Energy Efficient Routing and Peer to Peer Trust Assessment for Increasing the Network Life Time in Delay Tolerant Networks


  • S Murugaveni
  • B Priyalakshmi
  • K Vijayan





Energy productivity, entrepreneurial steering, hand-off hub, remote sensor.


In military network environments is resource-constrained arrange conditions, where end-to-end network is not ensured because of successive deferral, an efficient solution is required for trustful and energy efficient routing. Proposed work, provenance trust based routing is combined with energy efficient route to opt for a high network lifetime. Proposed scheme is designed for peer-to-peer trust assessment and maximize the delivery of correct messages received by destination nodes while minimizing message delay and communication cost Provenance alludes to the historical backdrop of responsibility for esteemed data. Proposed scheme avoids malicious node using provenance model and achieves good network lifetime using energy efficient routing strategy. Node’s trust is calculated dynamically in response to changes in the environmental and node conditions.




[1] T.Spyroulous, R.Rias, T.Turletti, K.Obracz ka,and A.Vasilakos, “Routing for disruption tolerant networks taxonomy and designâ€, Wireless networks, vol.16, no.8, pp.2349-2370, 2010.

[2] I.-R. Chen, F. Bao, M. Chang, and J.-H. Cho,’Trust management for encounter – based routing in delay networks, in IEEE Global Telecommunications conference, Miami, FL, 6-10 Dec. 2010,pp. 1–6., Dec. 2010

[3] “Dynamic trust management for delay tolerant networks and its application to secure routing,†IEEE Transactions on parallel distributed systems, vol 25, no 5, pp.1200-1210, May 2014.

[4] P. Buneman, S. Khanna, and W. Tan, “Why and where: A characterization of data provenance,†in Proceedings of International Conference on Database Theory, Springer-Verlag, pp. 316–330, 2001.

[5] J.-H.Cho, M.Chang, I.-R.Chen, and A.Swami, “Trust Management VI IFIPâ€, Advances in Information and Communication Technology.

[6] G. McDonald, L. O. Murchu, S. Doherty, and E. Chien, “Stuxnet 0.5: The missing linkâ€, Symantec Security Response [online], vol. 26, 2013.

[7] B. Bencsath, G.P´ ek, L. Butty´an, and M. F ´ elegyh´azi, “The cousins of ´ stuxnet: Duqu, flame, and gaussâ€, Future Internet, vol. 4, no. 4, pp. 971–1003, 2012.

[8] J. Menn, “Key internet operator verisign hit by hackers,†Reuters, feb, vol. 2, 2012

[9] Prosecutors and Public, “Messiah spyware infects middle east targetsâ€.

[10] M. Balduzzi, V. Ciangaglini, and R.McArdle, “Targeted attacks detection with spungeâ€, Trend Micro Research, EMEA, 2013.

View Full Article:

How to Cite

Murugaveni, S., Priyalakshmi, B., & Vijayan, K. (2018). Energy Efficient Routing and Peer to Peer Trust Assessment for Increasing the Network Life Time in Delay Tolerant Networks. International Journal of Engineering & Technology, 7(3.12), 726–728.
Received 2018-07-28
Accepted 2018-07-28
Published 2018-07-20