016 ISSN (online): 2349-6010 Design and Implementation of Improved Routing Algorithm for Energy

More information

Simulation of Epidemic, Spray and Wait and First Contact Routing Protocols in Delay Tolerant Network

Simulation of Epidemic, Spray and Wait and First Contact Routing Protocols in Delay Tolerant Network Simulation of, Spray and Wait and First Contact Routing Protocols in Delay Tolerant Network 1 Monika Aneja, 2 Vishal Garg 1 (P.G. Student JMIT, Radaur, Yamunanagar) 2 (Assistant Professor JMIT Radaur Yamunanagar)

More information

Routing in a Delay Tolerant Network Sushant Jain, Kevin Fall and Rabin Patra SIGCOMM Presented by Xun Gong

Routing in a Delay Tolerant Network Sushant Jain, Kevin Fall and Rabin Patra SIGCOMM Presented by Xun Gong Routing in a Delay Tolerant Network Sushant Jain, Kevin Fall and Rabin Patra SIGCOMM 2004 Presented by Xun Gong Outline Delay Tolerant Networks Routing Problem in DTNs Multiple-copy Approach Flooding and

More information

Performance Analysis of Delay Tolerant Network Routing Protocols in Different Mobility Environments

Performance Analysis of Delay Tolerant Network Routing Protocols in Different Mobility Environments Performance Analysis of Delay Tolerant Network Routing Protocols in Different Mobility Environments Bhed Bahadur Bista Faculty of Software and Information Science Iwate Prefectural University Takizawa

More information

Spray and Dynamic: Advanced Routing in Delay Tolerant Networks

Spray and Dynamic: Advanced Routing in Delay Tolerant Networks Int. J. Communications, Network and System Sciences, 2012, 5, 98-104 http://dx.doi.org/10.4236/ijcns.2012.52013 Published Online February 2012 (http://www.scirp.org/journal/ijcns) Spray and Dynamic: Advanced

More information

Integrated Routing Protocol for Opportunistic Networks

Integrated Routing Protocol for Opportunistic Networks Integrated Routing Protocol for Opportunistic Networks Anshul Verma Computer Science and Engineering Dept. ABV-Indian Institute of Information Technology and Management, Gwalior, India E-mail: anshulverma87@gmail.com

More information

hash chains to provide efficient secure solutions for DSDV [7].

hash chains to provide efficient secure solutions for DSDV [7]. A Ferry-based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks M. Chuah, P.Yang, J. Han {chuah, pey24, jih26}@cse.lehigh.edu Department of Computer Science & Engineering Lehigh University

More information

Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey. Namita Mehta 1 and Mehul Shah 2

Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey. Namita Mehta 1 and Mehul Shah 2 , pp.151-158 http://dx.doi.org/10.14257/ijfgcn.2014.7.1.15 Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey Namita Mehta 1 and Mehul Shah 2 1 Student, Department

More information

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS Sanjay Kumar, K. Suraj and Sudhakar Pandey Department of Information Technology, National Institute of Technology Raipur, India E-Mail:

More information

TRUST FRAMEWORK FOR DATA FORWARDING IN OPPORTUNISTIC NETWORKS USING MOBILE TRACES

TRUST FRAMEWORK FOR DATA FORWARDING IN OPPORTUNISTIC NETWORKS USING MOBILE TRACES TRUST FRAMEWORK FOR DATA FORWARDING IN OPPORTUNISTIC NETWORKS USING MOBILE TRACES B.Poonguzharselvi 1 and V.Vetriselvi 2 1,2 Department of Computer Science and Engineering, College of Engineering Guindy,

More information

A Joint Replication-Migration-based Routing in Delay Tolerant Networks

A Joint Replication-Migration-based Routing in Delay Tolerant Networks A Joint -Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Dept. of Computer and Info. Sciences Temple University Philadelphia, PA 19122 Zhen Jiang Dept. of Computer Science West

More information

MDR Based Cooperative Strategy Adaptation in Wireless Communication

MDR Based Cooperative Strategy Adaptation in Wireless Communication MDR Based Cooperative Strategy Adaptation in Wireless Communication Aswathy Mohan 1, Smitha C Thomas 2 M.G University, Mount Zion College of Engineering, Pathanamthitta, India Abstract: Cooperation among

More information

Design of Simulator for Finding the Delay Distribution in Delay Tolerant Networking

Design of Simulator for Finding the Delay Distribution in Delay Tolerant Networking Global Journal of Computer Science and Technology Network, Web & Security Volume 12 Issue 14 Version 1. Year 212 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Buffer Aware Network Coded Routing Protocol for Delay Tolerant Networks

Buffer Aware Network Coded Routing Protocol for Delay Tolerant Networks Middle-East Journal of Scientific Research 23 (Sensing, Signal Processing and Security): 291-296, 2015 ISSN 1990-9233 IDOSI Publications, 2015 DOI: 10.5829/idosi.mejsr.2015.23.ssps.111 Buffer Aware Network

More information

Impact of Social Networks in Delay Tolerant Routing

Impact of Social Networks in Delay Tolerant Routing Impact of Social Networks in Delay Tolerant Routing Eyuphan Bulut, Zijian Wang and Boleslaw K. Szymanski Department of Computer Science and Center for Pervasive Computing and Networking Rensselaer Polytechnic

More information

IJSER. 1. Introduction. 1.1 Routing in DTN: Sukhpreet Kaur

IJSER. 1. Introduction. 1.1 Routing in DTN: Sukhpreet Kaur International Journal of Scientific & Engineering Research, Volume 7, Issue 4, April-2016 1717 A Review of Energy Consumption on DTN Routing Protocols Sukhpreet Kaur Abstract: DTN is net of similar nets.

More information

DTN Routing in Vehicular Sensor Networks

DTN Routing in Vehicular Sensor Networks DTN Routing in Vehicular Sensor Networks Xu Li, Wei Shu, Minglu Li, Hongyu Huang and Min-You Wu Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China Department

More information

Efficiency Analysis of Enhanced Epidemic Routing Protocol of Delay Tolerant Networks using Improved Buffer Management

Efficiency Analysis of Enhanced Epidemic Routing Protocol of Delay Tolerant Networks using Improved Buffer Management Efficiency Analysis of Enhanced Epidemic Routing Protocol of Delay Tolerant Networks using Improved Buffer Management 195 Abstract Assistant Professor, Department of IT, MIMIT Malout. Bindra.harminder@gmail.com

More information

ABSTRACT I. INTRODUCTION II. CHARACTERISTICS OF DELAY TOLERANT NETWORKS

ABSTRACT I. INTRODUCTION II. CHARACTERISTICS OF DELAY TOLERANT NETWORKS International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 5 ISSN : 2456-3307 Survey of Various Protocols Used for Delay Tolerant

More information

Capacity-Aware Routing Using Throw-Boxes

Capacity-Aware Routing Using Throw-Boxes Capacity-Aware Routing Using Throw-Boxes Bo Gu, Xiaoyan Hong Department of Computer Science University of Alabama, Tuscaloosa, AL 35487 {bgu,hxy}@cs.ua.edu Abstract Deploying the static wireless devices

More information

Geographic information based Replication and Drop Routing (GeoRaDR): A Hybrid Message Transmission Approach for DTNs

Geographic information based Replication and Drop Routing (GeoRaDR): A Hybrid Message Transmission Approach for DTNs Geographic information based Replication and Drop Routing (GeoRaDR): A Hybrid Message Transmission Approach for DTNs Dr. Santhi Kumaran Associate Professor, Dept of Computer Engineering,

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

Buffer Management in Delay Tolerant Networks

Buffer Management in Delay Tolerant Networks Buffer Management in Delay Tolerant Networks Rachana R. Mhatre 1 And Prof. Manjusha Deshmukh 2 1,2 Information Technology, PIIT, New Panvel, University of Mumbai Abstract Delay tolerant networks (DTN)

More information

Overhead Reduction In Delay Tolerant Networks

Overhead Reduction In Delay Tolerant Networks Overhead Reduction In Delay Tolerant Networks Azadeh Omidvar School of Electrical Engineering Iran University of Science and Technology Tehran, Iran omidvar@elec.iust.ac.ir Karim Mohammadi School of Electrical

More information

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 9 February 2015 ISSN (online): 2349-6010 Elimination Of Redundant Data using user Centric Data in Delay Tolerant

More information

Using local speed information as routing metric for delay tolerant networks

Using local speed information as routing metric for delay tolerant networks Using local speed information as routing metric for delay tolerant networks FUQUAN ZHANG 1, INWHEE JOE, DEMIN GAO 1 AND YUNFEI LIU 1 1 College of Information and Sciences NanJing Forestry University NanJing

More information

Impact of Social Networks on Delay Tolerant Routing

Impact of Social Networks on Delay Tolerant Routing Impact of Social Networks on Delay Tolerant Routing Eyuphan Bulut, Zijian Wang and Boleslaw K. Szymanski Department of Computer Science and Center for Pervasive Computing and Networking Rensselaer Polytechnic

More information

Estimation based Erasure-coding Routing in Delay Tolerant Networks

Estimation based Erasure-coding Routing in Delay Tolerant Networks Estimation based Erasure-coding Routing in Delay Tolerant Networks Yong Liao, Kun Tan, Zhensheng Zhang, Lixin Gao Dep. of Electrical & Computer Eng. Microsoft Research Asia San Diego Research Center University

More information

Improvement of Buffer Scheme for Delay Tolerant Networks

Improvement of Buffer Scheme for Delay Tolerant Networks Improvement of Buffer Scheme for Delay Tolerant Networks Jian Shen 1,2, Jin Wang 1,2, Li Ma 1,2, Ilyong Chung 3 1 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science

More information

A Qualitative Survey on Multicast Routing in Delay Tolerant Networks

A Qualitative Survey on Multicast Routing in Delay Tolerant Networks A Qualitative Survey on Multicast Routing in Delay Tolerant Networks Sushovan Patra 1, Sujoy Saha 2, Vijay Shah 1, Satadal Sengupta 1, Konsam Gojendra Singh 1, and Subrata Nandi 1 1 Department of Computer

More information

ENSC 427: COMMUNICATION NETWORK PROJECT PRESENTATION Spring 2010 Instructor: Ljiljana Trajkovic. Message Ferrying

ENSC 427: COMMUNICATION NETWORK PROJECT PRESENTATION Spring 2010 Instructor: Ljiljana Trajkovic. Message Ferrying ENSC 427: COMMUNICATION NETWORK PROJECT PRESENTATION Spring 2010 Instructor: Ljiljana Trajkovic 1 Message Ferrying Group 9 Timbo Yuen (tty2@sfu.ca) Dan Hendry (danh@sfu.ca) Yazan Shehadeh (ysa5@sfu.ca)

More information

An Opportunistic On Routing Protocols and Persisting Challenges in Delay-Tolerant Networking

An Opportunistic On Routing Protocols and Persisting Challenges in Delay-Tolerant Networking An Opportunistic On Routing Protocols and Persisting Challenges in Delay-Tolerant Networking B.Shubashini 1, Dr.Antony Selvadoss Thanamani 2 1 Research Scholar, Department of Computer Science, NGM College,

More information

Impact of Selective Dropping Attacks on Network Coding Performance in DTNs and a Potential Mitigation Scheme

Impact of Selective Dropping Attacks on Network Coding Performance in DTNs and a Potential Mitigation Scheme 1 Impact of Selective Dropping Attacks on Network Coding Performance in DTNs and a Potential Scheme M. Chuah, P. Yang Department of Computer Science & Engineering Lehigh University chuah@cse.lehigh.edu,

More information

PeopleRank: Social Opportunistic Forwarding

PeopleRank: Social Opportunistic Forwarding PeopleRank: Social Opportunistic Forwarding Abderrahmen Mtibaa Martin May Christophe Diot Mostafa Ammar Thomson, Paris, France Georgia Institute of Technology firstname.lastname@thomson.net ammar@cc.gatech.edu

More information

Routing Protocol Approaches in Delay Tolerant Networks

Routing Protocol Approaches in Delay Tolerant Networks Routing Protocol Approaches in Delay Tolerant Networks Shivi Shukla 1, Amit Munjal 2 and Y. N. Singh 2 AIM & ACT Dept., Banasthali Vidyapith, Rajasthan 1 EE Dept., Indian Institute of Technology, Kanpur

More information

Simulation and Analysis of Opportunistic Routing Protocols

Simulation and Analysis of Opportunistic Routing Protocols Simulation and Analysis of Opportunistic Routing Protocols 1 The Purpose The purpose of this assignment is to gain familiarity with a network simulation tool and to get experience in basic data analysis.

More information

Buffer Aware Routing in Interplanetary Ad Hoc Network

Buffer Aware Routing in Interplanetary Ad Hoc Network Buffer Aware Routing in Interplanetary Ad Hoc Network Kamal Mistry (Wipro Technologies, Bangalore) Sanjay Srivastava (DA-IICT, Gandhinagar) R. B. Lenin (DA-IICT, Gandhinagar) January 8, 2009 Buffer Aware

More information

Routing Issues & Performance Of Different Opportunistic Routing Protocols In Delay Tolerant Network

Routing Issues & Performance Of Different Opportunistic Routing Protocols In Delay Tolerant Network Routing Issues & Performance Of Different Opportunistic Routing Protocols In Delay Tolerant Network Ankur Upadhyay Department of Computer Science & Engineering School of Engineering & Technology, IFTM

More information

ROUTING AND CONGESTION CONTROL STRATEGIES IN OPPORTUNISTIC NETWORKS: A SURVEY

ROUTING AND CONGESTION CONTROL STRATEGIES IN OPPORTUNISTIC NETWORKS: A SURVEY ROUTING AND CONGESTION CONTROL STRATEGIES IN OPPORTUNISTIC NETWORKS: A SURVEY Vidya K 1, Mr Hemanth S R 2 1 M.Tech, 2 Assistant Professor, Department of Computer Science Maharaja Institute of Technology

More information

Energy Efficient Social-Based Routing for Delay Tolerant Networks

Energy Efficient Social-Based Routing for Delay Tolerant Networks Energy Efficient Social-Based Routing for Delay Tolerant Networks Chenfei Tian,FanLi,, Libo Jiang,ZeyeWang, and Yu Wang 2, School of Computer Science, Beijing Institute of Technology, Beijing, 8, China

More information

Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks

Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks , March 12-14, 2014, Hong Kong Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks Takuro Yamamoto, Takuji Tachibana, Abstract Recently,

More information

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach ISSN (Print): 1694 0814 10 Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach Manoj Kumar Mishra 1, Binod Kumar Pattanayak 2, Alok Kumar Jagadev 3, Manojranjan Nayak 4 1 Dept.

More information

Spray and forward: Efficient routing based on the Markov location prediction model for DTNs

Spray and forward: Efficient routing based on the Markov location prediction model for DTNs . RESEARCH PAPER. SCIENCE CHINA Information Sciences February 2012 Vol. 55 No. 2: 433 440 doi: 10.1007/s11432-011-4345-1 Spray and forward: Efficient routing based on the Markov location prediction model

More information

Routing in a Delay Tolerant Network

Routing in a Delay Tolerant Network Routing in a Delay Tolerant Network Vladislav Marinov Jacobs University Bremen March 31st, 2008 Vladislav Marinov Routing in a Delay Tolerant Network 1 Internet for a Remote Village Dial-up connection

More information

NECTAR: A DTN Routing Protocol Based on Neighborhood Contact History

NECTAR: A DTN Routing Protocol Based on Neighborhood Contact History NECTAR: A DTN Routing Protocol Based on Neighborhood Contact History Etienne C. R. de Oliveira and Célio V. N. de Albuquerque Instituto de Computação - Universidade Federal Fluminense {eoliveira,celio}@ic.uff.br

More information

Probabilistic Routing With Multi-copies in Delay Tolerant Networks

Probabilistic Routing With Multi-copies in Delay Tolerant Networks Probabilistic Routing With Multi-copies in Delay Tolerant Networks Ze Li and Haiying Shen Department of Computer Science and Computer Engineering University of Arkansas, Fayetteville, AR 7701 {zxl008,

More information

COMPARATIVE ANALYSIS OF DIFFERENT ROUTING PROTOCOLS IN DELAY TOLERANT NETWORKS

COMPARATIVE ANALYSIS OF DIFFERENT ROUTING PROTOCOLS IN DELAY TOLERANT NETWORKS COMPARATIVE ANALYSIS OF DIFFERENT ROUTING PROTOCOLS IN DELAY TOLERANT NETWORKS Chintan B. Desai PG Student, Electronics and Communication Department, Charotar University of Science & Technology, Changa,

More information

Keywords: Detection, Disruption Tolerant Networks, Mitigation, Routing Misbehavior, Security.

Keywords: Detection, Disruption Tolerant Networks, Mitigation, Routing Misbehavior, Security. IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY An Efficient Selfishness Aware Routing in Delay Tolerant Networks N.Senthilkumar *1, Dr. T.V U. Kiran Kumar 2 *1,2,3,4 Bharath

More information

BOND: Unifying Mobile Networks with Named Data. Michael Meisel

BOND: Unifying Mobile Networks with Named Data. Michael Meisel BOND: Unifying Mobile Networks with Named Data Michael Meisel Ph.D. Dissertation Defense March 16, 2011 Freeform Wireless Networks Multi-hop Unpredictable mobility Can be connected or disconnected Examples:

More information

Performance Analysis of DSR Routing Protocol With and Without the Presence of Various Attacks in MANET

Performance Analysis of DSR Routing Protocol With and Without the Presence of Various Attacks in MANET Performance Analysis of DSR Routing Protocol With and Without the Presence of Various Attacks in MANET Aaditya Jain M.Tech Scholar, Department of Computer Science & Engg., R. N. Modi Engineering College,

More information

A Cooperative ARQ for Delay-Tolerant Vehicular Networks

A Cooperative ARQ for Delay-Tolerant Vehicular Networks The 28th International Conference on Distributed Computing Systems Workshops A Cooperative ARQ for Delay-Tolerant Vehicular Networks Julián Morillo-Pozo, Oscar Trullols, Jose M. Barceló, Jorge García-Vidal

More information

Combined Mobile Ad-hoc and Delay/Disruption-tolerant Routing

Combined Mobile Ad-hoc and Delay/Disruption-tolerant Routing This is an authors' version of the manuscript. Final version published in Proc. 13th International Conference on Ad-Hoc Networks and Wireless (ADHOC-NOW '14). Springer LNCS 8487, pp. 1-14, 2014. The final

More information

Friendship Based Routing in Delay Tolerant Mobile Social Networks

Friendship Based Routing in Delay Tolerant Mobile Social Networks Friendship Based Routing in Delay Tolerant Mobile Social Networks Eyuphan Bulut and Boleslaw K. Szymanski Department of Computer Science and Center for Pervasive Computing and Networking Rensselaer Polytechnic

More information

A Review on Routing In Partially Connected Ad-Hoc Network

A Review on Routing In Partially Connected Ad-Hoc Network Computing For Nation Development, March 10 11, 2011 Bharati Vidyapeeth s Institute of Computer Applications and Management, New Delhi Anupam Baliyan 1 and Sanjeev Gupta 2 1 IMR, Duhai, Ghaziabad, 9818327524

More information

A SURVEY ON OPPORTUNISTIC ROUTING PROTOCOLS IN CELLULAR NETWORK FOR MOBILE DATA OFFLOADING

A SURVEY ON OPPORTUNISTIC ROUTING PROTOCOLS IN CELLULAR NETWORK FOR MOBILE DATA OFFLOADING A SURVEY ON OPPORTUNISTIC ROUTING PROTOCOLS IN CELLULAR NETWORK FOR MOBILE DATA OFFLOADING Sanjit Kumar Dash 1, Chandrakanta Mahanty 2, Sasmita Mishra 3 and Jibitesh Mishra 1 1 College of Engineering and

More information

Hierarchical Trust Management for Delay Tolerant Networks Using Stochastic Petrinet for Secure Routing

Hierarchical Trust Management for Delay Tolerant Networks Using Stochastic Petrinet for Secure Routing International OPEN ACCESS Journal Of Modern Engineering Research (IJMER) Hierarchical Trust Management for Delay Tolerant Networks Using Stochastic Petrinet for Secure Routing Chithra M. 1, Mr. Vimalathithan

More information

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS ABSTRACT Zhang Huijuan and Liu Kai School of Software Engineering, Tongji University, Shanghai, China

More information

Performance Evaluation of Node Density- Based Adaptive Routing Scheme for Disruption Tolerant Networks 1

Performance Evaluation of Node Density- Based Adaptive Routing Scheme for Disruption Tolerant Networks 1 Int. J. of Ad Hoc and Ubiquitous Computing, 2006 Performance Evaluation of Node Density- Based Adaptive Routing Scheme for Disruption Tolerant Networks 1 Mooi-Choo Chuah* Department of Computer Science

More information

A Genetic-Neural Approach for Mobility Assisted Routing in a Mobile Encounter Network

A Genetic-Neural Approach for Mobility Assisted Routing in a Mobile Encounter Network A Genetic-Neural Approach for obility Assisted Routing in a obile Encounter Network Niko P. Kotilainen, Jani Kurhinen Abstract--obility assisted routing (AR) is a concept, where the mobility of a network

More information

ACICE-2013 ISSN: ; e-issn

ACICE-2013 ISSN: ; e-issn 1022 A Novel Ferry-Initiated Message Ferrying Approach for Data Delivery in Disconnected Mobile Ad Hoc Networks through Native Ferries K. MURALIDHAR 1, N. GEETHANJALI 2 1 Assistant Professor, Department

More information

EA-Epidemic: An Energy Aware Epidemic-Based Routing Protocol for Delay Tolerant Networks

EA-Epidemic: An Energy Aware Epidemic-Based Routing Protocol for Delay Tolerant Networks Journal of Communications Vol. 12, No. 6, June 217 EA-Epidemic: An Energy Aware Epidemic-Based Routing Protocol for Delay Tolerant Networks Bhed B. Bista 1 and Danda B. Rawat 2 1 Iwate Prefectural University,

More information

Nodes Misbehavior in Vehicular Delay-Tolerant Networks

Nodes Misbehavior in Vehicular Delay-Tolerant Networks Nodes Misbehavior in Vehicular Delay-Tolerant Networks Naércio Magaia, Paulo Rogério Pereira, Miguel P. Correia INESC-ID/IST/UTL, Rua Alves Redol, 9. 1000-029 LISBOA, Portugal {naercio.magaia, miguel.p.correia}@ist.utl.pt,

More information

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network Detection and Removal of Black Hole Attack in Mobile Ad hoc Network Harmandeep Kaur, Mr. Amarvir Singh Abstract A mobile ad hoc network consists of large number of inexpensive nodes which are geographically

More information

Modeling Redundancy-based Routing in Delay Tolerant Networks

Modeling Redundancy-based Routing in Delay Tolerant Networks Modeling Redundancy-based Routing in Delay Tolerant Networks Yong Liao, Kun Tan, Zhensheng Zhang, Lixin Gao Dep. of Electrical & Computer Eng. Microsoft Research Asia San Diego Research Center University

More information

A Survey of Opportunistic Networks

A Survey of Opportunistic Networks 22nd International Conference on Advanced Information Networking and Applications - Workshops A Survey of Opportunistic Networks Chung-Ming Huang, Kun-chan Lan and Chang-Zhou Tsai Department of Computer

More information

TTN: A Time-to-Network Approach to Data Reporting in Mobile Ad Hoc Networks

TTN: A Time-to-Network Approach to Data Reporting in Mobile Ad Hoc Networks : A Time-to-Network Approach to Data Reporting in Mobile Ad Hoc Networks Phillip Sitbon, Wu-chi Feng, Nirupama Bulusu Portland State University Department of Computer Science E-mail: {sitbon,wuchi,nbulusu}@cs.pdx.edu

More information

KEY WORDS: disruption tolerant networks; routing schemes; performance comparison

KEY WORDS: disruption tolerant networks; routing schemes; performance comparison Performance Comparison of Four Unicast Routing Schemes in DTNs Mooi Choo Chuah *,, Peng Yang, Yong Xi Department of Computer Science and Engineering, Lehigh University, Bethlehem PA, USA 18015-3084 Summary

More information

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor [Nitnaware *, 5(11): November 218] ISSN 2348 834 DOI- 1.5281/zenodo.1495289 Impact Factor- 5.7 GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES INVESTIGATION OF DETECTION AND PREVENTION SCHEME FOR

More information

SMART: A Selective Controlled-Flooding Routing for Delay Tolerant Networks

SMART: A Selective Controlled-Flooding Routing for Delay Tolerant Networks SMART: A Selective Controlled-Flooding Routing for Delay Tolerant Networks Lei Tang, Qunwei Zheng, Jun Liu, Xiaoyan Hong Department of Computer Science University of Alabama, Tuscaloosa, AL 35487 {ltang,qzheng,jliu,hxy}@cs.ua.edu

More information

Research Article ISSN:

Research Article ISSN: International Journal of Computer Science & Mechatronics A peer reviewed International Journal Article Available online www.ijcsm.in smsamspublications.com Vol.1.Issue 2.2015 Boosting Performance of Data

More information

Store-and-Forward Performance in a DTN

Store-and-Forward Performance in a DTN Store-and-Forward Performance in a DTN Mooi-Choo Chuah, Peng Yang, Brian D. Davison, Liang Cheng Department of Computer Science and Engineering Lehigh University 19 Memorial Drive West, Bethlehem, PA 18015,

More information

Delay-Differentiated Gossiping in Delay Tolerant Networks

Delay-Differentiated Gossiping in Delay Tolerant Networks Delay-Differentiated Gossiping in Delay Tolerant Networks Parameswaran Ramanathan and Aarti Singh Department of Electrical and Computer Engineering University of Wisconsin-Madison parmesh@ecewiscedu, singh@caewiscedu

More information

Keywords: Store and carry networks, Forwarding strategies, routing, DTN, Minimum hop transmission

Keywords: Store and carry networks, Forwarding strategies, routing, DTN, Minimum hop transmission Global Journal of Computer Science and Technology Volume 11 Issue 9 Version 1.0 May 2011 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) ISSN: 0975-4172

More information

A Hybrid Routing Approach for Opportunistic Networks

A Hybrid Routing Approach for Opportunistic Networks A Hybrid Routing Approach for Opportunistic Networks Ling-Jyh Chen Chen-Hung Yu Tony Sun Yung-Chih Chen Hao-hua Chu Academia Sinica National Taiwan University UCLA Academia Sinica National Taiwan University

More information

Social-Aware Routing in Delay Tolerant Networks

Social-Aware Routing in Delay Tolerant Networks Social-Aware Routing in Delay Tolerant Networks Jie Wu Dept. of Computer and Info. Sciences Temple University Challenged Networks Assumptions in the TCP/IP model are violated DTNs Delay-Tolerant Networks

More information

An Agent Based Approach for Sinkhole Preventive Route formation in Mobile Network

An Agent Based Approach for Sinkhole Preventive Route formation in Mobile Network An Agent Based Approach for Sinkhole Preventive Route formation in Mobile Network Rekha 1, Radhika Garg 2 1 Research Scholar, M.Tech, 2 Assistant Professor, Deptt. Of Computer Sc. & Engineering, Vaish

More information

Exploiting Heterogeneity in Mobile Opportunistic Networks: An Analytic Approach

Exploiting Heterogeneity in Mobile Opportunistic Networks: An Analytic Approach Exploiting Heterogeneity in Mobile Opportunistic Networks: An Analytic Approach 7 th Annual IEEE Communication Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (IEEE SECON 10)

More information

Integrated Buffer and Route Management in a DTN with Message Ferry

Integrated Buffer and Route Management in a DTN with Message Ferry Integrated Buffer and Route Management in a DTN with Message Ferry Mooi Choo Chuah Wen-Bin Ma chuah@cse.lehigh.edu wem2@.lehigh.edu Department of Computer Science and Engineering 19 Memorial Drive West,

More information

Comparative Study of Routing Protocols for Opportunistic Networks

Comparative Study of Routing Protocols for Opportunistic Networks Comparative Study of Routing Protocols for Opportunistic Networks Majeed Alajeely School of Information Technology Deakin University Melbourne, Australia Email: malajeel@deakin.edu.au Asma a Ahmad School

More information

MaxHopCount: DTN congestion control algorithm under MaxProp routing

MaxHopCount: DTN congestion control algorithm under MaxProp routing 206 MaxHopCount: DTN congestion control algorithm under MaxProp routing Youssef HARRATI and Abdelmounaim ABDALI, Cadi Ayyad University, faculty of Sciences & Techniques / Laboratory of Applied Mathematics

More information

A Partially Centralized Messaging Control Scheme Using Star Topology in Delay and Disruption Tolerant Networks

A Partially Centralized Messaging Control Scheme Using Star Topology in Delay and Disruption Tolerant Networks A Partially Centralized Messaging Control Scheme Using Star Topology in Delay and Disruption Tolerant Networks 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained

More information

Security Issues In Mobile Ad hoc Network Routing Protocols

Security Issues In Mobile Ad hoc Network Routing Protocols Abstraction Security Issues In Mobile Ad hoc Network Routing Protocols Philip Huynh phuynh@uccs.edu Mobile ad hoc network (MANET) is gaining importance with increasing number of applications. It can be

More information

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack

More information

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM R.Bhuvaneswari 1, V.Vijayalakshmi 2 1 M.Phil., Scholar, Bharathiyar Arts And Science College For Women, India 2 HOD

More information

IJRIM Volume 1, Issue 4 (August, 2011) (ISSN ) A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS ABSTRACT

IJRIM Volume 1, Issue 4 (August, 2011) (ISSN ) A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS ABSTRACT A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS Pinki Tanwar * Shweta** ABSTRACT A mobile adhoc network is a collection of mobile nodes which form a network which is not fixed. The nodes in the network dynamically

More information

A CHECKPOINT BASED MESSAGE FORWARDING APPROACH FOR OPPORTUNISTIC COMMUNICATION

A CHECKPOINT BASED MESSAGE FORWARDING APPROACH FOR OPPORTUNISTIC COMMUNICATION A CHECKPOINT BASED MESSAGE FORWARDING APPROACH FOR OPPORTUNISTIC COMMUNICATION Osman Khalid osman.khalid@ndsu.edu Limin Zhang limin.zhang@ndsu.edu Sajjad A. Madani COMSATS Institute of Information Technology,

More information

sensors ISSN

sensors ISSN Sensors 2011, 11, 4104-4117; doi:10.3390/s110404104 OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors Article A Distance-Aware Replica Adaptive Data Gathering Protocol for Delay Tolerant

More information

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Deepak Agrawal, Brajesh Patel Department of CSE Shri Ram Institute of Technology Jabalpur,

More information

PreDA: Predicate Routing for DTN Architectures over MANET

PreDA: Predicate Routing for DTN Architectures over MANET Boston University OpenBU Computer Science http://open.bu.edu CAS: Computer Science: Technical Reports 9-- PreDA: Routing for Architectures over Esposito, Flavio Boston University Computer Science Department

More information

1. INTRODUCTION. Saravanan.A 1 and Dr.Sunitha Abburu 2

1. INTRODUCTION. Saravanan.A 1 and Dr.Sunitha Abburu 2 www.ijcsi.org 365 Computing Conditional Intermeeting Time in Conditional Shortest Path Routing Saravanan.A 1 and Dr.Sunitha Abburu 2 1 Adhiyamaan College of Engineering, Department of Computer Application,

More information

Ferry Access Points and Sticky Transfers: Improving Communication in Ferry-assisted DTNs

Ferry Access Points and Sticky Transfers: Improving Communication in Ferry-assisted DTNs Ferry Access Points and Sticky Transfers: Improving Communication in Ferry-assisted DTNs Farzana Yasmeen, Nurul Huda, Shigeki Yamada Department of Informatics, Sokendai National Institute of Informatics

More information

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks , pp.63-70 http://dx.doi.org/10.14257/ijast.2015.82.06 Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks Kulbir Kaur Waraich 1 and Barinderpal Singh

More information

CFP: Integration of Fountain Codes and Optimal Probabilistic Forwarding in DTNs

CFP: Integration of Fountain Codes and Optimal Probabilistic Forwarding in DTNs : Integration of Fountain Codes and Optimal Probabilistic Forwarding in DTNs Ying Dai Software Institute Nanjing University dy06@software.nju.edu.cn Panlong Yang, Guihai Chen Dept. of Computer Sci. and

More information