MDR Based Cooperative Strategy Adaptation in Wireless Communication

Similar documents
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES

Design and Implementation of Improved Routing Algorithm for Energy Consumption in Delay Tolerant Network

Improvement of Buffer Scheme for Delay Tolerant Networks

Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay

ABSTRACT. Communication is usually done through means of network where there is a lot of intrusion

Hierarchical Trust Management for Delay Tolerant Networks Using Stochastic Petrinet for Secure Routing

Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks

Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey. Namita Mehta 1 and Mehul Shah 2

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

TRUST FRAMEWORK FOR DATA FORWARDING IN OPPORTUNISTIC NETWORKS USING MOBILE TRACES

Routing Protocol Approaches in Delay Tolerant Networks

Archna Rani [1], Dr. Manu Pratap Singh [2] Research Scholar [1], Dr. B.R. Ambedkar University, Agra [2] India

Minimax Theory Based Scheme to Detect Selfish Node and Reduce Latency in Delay Tolerant Network

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS

Energy Consumption and Performance of Delay Tolerant Network Routing Protocols under Different Mobility Models

SATS: Secure Data-Forwarding Scheme for Delay-Tolerant Wireless Networks

An Analysis of Dynamic Delay Tolerant Network Strategies for Preventing Selfish Behavior Network

Time Synchronization in Wireless Sensor Networks: CCTS

Routing in a Delay Tolerant Network Sushant Jain, Kevin Fall and Rabin Patra SIGCOMM Presented by Xun Gong

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS

COMPARATIVE ANALYSIS OF DIFFERENT ROUTING PROTOCOLS IN DELAY TOLERANT NETWORKS

2015, IJARCSSE All Rights Reserved Page 133

Studies with ns-2 and ns-3 based DTN Simulators

IJSER. 1. Introduction. 1.1 Routing in DTN: Sukhpreet Kaur

Impact of Social Networks in Delay Tolerant Routing

Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks

Capacity-Aware Routing Using Throw-Boxes

Energy Efficient Social-Based Routing for Delay Tolerant Networks

Using local speed information as routing metric for delay tolerant networks

Combined Mobile Ad-hoc and Delay/Disruption-tolerant Routing

Cluster Based Approach for Overhead Reduction and Load Balancing in Delay Tolerant Mobile Applications

Simulation of Epidemic, Spray and Wait and First Contact Routing Protocols in Delay Tolerant Network

A Joint Replication-Migration-based Routing in Delay Tolerant Networks

Performance Analysis of Delay Tolerant Network Routing Protocols in Different Mobility Environments

Estimation based Erasure-coding Routing in Delay Tolerant Networks

Geographic information based Replication and Drop Routing (GeoRaDR): A Hybrid Message Transmission Approach for DTNs

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS

Simulation and Analysis of Opportunistic Routing Protocols

Integrated Routing Protocol for Opportunistic Networks

Incentive-Aware Routing in DTNs

Opportunistic Networks: A Review

Routing Issues & Performance Of Different Opportunistic Routing Protocols In Delay Tolerant Network

Keywords: Detection, Disruption Tolerant Networks, Mitigation, Routing Misbehavior, Security.

Modeling Redundancy-based Routing in Delay Tolerant Networks

Design of Simulator for Finding the Delay Distribution in Delay Tolerant Networking

Multicent: A Multifunctional Incentive Scheme Adaptive to Diverse Performance Objectives for DTN Routing

ABSTRACT I. INTRODUCTION II. CHARACTERISTICS OF DELAY TOLERANT NETWORKS

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET

WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks

Impact of Social Networks on Delay Tolerant Routing

Routing with Multi-Level Social Groups in Mobile Opportunistic Networks

Buffer Aware Network Coded Routing Protocol for Delay Tolerant Networks

NEW STRATEGY TO OPTIMIZE THE PERFORMANCE OF SPRAY AND WAIT ROUTING PROTOCOL

Figure 1. Clustering in MANET.

Implementing Crytoptographic Technique in Cluster Based Environment for Secure Mobile Adhoc Networks

Spray and Dynamic: Advanced Routing in Delay Tolerant Networks

Integration of Co Operation Incentives in Mobile Ad Hoc Network

CMNTS:Catching Malicious Nodes with Trust Support in Wireless Sensor Networks

Catching BlackHole Attacks in Wireless Sensor Networks

Mobile Health Monitoring Based On New Power Management Approach

Friendship Based Routing in Delay Tolerant Mobile Social Networks

MaxHopCount: DTN congestion control algorithm under MaxProp routing

Peer-to-Peer Content sharing for Smart phones over Ad-Hoc Networks.

A Genetic-Neural Approach for Mobility Assisted Routing in a Mobile Encounter Network

Spray and forward: Efficient routing based on the Markov location prediction model for DTNs

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

A SURVEY ON OPPORTUNISTIC ROUTING PROTOCOLS IN CELLULAR NETWORK FOR MOBILE DATA OFFLOADING

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1

CFP: Integration of Fountain Codes and Optimal Probabilistic Forwarding in DTNs

SECURE AND EFFICIENT HYBRID APPROACH FOR DATA TRANSMISSION IN ZIGBEE NETWORK

Improving Performance in Ad hoc Networks through Location based Multi Hop Forwarding

On Information Sharing Scheme for Automatic Evacuation Guiding System Using Evacuees Mobile Nodes

Timely Information Dissemination with Distributed Storage in Delay Tolerant Mobile Sensor Networks

International Journal of Advanced Engineering Research and Science (IJAERS) [Vol-1, Issue-2, July 2014] ISSN:

International Journal of Computer Engineering and Applications, Volume XII, Special Issue, August 18, ISSN

Community-Based Adaptive Buffer Management Strategy in Opportunistic Network

Space Optimized Multicast in Delay Tolerant Networks

Application of Graph Theory in DTN Routing

ROUTING IN DELAY TOLERANT NETWORKS

Cost Based Efficient Routing for Wireless Body Area Networks

Reputation Based Trust Management for Wireless Sensor Networks and Its Application to Secure Routing

Buffer Management in Delay Tolerant Networks

A Partially Centralized Messaging Control Scheme Using Star Topology in Delay and Disruption Tolerant Networks

Performance Analysis of CSI:T Routing in a Delay Tolerant Networks

Novel Cluster Based Routing Protocol in Wireless Sensor Networks

Investigating Performance of Extended Epidemic Routing Protocol of DTN under Routing Attack

CLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS

DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS

Opportunistic Networks: Minimizing Expected Latency

A Recommendation Based Efficient Secure discover-predict-deliver Content Sharing Scheme

Fig. 2: Architecture of sensor node

A Fast and Reliable Tree based Proactive Source Routing in Mobile Adhoc Network 1 Haseena M. K., 2 Annes Philip.

An Efficient and Secured way of Routing in Hybrid WSN

A Survey on Collaborative contact-based Selfish node detection in Mobile ad hoc Network

An Algorithm for Dynamic SDN Controller in Data Centre Networks

ERASURE-CODING DEPENDENT STORAGE AWARE ROUTING

A comprehensive-integrated buffer management strategy for opportunistic networks

Need of Removing Delivered Message Replica from Delay Tolerant Network - A Problem Definition

Nodes Misbehavior in Vehicular Delay-Tolerant Networks

Transcription:

MDR Based Cooperative Strategy Adaptation in Wireless Communication Aswathy Mohan 1, Smitha C Thomas 2 M.G University, Mount Zion College of Engineering, Pathanamthitta, India Abstract: Cooperation among nodes is the fundamental requirement for the Opportunistic Mobile Networks (OMNs).Here using the store-carry-and-forward mechanism, messages are processing the communication. Each and every node in the network has a mobility and range of region in which each node communicate with other node or its neighbour node. For avoiding the confusion and complexity in topological interface, provide a parent node capacity to each node in the network based on user requirement. Cooperation strategy is based on Message Delivery Ratio (MDR). The system mainly use three cooperation adaptation criteria, which are cooperator, exploiters, isolators are based on Distributed Information Based Cooperation Ushering Scheme (DISCUSS). The nodes which preserve the exchange information with one another during contacts about the message created and delivered in the network. Based on this information nodes are evaluate their own performance and evaluate with network performance and adapt most successful forwarding strategy. The evaluation is based on message delivery ratio. If the nodes are not in contact, receive the appropriate information from global knowledge and proceed the communication and enhance the reliability and lossless communication Keywords: Cooperation, Message Delivery Ratio, Opportunistic Mobile Network, Strategy Adaptation. I. INTRODUCTION Opportunistic Mobile Networks (OMNs) are a category of delay-tolerant-networks (DTNs). Delay Tolerant Networking (DTN) is a communication networking pattern that provides a communication environments where there may be no endto-end paths, or continuous path, communication opportunities change and their interval can be very lengthy and not even identified beforehand. Routing messages in this type of environments can be reasonably different compared to traditional networks. This has form a requirement to find new routing protocols that receive efficiently into explain the distinct nature of these networks. Different approaches can be tested and evaluated by simulation, but the simulation results are really helpful only if they are a result of somewhat credible simulation scenarios. OMNs are routing their path opportunistically from source to destination using store-carry and forward mechanism. The mobility among nodes in the network which create new opportunity to communicate with one another. Here the path exists between source and destination pairs might not be connected at the same time. Each node which are typically computed the routes based on the local information of the node. When Source node and destination node are in contact, it delivers the message to destination node otherwise the message is forwarded to the intermediate node. The intermediate node which store and carry the message until one of them meets the destination node and forward to it or they can find other nodes. The MDR based cooperation adaptation in wireless networking is considerably depends on cooperation of the intermediate nodes. The present routing protocol which provide a hypothesis that nodes are fully cooperative. The every node in the network has their own goals, so we not considered a fully cooperation. Since typically it is unmanaged. Some nodes which shown a selfish behavior. Some nodes may take help from others for forwarding their message but may not always assist in forward others message. It will affect the overall network performance. For the upgrading of cooperation and network performance giving a punishment and reward. Page 64

II. EXISTING SYSTEM OMN is generally reliant upon cooperation by intermediate nodes. Existing system which uses different cooperation enforcing schema A. Credit based schemes: In credit based schema vitual currency or pricing acts as the credit. Different types of credit based schema used in existing systems. 1. pair-wise Tit-for Tat(TFT) It is based on two constraints, i.e., generosity and contrition for maximizing cooperation among nodes. 2. SMART(secure multilayer credit based incentive scheme) Increasing the cooperation among nodes by preventing the malicious users from cheating credit. 3. Provide incentives to the selfish nodes for forwarding others node s message. 4. Pi protocol Selfish nodes for forwarding others node s message. Pi attaches incentives to the message and send. It need a trusted authority, for storing credit and reputation of each nodes. So itrust, which detect the misbehaving nodes. B. Reputation based schemes: Here reputation of the nodes is calculated by their neighbours based on the message forwarding actions. It Need a offline system manager. when each node register to join the network.reputation value is assigned to the forwarding node. Nodes are not accepted when their corresponding reputation are less than a given threshold. Some reputation based schemes are, 1. Pri schema In this pri schema, the offline security manager (OSM) which in charge of key distribution. 2. Based on probability distribution of packet delivery delay and communication cost. 3. Based on a message scheduling framework, which improves message delivery ratio III. SYSTEM MODEL In opportunistic mobile network the main problem is unreliable communication and loss communication. To enhance the reliable communication will ensure the cooperation among the nodes. For enhance the cooperation of each node to analyze the strategy of each node and increase the message delivery ratio. Proposed system, promote cooperation based on DISCUSS and its variant on DISCUSS with global knowledge. In DISCUSS scheme, The nodes reliably exchange information with their neighbour nodes. In DISCUSS with global knowledge, The nodes can obtain message delivery information from a central knowledge. Each node follows any one of these message strategy. 1. Cooperate: - Forward their own message and other s message 2. Exploit: - Forward their own message and drop other s message 3. Isolate:-Only receive the message which they are destination. They don t take help from other and don t do Fig 1- Strategy adaptation of nodes after a t time Page 65

IV. PROPOSED SYSTEM 1. Architecture: The system architecture consist of three phases, they are node generation, cluster formation, packet forwarding. a. Node generation: Fig 2- Proposed system architecture Node generation is the initial phase in which the network of nodes are formed. In this phase, should specify the node id, node type, node position, number of nodes, node link etc. based on that elements source and destination nodes also specifies and processing node integration and results are forward to the input of cluster formation phase. b. Cluster formation: Fig 3- Node generation Cluster formation is the second phase in which form the different clusters based on number of nodes and calculate energy level and cluster head. The energy level calculations are based on the battery level of nodes and finally construct the route table. That result of route table which promote to next phase Fig 4- Cluster formation Page 66

c. Packet forwarding: Packet forwarding is the final phase, find out the available cluster head and proceeding the routing. on the basic of performing the routing, data are collected and transferred to base station and update the route table. 2. Proposed System Design: Fig 5- Packet forwarding The designing of the proposed system comprised of four modules. They are topology creation, message transfer, opportunistic mobile network, distributed information. Topology Creation: It has not a specific topology, because each t time the topology will be changed due to the movement of the nodes. Sensor nodes form a DAG and extract a routing tree from DAG. The proposed Tree on DAG is a semi structured approach that uses Dynamic Forwarding on an implicitly constructed structure composed of multiple shortest path trees to support network scalability. When a node wants to send out a packet, it attaches a sequence number with it, encrypts the packets and then forward packet to parent on the routing tree. The routing tree is reshaped every round. As a certain number of rounds have passed, the sink will have collected information about node behaviours in different routing topologies. The purpose of system initialization is to set up the DAG and the routing tree to facilitate packet forwarding from every sensor node to the sink. Each sensor node u is preloaded the following information: Np: The maximum number of parent nodes that each node records during the DAG establishment procedure. Ns: The maximum packet sequence number. For each sensor node, its first packet has sequence number 1, the Ns th packet is numbered Ns and so on and so forth. Message Transfer: When an innocent intermediate node receives a packet, it attaches a random variable to mark the forwarding path of the packet, and then forwards the packet to its parent. A misbehaving intermediate node may drop a packet it receives the intermediate node may either drop or modify the packets before sending to sink. On receiving a packet, the sink node decrypts it, and thus finds out the original sender and the packet sequence number. The sink node tracks the sequence numbers of received packets for every node, and for every certain time interval, which we call a round. it calculates the packet-dropping ratio for every node. Based on the dropping ratio and the knowledge of the topology, the sink node identifies packet droppers. Opportunistic mobile network: Represent an OMN as (N; M; S), where N denotes the set of nodes in the network. M denotes the set of messages generated by the nodes. S denotes the set of strategies selected by any node in forwarding the messages (Cooperate; Page 67

Exploit; Isolate). Each node may act as a source, a destination or an intermediate relay node. We consider three group of nodes cooperators, exploiters, and isolators based on these strategies. The following section elaborates the behavior of the individual nodes. a. Cooperators: These nodes with the strategy cooperate not only forward their own messages, but help the other nodes as well in doing so. In other words, the cooperators act as relays by receiving, storing and forwarding the messages generated by the other nodes. b. Exploiters: On the other hand, the exploiters forward their messages to the other nodes (cooperators) for delivery. They receive other node s messages, but instead of storing them, they silently drop those messages. The exploiters take help from others for forwarding their own messages as free riders, without helping them. c. Isolators: The isolators only receive the message for which they are the destinations. They do not take help from the other nodes for forwarding their messages, neither do so for others. The isolators directly deliver their messages, when they meet with the corresponding destination node. Distributed information: When a node dynamically switches its forwarding strategy, if required, to the most successful strategy in the concerned SD-OMN. Strategy defined OMN is a combination of N, M, S. N is denoted the set of nodes, M is denoted set ofmessages, S is denoted set of strategy selected(c, E, I).i.e.,Nc+Ne+Ni= N. The Node share their relevant information. They are Received message ID Message sender node ID Own delivery probability It comprises of two phases that are repeated in every generation interval (t). (1) Acquiring information on the performance of the SD-OMN. (2) Strategy adaptation The first phase requires information on (a) The messages created (CM) by the nodes (b) The delivered messages (DM) (c) The delivery probabilities (DP) of the nodes. In this module Categorization and Ranking will be performed based on the node behavior. If there is any modification or drop of packets in node it assumes negative value for modifier or dropper. The categorization of nodes can be taken in any one of the following cases. Packet droppers for sure. Suspicious packet droppers. No packet droppers for sure 3. Procedure: The DISCUSS steps in the proposed system are as follows. STEP 1: Start STEP 2: Exchange information with nodes Page 68

STEP 3: Compute own delivery probability STEP 4: Computed group wise weighted delivery probability(yc,ye,yi) STEP 5: Compute P<max (yc,ye,yi), if it true then step 6 ELSE GO TO Step 8 STEP 6: Calculate G succ = arg max (yk), k yc,ye,yi STEP 7: Set on strategy as G succ. STEP 8: Stop Design: With the help of UML tools the design is supported. It represents how the proposed system working. The data flow diagram based on the steps in DISCUSS depicted below: Fig 6: Flowchart depicting the steps in DISCUSS. Page 69

4. Proposed System s Strategy: Proposed systems mainly based on DISCUSS and DISCUSS with global knowledge. Discuss: In Discuss scheme the nodes are reliably exchange their information during the contact. Discuss with global knowledge: For the sake of comprehensiveness, effectiveness and evaluating the success, we also think a version of DISCUSS, where the nodes have absolute information about the SD- OMN. In this case, imagine the occurrence of a central authority in the network, with which the nodes can communicate directly. Whenever a new message is produced (or delivered), the CA is up to date by the concerned node. Based on these information, the CA computes the DP of each node. At the end of each t, all the nodes get the DP information of all the nodes in the network from the CA. Based on this, the nodes adapt their strategies to the most successful one, if required. Characteristics of Discuss: Discuss which hold some constraints are given below: 1. The traffic generation rate is low, but messages are generated during the lifetime of the system measured 2. The traffic rate is high and messages are generated for a short period of time (possibly during the initial generation of the SD-OMN). In first case, exactly all of them can be delivered to the particular destination if most of the nodes are cooperators. In reality, depending on the contact patterns among the nodes, the same may be less than unity. In the second case, although more messages are created in the system, a reasonably longer lifetime allows the delivery of most of them. Again, when most of the nodes are cooperators. So needs a buffer capacity or lifetime of nodes. Fig 7: Storage overhead of DISCUSS as a function of the number of messages. V. CONCLUSION The mechanism DISCUSS, for converting the non cooperate nodes to cooperate. After a generation interval each node compare its performance with performance of other groups and adapt a most successful strategy. In DISCUSS, the strategy is based on message delivery ratio. It enhances the reliable communication and lossless communication. Improve the network performance. ACKNOWLEDGEMENT I would like to extend my thankfulness to the reference authors, as well as reviewer of my paper. Page 70

REFERENCES [1] K. R. Fall, A delay-tolerant network architecture for challenged internets, in Proc. Conf. Appl., Technol., Archit., Protocols Comput. Commun., 2003, pp. 27 34. [2] T. Spyropoulos, K. Psounis, and C. S. Raghavendra, Spray and wait: An efficient routing scheme for intermittently connected mobile networks, in Proc. ACM SIGCOMM Workshop Delay-Toler- ant Netw., 2005, pp. 252 259. [3] A. Vahdat and D. Becker, Epidemic routing for partially-con- nected ad hoc networks, Tech. Rep. CS-2000-06, Duke Univ., 2000. [4] A. Lindgren, A. Doria, and O. Schelen, Probabilistic routing in intermittently connected networks, ACM SIGMOBILE Mobile Comput. Commun. Rev., vol. 7, pp. 19 20, 2003. [5] H. Zhu, S. Du, Z. Gao, M. Dong, and Z. Cao, A probabilistic mis- behavior detection scheme toward efficient trust establishment in delay-tolerant networks, IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 1, pp. 22 32, Jan. 2014. [6] B. B. Chen and M. C. Chan, MobiCent: A credit-based incentive system for disruption tolerant network, in Proc. IEEE Conf. Com- put. Commun., 2010, pp. 875 883. [7] R. Lu, X. Lin, H. Zhu, X. Shen, and B. Preiss, Pi: A practical incen- tive protocol for delay tolerant networks, IEEE Trans. Wireless Commun., vol. 9, no. 4, pp. 1483 1493, Apr. 2010. Page 71