Energy Efficient Routing and Peer to Peer Trust Assessment for Increasing the Network Life Time in Delay Tolerant Networks
Keywords:Energy productivity, entrepreneurial steering, hand-off hub, remote sensor.
In military network environments is resource-constrained arrange conditions, where end-to-end network is not ensured because of successive deferral, an efficient solution is required for trustful and energy efficient routing. Proposed work, provenance trust based routing is combined with energy efficient route to opt for a high network lifetime. Proposed scheme is designed for peer-to-peer trust assessment and maximize the delivery of correct messages received by destination nodes while minimizing message delay and communication cost Provenance alludes to the historical backdrop of responsibility for esteemed data. Proposed scheme avoids malicious node using provenance model and achieves good network lifetime using energy efficient routing strategy. Nodeâ€™s trust is calculated dynamically in response to changes in the environmental and node conditions.
 T.Spyroulous, R.Rias, T.Turletti, K.Obracz ka,and A.Vasilakos, â€œRouting for disruption tolerant networks taxonomy and designâ€, Wireless networks, vol.16, no.8, pp.2349-2370, 2010.
 I.-R. Chen, F. Bao, M. Chang, and J.-H. Cho,â€™Trust management for encounter â€“ based routing in delay networks, in IEEE Global Telecommunications conference, Miami, FL, 6-10 Dec. 2010,pp. 1â€“6., Dec. 2010
 â€œDynamic trust management for delay tolerant networks and its application to secure routing,â€ IEEE Transactions on parallel distributed systems, vol 25, no 5, pp.1200-1210, May 2014.
 P. Buneman, S. Khanna, and W. Tan, â€œWhy and where: A characterization of data provenance,â€ in Proceedings of International Conference on Database Theory, Springer-Verlag, pp. 316â€“330, 2001.
 J.-H.Cho, M.Chang, I.-R.Chen, and A.Swami, â€œTrust Management VI IFIPâ€, Advances in Information and Communication Technology.
 G. McDonald, L. O. Murchu, S. Doherty, and E. Chien, â€œStuxnet 0.5: The missing linkâ€, Symantec Security Response [online], vol. 26, 2013.
 B. Bencsath, G.PÂ´ ek, L. ButtyÂ´an, and M. F Â´ elegyhÂ´azi, â€œThe cousins of Â´ stuxnet: Duqu, flame, and gaussâ€, Future Internet, vol. 4, no. 4, pp. 971â€“1003, 2012.
 J. Menn, â€œKey internet operator verisign hit by hackers,â€ Reuters, feb, vol. 2, 2012
 Prosecutors and Public, â€œMessiah spyware infects middle east targetsâ€.
 M. Balduzzi, V. Ciangaglini, and R.McArdle, â€œTargeted attacks detection with spungeâ€, Trend Micro Research, EMEA, 2013.
View Full Article:
How to Cite
LicenseAuthors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under aÂ Creative Commons Attribution Licensethat allows others to share the work with an acknowledgement of the work''s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal''s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (SeeÂ The Effect of Open Access).