Conviction Management for Encounter-Based Routing in Interruption Lenient Networks

Authors

  • Maredu Sreevani  Guru Nanak Institute of Technology, Ibrahimpatnam, Telangana, India
  • B. Sudhakar  Guru Nanak Institute of Technology, Ibrahimpatnam, Telangana, India
  • Dr. S. Senthil Kumar  Guru Nanak Institute of Technology, Ibrahimpatnam, Telangana, India
  • Dr. S. Sreenatha Reddy  Guru Nanak Institute of Technology, Ibrahimpatnam, Telangana, India

Keywords:

Delay Tolerant Networks, Provenance, Store-And-Forward, Trust, Trustiness

Abstract

Delay tolerant networks (DTNs) ar typically encountered in military network environments wherever end-to-end property isn't warranted because of frequent disconnection or delay. This work proposes a provenance-based trust framework, specifically PROVEST (PROVEnance-based Trust model) that aims to attain correct peer-to-peer trust assessment and maximize the delivery of correct messages received by destination nodes whereas minimizing message delay and communication value below resource-constrained network environments. root refers to the history of possession of a valued object or data. we tend to leverage the reciprocity between trait of knowledge supply and knowledge itself in PROVEST. PROVEST takes a data-driven approach to scale back resource consumption within the presence of sel?sh or malicious nodes whereas estimating a node's trust dynamically in response to changes within the environmental and node conditions. This work adopts a model-based methodology to judge the performance of PROVEST (i.e., trust accuracy and routing performance) exploitation random Petri Nets. we tend to conduct a comparative performance analysis of PROVEST against existing trust-based and non-trust-based DTN routing protocols to investigate the bene?ts of PROVEST. we tend to validate PROVEST employing a real dataset of DTN quality traces.

References

  1. T. Spyropoulos, R. Rais, T. Turletti, K. Obraczka, and A. Vasilakos, “Routing for disruption tolerant networks: taxonomy and design,” Wireless Networks, vol. 16, no. 8, pp. 2349-2370, 2010.
  2. I.R. Chen, F. Bao, M. Chang, and J.-H. Cho, “Trust management for encounter-based routing in delay tolerant networks,” in IEEE Global Telecommunications Conference, Miami, FL, 6-10 Dec. 2010, pp. 1-6.
  3. “Dynamic trust management for delay tolerant networks and its application to secure routing,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 5, pp. 1200-1210, May 2014.
  4. P. Buneman, S. Khanna, and W. Tan, “Why and where: A characterization of data provenance,” in Proceedings of International Conference on Database Theory, Springer-Verlag, 2001, pp. 316-330.
  5. J.-H. Cho, M. Chang, I.-R. Chen, and A. Swami, Trust Management VI, IFIP Advances in Information and Communication Technology. 6th IFIPTM, Surat, India: Springer, 2012, vol. 374, ch. A Provenancebased Trust Model of Delay Tolerant Networks, pp. 52-67.

Downloads

Published

2017-10-31

Issue

Section

Research Articles

How to Cite

[1]
Maredu Sreevani, B. Sudhakar, Dr. S. Senthil Kumar, Dr. S. Sreenatha Reddy, " Conviction Management for Encounter-Based Routing in Interruption Lenient Networks, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 3, Issue 7, pp.01-04 , September-October-2017.