Energy Efficient Routing and Peer to Peer Trust Assessment for Increasing the Network Life Time in Delay Tolerant Networks
DOI:
https://doi.org/10.14419/ijet.v7i3.12.16464Published:
2018-07-20Keywords:
Energy productivity, entrepreneurial steering, hand-off hub, remote sensor.Abstract
In military network environments is resource-constrained arrange conditions, where end-to-end network is not ensured because of successive deferral, an efficient solution is required for trustful and energy efficient routing. Proposed work, provenance trust based routing is combined with energy efficient route to opt for a high network lifetime. Proposed scheme is designed for peer-to-peer trust assessment and maximize the delivery of correct messages received by destination nodes while minimizing message delay and communication cost Provenance alludes to the historical backdrop of responsibility for esteemed data. Proposed scheme avoids malicious node using provenance model and achieves good network lifetime using energy efficient routing strategy. Node’s trust is calculated dynamically in response to changes in the environmental and node conditions.
References
[1] T.Spyroulous, R.Rias, T.Turletti, K.Obracz ka,and A.Vasilakos, “Routing for disruption tolerant networks taxonomy and designâ€, Wireless networks, vol.16, no.8, pp.2349-2370, 2010.
[2] I.-R. Chen, F. Bao, M. Chang, and J.-H. Cho,’Trust management for encounter – based routing in delay networks, in IEEE Global Telecommunications conference, Miami, FL, 6-10 Dec. 2010,pp. 1–6., Dec. 2010
[3] “Dynamic trust management for delay tolerant networks and its application to secure routing,†IEEE Transactions on parallel distributed systems, vol 25, no 5, pp.1200-1210, May 2014.
[4] P. Buneman, S. Khanna, and W. Tan, “Why and where: A characterization of data provenance,†in Proceedings of International Conference on Database Theory, Springer-Verlag, pp. 316–330, 2001.
[5] J.-H.Cho, M.Chang, I.-R.Chen, and A.Swami, “Trust Management VI IFIPâ€, Advances in Information and Communication Technology.
[6] G. McDonald, L. O. Murchu, S. Doherty, and E. Chien, “Stuxnet 0.5: The missing linkâ€, Symantec Security Response [online], vol. 26, 2013.
[7] B. Bencsath, G.P´ ek, L. Butty´an, and M. F ´ elegyh´azi, “The cousins of ´ stuxnet: Duqu, flame, and gaussâ€, Future Internet, vol. 4, no. 4, pp. 971–1003, 2012.
[8] J. Menn, “Key internet operator verisign hit by hackers,†Reuters, feb, vol. 2, 2012
[9] Prosecutors and Public, “Messiah spyware infects middle east targetsâ€.
[10] M. Balduzzi, V. Ciangaglini, and R.McArdle, “Targeted attacks detection with spungeâ€, Trend Micro Research, EMEA, 2013.
How to Cite
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution Licensethat allows others to share the work with an acknowledgement of the work''s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal''s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Accepted 2018-07-28
Published 2018-07-20