Conviction Management for Encounter-Based Routing in Interruption Lenient Networks

Authors(4) :-Maredu Sreevani, B. Sudhakar, Dr. S. Senthil Kumar, Dr. S. Sreenatha Reddy

Delay tolerant networks (DTNs) ar typically encountered in military network environments wherever end-to-end property isn't warranted because of frequent disconnection or delay. This work proposes a provenance-based trust framework, specifically PROVEST (PROVEnance-based Trust model) that aims to attain correct peer-to-peer trust assessment and maximize the delivery of correct messages received by destination nodes whereas minimizing message delay and communication value below resource-constrained network environments. root refers to the history of possession of a valued object or data. we tend to leverage the reciprocity between trait of knowledge supply and knowledge itself in PROVEST. PROVEST takes a data-driven approach to scale back resource consumption within the presence of sel?sh or malicious nodes whereas estimating a node's trust dynamically in response to changes within the environmental and node conditions. This work adopts a model-based methodology to judge the performance of PROVEST (i.e., trust accuracy and routing performance) exploitation random Petri Nets. we tend to conduct a comparative performance analysis of PROVEST against existing trust-based and non-trust-based DTN routing protocols to investigate the bene?ts of PROVEST. we tend to validate PROVEST employing a real dataset of DTN quality traces.

Authors and Affiliations

Maredu Sreevani
Guru Nanak Institute of Technology, Ibrahimpatnam, Telangana, India
B. Sudhakar
Guru Nanak Institute of Technology, Ibrahimpatnam, Telangana, India
Dr. S. Senthil Kumar
Guru Nanak Institute of Technology, Ibrahimpatnam, Telangana, India
Dr. S. Sreenatha Reddy
Guru Nanak Institute of Technology, Ibrahimpatnam, Telangana, India

Delay Tolerant Networks, Provenance, Store-And-Forward, Trust, Trustiness

  1. T. Spyropoulos, R. Rais, T. Turletti, K. Obraczka, and A. Vasilakos, “Routing for disruption tolerant networks: taxonomy and design,” Wireless Networks, vol. 16, no. 8, pp. 2349-2370, 2010.
  2. I.R. Chen, F. Bao, M. Chang, and J.-H. Cho, “Trust management for encounter-based routing in delay tolerant networks,” in IEEE Global Telecommunications Conference, Miami, FL, 6-10 Dec. 2010, pp. 1-6.
  3. “Dynamic trust management for delay tolerant networks and its application to secure routing,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 5, pp. 1200-1210, May 2014.
  4. P. Buneman, S. Khanna, and W. Tan, “Why and where: A characterization of data provenance,” in Proceedings of International Conference on Database Theory, Springer-Verlag, 2001, pp. 316-330.
  5. J.-H. Cho, M. Chang, I.-R. Chen, and A. Swami, Trust Management VI, IFIP Advances in Information and Communication Technology. 6th IFIPTM, Surat, India: Springer, 2012, vol. 374, ch. A Provenancebased Trust Model of Delay Tolerant Networks, pp. 52-67.

Publication Details

Published in : Volume 3 | Issue 7 | September-October 2017
Date of Publication : 2017-10-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 01-04
Manuscript Number : IJSRST17373
Publisher : Technoscience Academy

Print ISSN : 2395-6011, Online ISSN : 2395-602X

Cite This Article :

Maredu Sreevani, B. Sudhakar, Dr. S. Senthil Kumar, Dr. S. Sreenatha Reddy, " Conviction Management for Encounter-Based Routing in Interruption Lenient Networks, International Journal of Scientific Research in Science and Technology(IJSRST), Print ISSN : 2395-6011, Online ISSN : 2395-602X, Volume 3, Issue 7, pp.01-04 , September-October-2017. Available at doi : 10.32628/IJSRST17373
Journal URL : http://ijsrst.com/IJSRST17373

Article Preview

Contact Us