Energy Efficient Routing and Peer to Peer Trust Assessment for Increasing the Network Life Time in Delay Tolerant Networks

  • Authors

    • S Murugaveni
    • B Priyalakshmi
    • K Vijayan
    2018-07-20
    https://doi.org/10.14419/ijet.v7i3.12.16464
  • Energy productivity, entrepreneurial steering, hand-off hub, remote sensor.
  • In military network environments is resource-constrained arrange conditions, where end-to-end network is not ensured because of successive deferral, an efficient solution is required for trustful and energy efficient routing. Proposed work, provenance trust based routing is combined with energy efficient route to opt for a high network lifetime. Proposed scheme is designed for peer-to-peer trust assessment and maximize the delivery of correct messages received by destination nodes while minimizing message delay and communication cost Provenance alludes to the historical backdrop of responsibility for esteemed data. Proposed scheme avoids malicious node using provenance model and achieves good network lifetime using energy efficient routing strategy. Node’s trust is calculated dynamically in response to changes in the environmental and node conditions.

     

     

  • References

    1. [1] T.Spyroulous, R.Rias, T.Turletti, K.Obracz ka,and A.Vasilakos, “Routing for disruption tolerant networks taxonomy and designâ€, Wireless networks, vol.16, no.8, pp.2349-2370, 2010.

      [2] I.-R. Chen, F. Bao, M. Chang, and J.-H. Cho,’Trust management for encounter – based routing in delay networks, in IEEE Global Telecommunications conference, Miami, FL, 6-10 Dec. 2010,pp. 1–6., Dec. 2010

      [3] “Dynamic trust management for delay tolerant networks and its application to secure routing,†IEEE Transactions on parallel distributed systems, vol 25, no 5, pp.1200-1210, May 2014.

      [4] P. Buneman, S. Khanna, and W. Tan, “Why and where: A characterization of data provenance,†in Proceedings of International Conference on Database Theory, Springer-Verlag, pp. 316–330, 2001.

      [5] J.-H.Cho, M.Chang, I.-R.Chen, and A.Swami, “Trust Management VI IFIPâ€, Advances in Information and Communication Technology.

      [6] G. McDonald, L. O. Murchu, S. Doherty, and E. Chien, “Stuxnet 0.5: The missing linkâ€, Symantec Security Response [online], vol. 26, 2013.

      [7] B. Bencsath, G.P´ ek, L. Butty´an, and M. F ´ elegyh´azi, “The cousins of ´ stuxnet: Duqu, flame, and gaussâ€, Future Internet, vol. 4, no. 4, pp. 971–1003, 2012.

      [8] J. Menn, “Key internet operator verisign hit by hackers,†Reuters, feb, vol. 2, 2012

      [9] Prosecutors and Public, “Messiah spyware infects middle east targetsâ€.

      [10] M. Balduzzi, V. Ciangaglini, and R.McArdle, “Targeted attacks detection with spungeâ€, Trend Micro Research, EMEA, 2013.

  • Downloads

  • How to Cite

    Murugaveni, S., Priyalakshmi, B., & Vijayan, K. (2018). Energy Efficient Routing and Peer to Peer Trust Assessment for Increasing the Network Life Time in Delay Tolerant Networks. International Journal of Engineering & Technology, 7(3.12), 726-728. https://doi.org/10.14419/ijet.v7i3.12.16464