Home > Archives > IJSRST17373 IJSRST-Library

Conviction Management for Encounter-Based Routing in Interruption Lenient Networks

Authors(4) :-Maredu Sreevani, B. Sudhakar, Dr. S. Senthil Kumar, Dr. S. Sreenatha Reddy

Delay tolerant networks (DTNs) ar typically encountered in military network environments wherever end-to-end property isn't warranted because of frequent disconnection or delay. This work proposes a provenance-based trust framework, specifically PROVEST (PROVEnance-based Trust model) that aims to attain correct peer-to-peer trust assessment and maximize the delivery of correct messages received by destination nodes whereas minimizing message delay and communication value below resource-constrained network environments. root refers to the history of possession of a valued object or data. we tend to leverage the reciprocity between trait of knowledge supply and knowledge itself in PROVEST. PROVEST takes a data-driven approach to scale back resource consumption within the presence of sel?sh or malicious nodes whereas estimating a node's trust dynamically in response to changes within the environmental and node conditions. This work adopts a model-based methodology to judge the performance of PROVEST (i.e., trust accuracy and routing performance) exploitation random Petri Nets. we tend to conduct a comparative performance analysis of PROVEST against existing trust-based and non-trust-based DTN routing protocols to investigate the bene?ts of PROVEST. we tend to validate PROVEST employing a real dataset of DTN quality traces.
Maredu Sreevani, B. Sudhakar, Dr. S. Senthil Kumar, Dr. S. Sreenatha Reddy
Delay Tolerant Networks, Provenance, Store-And-Forward, Trust, Trustiness
  1. T. Spyropoulos, R. Rais, T. Turletti, K. Obraczka, and A. Vasilakos, “Routing for disruption tolerant networks: taxonomy and design,” Wireless Networks, vol. 16, no. 8, pp. 2349-2370, 2010.
  2. I.R. Chen, F. Bao, M. Chang, and J.-H. Cho, “Trust management for encounter-based routing in delay tolerant networks,” in IEEE Global Telecommunications Conference, Miami, FL, 6-10 Dec. 2010, pp. 1-6.
  3. “Dynamic trust management for delay tolerant networks and its application to secure routing,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 5, pp. 1200-1210, May 2014.
  4. P. Buneman, S. Khanna, and W. Tan, “Why and where: A characterization of data provenance,” in Proceedings of International Conference on Database Theory, Springer-Verlag, 2001, pp. 316-330.
  5. J.-H. Cho, M. Chang, I.-R. Chen, and A. Swami, Trust Management VI, IFIP Advances in Information and Communication Technology. 6th IFIPTM, Surat, India: Springer, 2012, vol. 374, ch. A Provenancebased Trust Model of Delay Tolerant Networks, pp. 52-67.
Publication Details
  Published in : Volume 3 | Issue 7 | September-October 2017
  Date of Publication : 2017-10-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 01-04
Manuscript Number : IJSRST17373
Publisher : Technoscience Academy
PRINT ISSN : 2395-6011
ONLINE ISSN : 2395-602X
Cite This Article :
Maredu Sreevani, B. Sudhakar, Dr. S. Senthil Kumar, Dr. S. Sreenatha Reddy, "Conviction Management for Encounter-Based Routing in Interruption Lenient Networks", International Journal of Scientific Research in Science and Technology(IJSRST), Print ISSN : 2395-6011, Online ISSN : 2395-602X, Volume 3, Issue 7, pp.01-04 , September-October-2017.
Journal URL : http://ijsrst.com/IJSRST17373

Article Preview