Conviction Management for Encounter-Based Routing in Interruption Lenient Networks
Keywords:
Delay Tolerant Networks, Provenance, Store-And-Forward, Trust, TrustinessAbstract
Delay tolerant networks (DTNs) ar typically encountered in military network environments wherever end-to-end property isn't warranted because of frequent disconnection or delay. This work proposes a provenance-based trust framework, specifically PROVEST (PROVEnance-based Trust model) that aims to attain correct peer-to-peer trust assessment and maximize the delivery of correct messages received by destination nodes whereas minimizing message delay and communication value below resource-constrained network environments. root refers to the history of possession of a valued object or data. we tend to leverage the reciprocity between trait of knowledge supply and knowledge itself in PROVEST. PROVEST takes a data-driven approach to scale back resource consumption within the presence of sel?sh or malicious nodes whereas estimating a node's trust dynamically in response to changes within the environmental and node conditions. This work adopts a model-based methodology to judge the performance of PROVEST (i.e., trust accuracy and routing performance) exploitation random Petri Nets. we tend to conduct a comparative performance analysis of PROVEST against existing trust-based and non-trust-based DTN routing protocols to investigate the bene?ts of PROVEST. we tend to validate PROVEST employing a real dataset of DTN quality traces.
References
- T. Spyropoulos, R. Rais, T. Turletti, K. Obraczka, and A. Vasilakos, “Routing for disruption tolerant networks: taxonomy and design,” Wireless Networks, vol. 16, no. 8, pp. 2349-2370, 2010.
- I.R. Chen, F. Bao, M. Chang, and J.-H. Cho, “Trust management for encounter-based routing in delay tolerant networks,” in IEEE Global Telecommunications Conference, Miami, FL, 6-10 Dec. 2010, pp. 1-6.
- “Dynamic trust management for delay tolerant networks and its application to secure routing,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 5, pp. 1200-1210, May 2014.
- P. Buneman, S. Khanna, and W. Tan, “Why and where: A characterization of data provenance,” in Proceedings of International Conference on Database Theory, Springer-Verlag, 2001, pp. 316-330.
- J.-H. Cho, M. Chang, I.-R. Chen, and A. Swami, Trust Management VI, IFIP Advances in Information and Communication Technology. 6th IFIPTM, Surat, India: Springer, 2012, vol. 374, ch. A Provenancebased Trust Model of Delay Tolerant Networks, pp. 52-67.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRST

This work is licensed under a Creative Commons Attribution 4.0 International License.