Supplemental Material for “Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing”

نویسندگان

  • Ing-Ray Chen
  • Fenye Bao
  • MoonJeong Chang
  • Jin-Hee Cho
چکیده

DTNs have attracted much attention in the networking research community. Most DTNs are deployed in extreme environments (e.g., battlefields and developing regions), where the end-to-end connection which is the fundamental assumption of the Internet cannot be guaranteed [18]. Hence, protocols designed for the Internet may not be applicable to DTNs. Due to specific DTN characteristics and application requirements, [28] suggests a top-down approach for DTN-protocol design to consider application priorities. In this paper, we focus on trust management and secure routing in DTNs. We refer the readers to [18, 28] for research challenges in DTNs. The literature is abundant in routing protocol design for DTNs. Traditional routing protocols [5, 7, 23, 32] for DTNs focus on exploring the mobility pattern and predicting future encounter events. However, in the presence of misbehaving nodes, these routing protocols still can experience a low message delivery ratio. A number of protocols have been proposed lately to cope with misbehaving nodes. Detection and prevention are two widely used approaches. Detection-based approaches [2-4, 16, 21, 24, 26, 27, 33] rely on trust/reputation techniques to identify misbehaving nodes and avoid selecting misbehaving nodes as message carriers in DTN routing. Prevention-based approaches assume that nodes are rational to maximize their own interests and often use incentives [8, 25, 30, 31, 34] to stimulate cooperation between nodes and avoid misbehavior. Well-behaved nodes are awarded while uncooperative nodes are punished such that a node would not misbehave for the sake of its own interest. However, incentive-based approaches in general will not work for malicious nodes with ultimate interests to disrupt the operation of the system. Also, the assumption of rational behavior following prescribed game strategies in general may not be justified in DTN environments. Context-free protocols [31] have also been proposed to hide the identity of the destination node in order to encourage selfish nodes to participate in packet forwarding. However, in intermittently connected DTN environments, message forwarding follows the store-carry-and-forward paradigm. It is difficult, if not impossible, to establish the entire routing path by the source node without revealing the identity of the destination node to intermediate carriers during DTN routing. Unlike trust management for mobile ad hoc networks (MANETs) [13], trust management for DTNs is little explored in the literature. To the best of our knowledge, only [2, 3, 16, 21, 33] used feedback mechanisms or indirect recommendations for trust management. [33] considered three sources to estimate trust: …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Framework for Secure Routing in VANET

Vehicular Ad-Hoc Networks can enhance road safety and enable drivers to avoid different threats. Safety applications, mobile commerce, and other information services are among different available services that are affected by dynamic topology, vehicle’s speed and node misbehaving. Dynamic topology makes the route unstable and unreliable. So, improving the throughput and performance of VANET thr...

متن کامل

Delay Tolerant Networks on Trust Based Dynamic Data for Secure Routing

The delay tolerant networks (DTNs) are high end-to-end latency and numerous disconnection and characterized opportunistic communication over unreliable wireless links. In DTN environment the Dynamic trust management protocol is designed and validate for secure routing optimization in the being there of well-behaved, selfish and malicious nodes. The system develops a methodology for the analysis...

متن کامل

An Efficient Trust Management Technique for Delay Tolerant Network

Delay Tolerant Networks (DTNs) have high end-to-end latency, which is often faces disconnection, and unreliable wireless connections. It does not mean a delay service instead DTNs provides a service where network imposes disruption or delay. It operates in challenged networks with extremely limited resources such as memory size, CPU processing power etc. This paper presents an efficient trust m...

متن کامل

A Secure Routing Algorithm for Underwater Wireless Sensor Networks

Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...

متن کامل

Trust Management in Resource Constraint Networks

There are numerous environments or situations where a computer network has one or more constraints. Impact of these constraints can range from minimal user inconveniences to catastrophic reduction of capabilities. These constraints allow availability of information at the cost of abandoning the safety and reliability of traditional routing and security protocols. A number of environments in whi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013