Skip to main content
Erschienen in: The Journal of Supercomputing 6/2021

17.11.2020

Performance optimization in delay tolerant networks using backtracking algorithm for fully credits distribution to contrast selfish nodes

verfasst von: Atul Sharma, Nitin Goyal, Kalpna Guleria

Erschienen in: The Journal of Supercomputing | Ausgabe 6/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Delay Tolerant Network (DTN) can be characterized as a heterogeneous network of nodes in which nodes mobility is high and resources are limited to transmit messages. In DTN, nodes use store, carry, and forward principle for delivering messages to the destination node. To forward messages through intermediate nodes may cause security issues in the network since there may exist a few selfish nodes. These nodes can affect the network's performance as they may drop messages due to their limited resources such as energy and storage capacity. To handle this kind of hazard, it is necessary to propose a mechanism that may decrease the degree of the selfishness of nodes and improve the network's delivery ratio by fully distributing credits to nodes. In this article, a credit-based mechanism has been proposed based on Combined Trust Value (CTV) of nodes in DTN. In the proposed mechanism, an agent is used to compute each node's trust value grounded of the number of messages relayed by sensor nodes. This trust value is used to distribute credits to the nodes in a distributed manner without any partiality with nodes. Backtracking approach is used to distribute credits to boundary nodes deserving credits but didn’t get credits by agent node. The proposed mechanism is implemented using ONE simulator, and the performance of the projected scheme is analyzed in comparison to existing techniques Dynamic Trust, SMART (Secure Multilayer credit based incentive Technique) and Credit-based. The results exhibit that the suggested mechanism is superior than existing techniques with reference to various performance metrics like 25% higher delivery ratio, 41% less overhead, 21% less average message delay, and 28% less packets dropped. The proposed mechanism might be helpful in scenarios where the degree of selfishness is high, and the distribution of credit follows a fully distributed approach rather than an existing partial distribution used in existing techniques.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Karimi S, Darmani Y (2019) p-Epidemic forwarding method for heterogeneous delay-tolerant networks. The Journal of Supercomputing 75(11):7244–7264CrossRef Karimi S, Darmani Y (2019) p-Epidemic forwarding method for heterogeneous delay-tolerant networks. The Journal of Supercomputing 75(11):7244–7264CrossRef
2.
Zurück zum Zitat Sharma A (2019) Resource Utilization of DTN Routing Protocols by Calculating Energy Consumption of Mobile Nodes. Pervasive Computing: A Networking Perspective and Future Directions. Springer, Singapore, pp 47–52CrossRef Sharma A (2019) Resource Utilization of DTN Routing Protocols by Calculating Energy Consumption of Mobile Nodes. Pervasive Computing: A Networking Perspective and Future Directions. Springer, Singapore, pp 47–52CrossRef
3.
Zurück zum Zitat Wu J, Guo Y, Zhou H, Shen L, Liu L (2020) Vehicular Delay Tolerant Network Routing Algorithm Based on Bayesian Network. IEEE Access 8:18727–18740CrossRef Wu J, Guo Y, Zhou H, Shen L, Liu L (2020) Vehicular Delay Tolerant Network Routing Algorithm Based on Bayesian Network. IEEE Access 8:18727–18740CrossRef
4.
Zurück zum Zitat Madni MAA, Iranmanesh S, Raad R (2020) DTN and non-DTN routing protocols for inter-cubesat communications: A comprehensive survey. Electronics 9(3):482CrossRef Madni MAA, Iranmanesh S, Raad R (2020) DTN and non-DTN routing protocols for inter-cubesat communications: A comprehensive survey. Electronics 9(3):482CrossRef
5.
Zurück zum Zitat Xia B, Kong F, Zhou J, Tang X, Gong H (2020) A delay-tolerant data transmission scheme for internet of vehicles based on software defined cloud-fog networks. IEEE Access 8:65911–65922CrossRef Xia B, Kong F, Zhou J, Tang X, Gong H (2020) A delay-tolerant data transmission scheme for internet of vehicles based on software defined cloud-fog networks. IEEE Access 8:65911–65922CrossRef
6.
Zurück zum Zitat Akbar R, Etedalpour AA, Safaei F (2016) An efficient fault-tolerant routing algorithm in NoCs to tolerate permanent faults. The Journal of Supercomputing 72(12):4629–4650CrossRef Akbar R, Etedalpour AA, Safaei F (2016) An efficient fault-tolerant routing algorithm in NoCs to tolerate permanent faults. The Journal of Supercomputing 72(12):4629–4650CrossRef
7.
Zurück zum Zitat Bounouni M, Bouallouche-Medjkoune L (2018) Acknowledgment-based punishment and stimulation scheme for mobile ad hoc network. The Journal of Supercomputing 74(10):5373–5398CrossRef Bounouni M, Bouallouche-Medjkoune L (2018) Acknowledgment-based punishment and stimulation scheme for mobile ad hoc network. The Journal of Supercomputing 74(10):5373–5398CrossRef
8.
Zurück zum Zitat Silva RF (2019) Adaptive: an adaptive routing protocol for vehicle delay-tolerant networks. IEEE Latin America Transactions 18(02):223–231CrossRef Silva RF (2019) Adaptive: an adaptive routing protocol for vehicle delay-tolerant networks. IEEE Latin America Transactions 18(02):223–231CrossRef
9.
Zurück zum Zitat Tosun S, Ajabshir VB (2018) Energy-aware partitioning of fault-tolerant irregular topologies for 3D network-on-chips. The Journal of Supercomputing 74(9):4842–4863CrossRef Tosun S, Ajabshir VB (2018) Energy-aware partitioning of fault-tolerant irregular topologies for 3D network-on-chips. The Journal of Supercomputing 74(9):4842–4863CrossRef
10.
Zurück zum Zitat Habibian H, Patooghy A (2017) Fault-tolerant routing methodology for hypercube and cube-connected cycles interconnection networks. The Journal of Supercomputing 73(10):4560–4579CrossRef Habibian H, Patooghy A (2017) Fault-tolerant routing methodology for hypercube and cube-connected cycles interconnection networks. The Journal of Supercomputing 73(10):4560–4579CrossRef
11.
Zurück zum Zitat Shirmarz A, Ghaffari A (2020) Performance issues and solutions in SDN-based data center: a survey. J Supercomput 1–49 Shirmarz A, Ghaffari A (2020) Performance issues and solutions in SDN-based data center: a survey. J Supercomput 1–49
12.
Zurück zum Zitat Tabrizchi, H., Rafsanjani, M. K. (2020). A survey on security challenges in cloud computing: issues, threats, and solutions. The Journal of Supercomputing, 1–40. Tabrizchi, H., Rafsanjani, M. K. (2020). A survey on security challenges in cloud computing: issues, threats, and solutions. The Journal of Supercomputing, 1–40.
13.
Zurück zum Zitat Li Q, Gao W, Zhu S, Cao G (2012) A routing protocol for socially selfish delay tolerant networks. Ad Hoc Netw 10(8):1619–1632CrossRef Li Q, Gao W, Zhu S, Cao G (2012) A routing protocol for socially selfish delay tolerant networks. Ad Hoc Netw 10(8):1619–1632CrossRef
14.
Zurück zum Zitat Loudari SE, Benamar N (2019) Effects of selfishness on the energy consumption in opportunistic networks: a performance assessment. In: 2019 International conference on wireless technologies, embedded and intelligent systems (WITS). IEEE, pp 1–7 Loudari SE, Benamar N (2019) Effects of selfishness on the energy consumption in opportunistic networks: a performance assessment. In: 2019 International conference on wireless technologies, embedded and intelligent systems (WITS). IEEE, pp 1–7
15.
Zurück zum Zitat Popescu D, Jacquet P, Mans B, Dumitru R, Pastrav A, Puschita E (2019) Information dissemination speed in delay tolerant urban vehicular networks in a hyperfractal setting. IEEE/ACM Trans Netw 27(5):1901–1914CrossRef Popescu D, Jacquet P, Mans B, Dumitru R, Pastrav A, Puschita E (2019) Information dissemination speed in delay tolerant urban vehicular networks in a hyperfractal setting. IEEE/ACM Trans Netw 27(5):1901–1914CrossRef
16.
Zurück zum Zitat Zhu H, Lin X, Lu R, Fan Y, Shen X (2009) Smart: A secure multilayer credit-based incentive scheme for delay-tolerant networks. IEEE Trans Veh Technol 58(8):4628–4639CrossRef Zhu H, Lin X, Lu R, Fan Y, Shen X (2009) Smart: A secure multilayer credit-based incentive scheme for delay-tolerant networks. IEEE Trans Veh Technol 58(8):4628–4639CrossRef
17.
Zurück zum Zitat Miao J, Hasan O, Mokhtar SB, Brunie L, Yim K (2013) An investigation on the unwillingness of nodes to participate in mobile delay tolerant network routing. Int J Inf Manage 33(2):252–262CrossRef Miao J, Hasan O, Mokhtar SB, Brunie L, Yim K (2013) An investigation on the unwillingness of nodes to participate in mobile delay tolerant network routing. Int J Inf Manage 33(2):252–262CrossRef
18.
Zurück zum Zitat Magaia N, Pereira P, Correia MP, Rawat DB, Rodrigues JJPC, Stojmenovic I (2015) Security in delay-tolerant mobile cyber physical applications. From Theory to Practice. CRC Press, In Cyber-Physical Systems, pp 373-394 Magaia N, Pereira P, Correia MP, Rawat DB, Rodrigues JJPC, Stojmenovic I (2015) Security in delay-tolerant mobile cyber physical applications. From Theory to Practice. CRC Press, In Cyber-Physical Systems, pp 373-394
19.
Zurück zum Zitat Sakai K, Sun MT, Ku WS, Wu J (2018) On anonymous routing in delay tolerant networks. IEEE Trans Mob Comput 18(12):2926–2940CrossRef Sakai K, Sun MT, Ku WS, Wu J (2018) On anonymous routing in delay tolerant networks. IEEE Trans Mob Comput 18(12):2926–2940CrossRef
20.
Zurück zum Zitat Rong WANG, Yahui WU, Hongbin HUANG, Su DENG (2019) Cooperative transmission in delay tolerant network. Journal of Systems Engineering and Electronics 30(1):30–36CrossRef Rong WANG, Yahui WU, Hongbin HUANG, Su DENG (2019) Cooperative transmission in delay tolerant network. Journal of Systems Engineering and Electronics 30(1):30–36CrossRef
21.
Zurück zum Zitat Xie Y, Zhang Y (2016) A secure, service priority-based incentive scheme for delay tolerant networks. Security and Communication Networks 9(1):5–18MathSciNetCrossRef Xie Y, Zhang Y (2016) A secure, service priority-based incentive scheme for delay tolerant networks. Security and Communication Networks 9(1):5–18MathSciNetCrossRef
22.
Zurück zum Zitat Malathi M, Jayashri S (2016) Design and performance of dynamic trust management for secure routing protocol. In: 2016 IEEE international conference on advances in computer applications (ICACA), pp 121–124 Malathi M, Jayashri S (2016) Design and performance of dynamic trust management for secure routing protocol. In: 2016 IEEE international conference on advances in computer applications (ICACA), pp 121–124
23.
Zurück zum Zitat Asuquo P, Cruickshank H, Ogah CPA, Lei A, Sun Z (2016) A collaborative trust management scheme for emergency communication using delay tolerant networks. In: 2016 8th advanced satellite multimedia systems conference and the 14th signal processing for space communications workshop (ASMS/SPSC). IEEE, pp 1–6 Asuquo P, Cruickshank H, Ogah CPA, Lei A, Sun Z (2016) A collaborative trust management scheme for emergency communication using delay tolerant networks. In: 2016 8th advanced satellite multimedia systems conference and the 14th signal processing for space communications workshop (ASMS/SPSC). IEEE, pp 1–6
24.
Zurück zum Zitat Benazir SM, Umarani V (2016) Detection of selfish and malicious behavior using dtn-chord monitoring in mobile networks. In: 2016 International conference on information communication and embedded systems (ICICES). IEEE, pp 1–5 Benazir SM, Umarani V (2016) Detection of selfish and malicious behavior using dtn-chord monitoring in mobile networks. In: 2016 International conference on information communication and embedded systems (ICICES). IEEE, pp 1–5
25.
Zurück zum Zitat Le T, Gerla M (2016) A security framework for content retrieval in dtns. In: 2016 International wireless communications and mobile computing conference (IWCMC). IEEE, pp 7–12 Le T, Gerla M (2016) A security framework for content retrieval in dtns. In: 2016 International wireless communications and mobile computing conference (IWCMC). IEEE, pp 7–12
26.
Zurück zum Zitat Yu L, Liu P (2015) A service-based selfish routing for mobile social networks. Int J Distrib Sens Netw 11(6):910635CrossRef Yu L, Liu P (2015) A service-based selfish routing for mobile social networks. Int J Distrib Sens Netw 11(6):910635CrossRef
27.
Zurück zum Zitat Chakrabarti C, Chakrabarti S, Banerjee A (2015) A dynamic two hops reputation assignment scheme for selfish node detection and avoidance in delay tolerant network. In: 2015 IEEE international conference on research in computational intelligence and communication networks (ICRCICN), pp 345–350 Chakrabarti C, Chakrabarti S, Banerjee A (2015) A dynamic two hops reputation assignment scheme for selfish node detection and avoidance in delay tolerant network. In: 2015 IEEE international conference on research in computational intelligence and communication networks (ICRCICN), pp 345–350
28.
Zurück zum Zitat Hernandez-Orallo E, Olmos MDS, Cano JC, Calafate CT, Manzoni P (2014) CoCoWa: a collaborative contact-based watchdog for detecting selfish nodes. IEEE Trans Mob Comput 14(6):1162–1175CrossRef Hernandez-Orallo E, Olmos MDS, Cano JC, Calafate CT, Manzoni P (2014) CoCoWa: a collaborative contact-based watchdog for detecting selfish nodes. IEEE Trans Mob Comput 14(6):1162–1175CrossRef
29.
Zurück zum Zitat Sharma A (2014). A credit based routing mechanism to contrast selfish nodes in Delay tolerant networks. In: 2014 IEEE international conference on parallel, distributed and grid computing, pp 295–300 Sharma A (2014). A credit based routing mechanism to contrast selfish nodes in Delay tolerant networks. In: 2014 IEEE international conference on parallel, distributed and grid computing, pp 295–300
30.
Zurück zum Zitat Gupta AK, Bhattacharya I, Banerjee PS, Mandal JK (2014). A co-operative approach to thwart selfish and black-hole attacks in DTN for post disaster scenario. In: 2014 IEEE fourth international conference of emerging applications of information technology, pp 113–118 Gupta AK, Bhattacharya I, Banerjee PS, Mandal JK (2014). A co-operative approach to thwart selfish and black-hole attacks in DTN for post disaster scenario. In: 2014 IEEE fourth international conference of emerging applications of information technology, pp 113–118
31.
Zurück zum Zitat Gupta AK, Mandal JK, Bhattacharya I (2017) Mitigating selfish, blackhole and wormhole attacks in DTN in a secure, cooperative way. IJICS 9(1/2):130–155CrossRef Gupta AK, Mandal JK, Bhattacharya I (2017) Mitigating selfish, blackhole and wormhole attacks in DTN in a secure, cooperative way. IJICS 9(1/2):130–155CrossRef
32.
Zurück zum Zitat Buttyán L, Dóra L, Félegyházi M, Vajda I (2010) Barter trade improves message delivery in opportunistic networks. Ad Hoc Netw 8(1):1–14CrossRef Buttyán L, Dóra L, Félegyházi M, Vajda I (2010) Barter trade improves message delivery in opportunistic networks. Ad Hoc Netw 8(1):1–14CrossRef
33.
Zurück zum Zitat Guaya-Delgado L, Pallarès-Segarra E, Mezher AM, Forné J (2019) A novel dynamic reputation-based source routing protocol for mobile ad hoc networks. EURASIP J Wirel Commun Netw 2019(1):77CrossRef Guaya-Delgado L, Pallarès-Segarra E, Mezher AM, Forné J (2019) A novel dynamic reputation-based source routing protocol for mobile ad hoc networks. EURASIP J Wirel Commun Netw 2019(1):77CrossRef
35.
Zurück zum Zitat Sharma A, Gupta P, Grover J (2016) Configuration of ONE simulator using eclipse. IOSR J Electron Commun Eng 1:110–118CrossRef Sharma A, Gupta P, Grover J (2016) Configuration of ONE simulator using eclipse. IOSR J Electron Commun Eng 1:110–118CrossRef
Metadaten
Titel
Performance optimization in delay tolerant networks using backtracking algorithm for fully credits distribution to contrast selfish nodes
verfasst von
Atul Sharma
Nitin Goyal
Kalpna Guleria
Publikationsdatum
17.11.2020
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 6/2021
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-020-03507-4

Weitere Artikel der Ausgabe 6/2021

The Journal of Supercomputing 6/2021 Zur Ausgabe