Priority-based approach to mitigate selfish misbehaviour in delay tolerant network

被引:2
|
作者
Patel, Ashish [1 ]
Bhadra, Dhwani [1 ]
机构
[1] SVM Inst Technol, Dept Comp Engn, Bharuch, India
关键词
opportunistic networks; security; delay tolerant networks; DTNs; trust management; node priority; ROUTING PROTOCOL; STRATEGIES; SCHEME; DESIGN;
D O I
10.1504/IJCNDS.2021.113012
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Delay tolerant networks (DTNs) is a solution to challenged networks which suffer from intermittent connectivity or high delay, thereby offering delay-tolerant support. DTN focuses on minimising delay and maximising forwarding and delivery ratio of data packets. DTN follows the store-carry-forward mechanism where a message is sent to the closest node using a store-carry-forward mechanism. Due to limited resources, poor connectivity and no centralised control, DTN is vulnerable to various attacks. These circumstances lead to the misbehaviour of network nodes and degrade the performance of the system. In this paper, first, we present a comprehensive review of the performance and security of DTN to identify 16 critical parameters allied to similar opportunistic networks. In the second phase of the article, the problem of node misbehaviour in DTN is analysed, and a novel priority-based approach to mitigate selfish misbehaviour is proposed. The acclaimed approach is validated using ONE simulator and exhibits improved results.
引用
收藏
页码:176 / 197
页数:22
相关论文
共 50 条
  • [1] A secure, service priority-based incentive scheme for delay tolerant networks
    Xie, Yongming
    Zhang, Yan
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (01) : 5 - 18
  • [2] Message delay for a priority-based automatic meter reading network
    Frigui, I
    Stone, R
    Alfa, AS
    COMPUTER COMMUNICATIONS, 1997, 20 (01) : 38 - 47
  • [3] PRiDE: Priority and Reliability Based Routing in Delay Tolerant Network
    Gautam, Pankaj Kumar
    Johari, Rahul
    Yadav, Amit K.
    Dahiya, Raman
    Kaur, Ishveen
    Bhatia, Riya
    Chaudhary, Sapna
    PROCEEDINGS OF ICETIT 2019: EMERGING TRENDS IN INFORMATION TECHNOLOGY, 2020, 605 : 1016 - 1027
  • [4] Reference based approach to Mitigate Blackhole Attacks in Delay Tolerant Networks
    Gupta, Garima
    Nagrath, Preeti
    Aneja, Sandhya
    Gupta, Neelima
    PROCEEDINGS OF THE 8TH ACM SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2012, : 85 - 88
  • [5] Priority-based Scheduling Policy For a Hybrid Routing Algorithm in a Vehicular Delay Toleant Network
    Penurkar, Milind R.
    Deshpande, Umesh A.
    2016 INTERNATIONAL CONFERENCE ON COMPUTING, ANALYTICS AND SECURITY TRENDS (CAST), 2016, : 578 - 583
  • [6] A UNIVERSITY BUDGET PROBLEM - A PRIORITY-BASED APPROACH
    ARBEL, A
    SOCIO-ECONOMIC PLANNING SCIENCES, 1983, 17 (04) : 181 - 189
  • [7] THE PRIORITY-BASED COLORING APPROACH TO REGISTER ALLOCATION
    CHOW, FC
    HENNESSY, JL
    ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 1990, 12 (04): : 501 - 536
  • [8] Priority-Based Classification: An Automated Traffic Approach
    Bhadra, Somasree
    Kundu, Anirban
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION TECHNOLOGIES, IC3T 2015, VOL 1, 2016, 379 : 35 - 46
  • [9] Approach to Priority-Based Controlling Traffic Lights
    Phuoc Vinh Tran
    Tha Thi Bui
    Diem Tran
    Phuong Quoc Pham
    Anh Van Thi Tran
    Intelligent Information and Database Systems, ACIIDS 2016, Pt II, 2016, 9622 : 745 - 754
  • [10] Packet Delay Analysis for Priority-Based Passive Optical Networks
    Vardakas, John S.
    Logothetis, Michael D.
    2009 FIRST INTERNATIONAL CONFERENCE ON EMERGING NETWORK INTELLIGENCE (EMERGING 2009), 2009, : 103 - 107