SlideShare a Scribd company logo
1 of 5
Download to read offline
http://www.iaeme.com/IJCIET/index.
International Journal of Civil Engineering and Technology (IJCIET)
Volume 8, Issue 2, February 2017, pp.
Available online at http://www.iaeme.com/IJCIET/issues.
ISSN Print: 0976-6308 and ISSN Online: 0976
© IAEME Publication Scopus
TRUST MANAGEMENT FOR
Reasearch Shcholar, Bharath University, Chennai,
Professor, Sri Ramanujar College of Engineering, Chennai
ABSTRACT
Delay Tolerant Networks (DTNs) have high end
disconnection, and unreliable wireless connections. It does not mean a delay service instead
DTNs provides a service where network imposes disruption or delay. It operates in
networks with extremely limited resources such as memory size, CPU processing power etc.
This paper presents an efficient trust managing mechanism for providing secure environment.
The proposed dynamic trust management protocol uses a dynamic t
overcomes the problems with time changing dynamic characteristics by dynamically updating
the criteria in response to changing network conditions. This reduces overheads and increases
the efficient use of routing network even in con
update reduces the false detection probability of the malicious nodes. To show the effectiveness
of the proposed system, a detailed simulation in the presence of selfish and malicious nodes is
performed with ONE simulator. Finally a comparative analysis of our proposed routing with
previous routing protocols is also performed. The results demonstrate that presented algorithm
deals effectively with selfish behavior with providing significant gain on effective delive
in trade off with message overhead and delay.
Key words: Almatti, Netflows, CWC gauge data,
Cite this Article: C. Rukkumani and Dr. Krishna Mohanta
Tolerant Network. International Journal of Civil Engineering and Technology
08–12.
http://www.iaeme.com/IJCIET/issues.
1. INTRODUCTION
Wireless Delay Tolerant Network (DTNs) [1] is a new Networks class which is characteriz
long message delay and lack of a fully connected path between the source and the target nodes. As a
result, the use of mobile nodes acting as a buffer between the one to other end and behave as a store
and forward approach. The message moves to a n
messages reach their destinations. The message sending is an opportunistic procedure because the
messages are sent in an opportunistic way. Because of its characteristics wide range of useful
applications have been developed for DTNs and enable a new class of networking applications in the
wireless network interface which increases popularity of mobile devices. DTNs can be used for
IJCIET/index.asp 8
International Journal of Civil Engineering and Technology (IJCIET)
2017, pp. 08–12 Article ID: IJCIET_08_02_002
http://www.iaeme.com/IJCIET/issues.asp?JType=IJCIET&VType=8&IType=2
6308 and ISSN Online: 0976-6316
Scopus Indexed
TRUST MANAGEMENT FOR DELAY TOLERANT
NETWORK
C. Rukkumani
Reasearch Shcholar, Bharath University, Chennai, India
Dr. Krishna Mohanta
Professor, Sri Ramanujar College of Engineering, Chennai, India
Delay Tolerant Networks (DTNs) have high end-to-end latency, which is often faces
disconnection, and unreliable wireless connections. It does not mean a delay service instead
DTNs provides a service where network imposes disruption or delay. It operates in
networks with extremely limited resources such as memory size, CPU processing power etc.
This paper presents an efficient trust managing mechanism for providing secure environment.
The proposed dynamic trust management protocol uses a dynamic threshold updating which
overcomes the problems with time changing dynamic characteristics by dynamically updating
the criteria in response to changing network conditions. This reduces overheads and increases
the efficient use of routing network even in conditions change. Also the dynamic threshold
update reduces the false detection probability of the malicious nodes. To show the effectiveness
of the proposed system, a detailed simulation in the presence of selfish and malicious nodes is
imulator. Finally a comparative analysis of our proposed routing with
previous routing protocols is also performed. The results demonstrate that presented algorithm
deals effectively with selfish behavior with providing significant gain on effective delive
in trade off with message overhead and delay.
atti, Netflows, CWC gauge data, working tables, Catchment
C. Rukkumani and Dr. Krishna Mohanta, Trust Management for Delay
International Journal of Civil Engineering and Technology
http://www.iaeme.com/IJCIET/issues.asp?JType=IJCIET&VType=8&IType=2
Wireless Delay Tolerant Network (DTNs) [1] is a new Networks class which is characteriz
long message delay and lack of a fully connected path between the source and the target nodes. As a
result, the use of mobile nodes acting as a buffer between the one to other end and behave as a store
and forward approach. The message moves to a new node when it appears in the range, similarly the
messages reach their destinations. The message sending is an opportunistic procedure because the
messages are sent in an opportunistic way. Because of its characteristics wide range of useful
have been developed for DTNs and enable a new class of networking applications in the
wireless network interface which increases popularity of mobile devices. DTNs can be used for
editor@iaeme.com
asp?JType=IJCIET&VType=8&IType=2
DELAY TOLERANT
India
, India
end latency, which is often faces
disconnection, and unreliable wireless connections. It does not mean a delay service instead
DTNs provides a service where network imposes disruption or delay. It operates in challenged
networks with extremely limited resources such as memory size, CPU processing power etc.
This paper presents an efficient trust managing mechanism for providing secure environment.
hreshold updating which
overcomes the problems with time changing dynamic characteristics by dynamically updating
the criteria in response to changing network conditions. This reduces overheads and increases
ditions change. Also the dynamic threshold
update reduces the false detection probability of the malicious nodes. To show the effectiveness
of the proposed system, a detailed simulation in the presence of selfish and malicious nodes is
imulator. Finally a comparative analysis of our proposed routing with
previous routing protocols is also performed. The results demonstrate that presented algorithm
deals effectively with selfish behavior with providing significant gain on effective delivery ratio
working tables, Catchment
Trust Management for Delay
International Journal of Civil Engineering and Technology, 8(2), 2017, pp.
asp?JType=IJCIET&VType=8&IType=2
Wireless Delay Tolerant Network (DTNs) [1] is a new Networks class which is characterized by a
long message delay and lack of a fully connected path between the source and the target nodes. As a
result, the use of mobile nodes acting as a buffer between the one to other end and behave as a store
ew node when it appears in the range, similarly the
messages reach their destinations. The message sending is an opportunistic procedure because the
messages are sent in an opportunistic way. Because of its characteristics wide range of useful
have been developed for DTNs and enable a new class of networking applications in the
wireless network interface which increases popularity of mobile devices. DTNs can be used for
C. Rukkumani and Dr. Krishna Mohanta
http://www.iaeme.com/IJCIET/index.asp 9 editor@iaeme.com
developing low-cost internet services on remote area moreover it can be used for vehicle DTNs for
local advertising, location-based information collection such as traffic reports and parking
information. However, the practical DTNs implementation is questionable because its characteristics
making them vulnerable to serious security threats. In the system every node predicted that
intermediate nodes (or vehicles) are relaying the message properly. However malicious node not
carries the message properly in the network which causes multi-hop communications to fail and
detection of their presence may be hard. DTNs relay carriers sharing which is the essential
requirement, but this cannot be guarantee because selfish nodes can avoid participating for other
messages. On other hand malicious node creates the black hole which carries out attacks by
deliberately dropping messages. Overcome these attacks is a real challenge due to the connectivity and
distributed nature of DTNs. DTN are resource constrained in nature to save its own resources and
nodes may develop selfish behavior. In which its drop the packet of other nodes to maximize its own
credit or benefits. Such nodes increase the message drop probability and reduce the message delivery
rate. In this paper, we propose a dynamic trust based approach to protect network from black hole and
selfish attacks. The rest of the paper is organized as follows: the second section provides a brief
discussion of the most recent relative literatures of DTNs and the system model is defined in third
section. The fourth section explains the proposed algorithm and the simulated results and the fifth
section explain about conclusion and future work on the basis of the simulation results presented in
fourth section.
2. LITERATURE REVIEW
Since the security in the DTN has already an open issue hence this section presents a brief review of
some of the recent and relevant literatures. E. Bulut [2] presented a study on DTNs in presence of
malicious nodes (also known as compromised DTNs). The literature analyzes the effects of malicious
nodes presence on routing in compromised DTNs. They also proposed a two period routing to
achieving the required delivery ratio with limited packet lifetime in presence of malicious nodes. The
variants of social psychology based approach is one of the commonly found and widely applied [3] [4]
[11] [12] because of their similarity with structure of the DTNs. These methods works by checking
social characteristics like locality, community and relations to decide packet forwarding or consider
other characteristics such as selfishness, unwillingness to avoid packet forwarding. Most of the
literature shows that these techniques can effectively improve the routing performance of DTN. A
combined social psychology and game theory is presented in [3] [8] which utilize the game theory to
find the solution and cause of the social misbehaving. A probabilistic technique for nodes misbehavior
detection and efficient trust establishment named iTrust is proposed by Haojin Zhu [8]. The iTrust
utilizes the Trust Authority (TA) to periodically check the nodes behavior by cost. Trust Authority is
small in numbers because it is fixed and little bit costly, so availability of TA probability cannot be
guaranteed if network size is large. Another common approach [11] is trust management which works
by estimating the trust level of the nodes either by locally orglobally. Generally the trust is estimated
by observing the packets in surrounding environment. Since the trust estimated by any node is shows
its own criteria or vision and the major problem with such systems are false negative trust estimation
because of nodes visibility, hence effective approaches are required to reduce the false detection.
Geographic routing protocol is one of the recent approaches but they required special costly hardware
such as GPS, directional antennas etc. Ing-Ray Chen [9] proposed and analyzes the trust management
protocols for encounter based routing. They incorporated in quality-of-service (QoS) trust properties
(connectivity) and social trust based properties (honesty and unselfishness) for trust evaluation in the
routing protocol. In their literature review two different protocols, an equal-weight QoS, social trust
based management protocol and a QoS only trust management protocol are considered. A Credit
Based Incentive System is proposed in [5], which allows the routing protocol to search the most
efficient routes, with incentive considerations, hence protect against behavior of purposely waste
transfer opportunity and unfairly increased rewards of selfish nodes. The algorithm also provides
Trust Management for Delay Tolerant Network
http://www.iaeme.com/IJCIET/index.asp 10 editor@iaeme.com
different incentive mechanisms to effectively handle different properties. A secure data forwarding
scheme is presented by Mohamed Elsalih Mahmoud [6], they named it SATS. The SATS uses credits
to measure the node’s cooperation in forwarding other node’s messages and to maintain fairness. It
also utilizes a trust system to assign a specific trust value to each node. A node’s trust value indicates
that how actively it forwards other’s messages. The nodes with high trust values are preferable in data
forwarding to avoid the attackers that are not participating in routing process. The SATS forces nodes
for cooperation to only earn trust but also maintain it at higher values. Haojin Zhu [7] proposed a
multilayer credit based incentive technique, to encourage forwarding cooperation among DTN nodes.
The scheme has feature to operate in a fully distributed manner to defend various attacks without
depending upon any specialized hardware. The performance of proposed method is further increased
by different optimization techniques by exploiting the unique characteristics of DTNs.
3. SYSTEM MODEL
In the present work we consider the DTN environment without any centralized trusted authority (TA).
Nodes are able to use multi hops communication. Node exchanges the information on encounters with
another node.
3.1. System Behavior and Model
The system behavior of the node is defined as the unwillingness of node in participation of its
resources on others requirement, this is generally done to maintain its limited resources such as power.
Since DTNs required participation of all nodes in packet relaying this could cause severe degradation
of the performance. They considered selfish nodes acts for its own interests, so to save energy it just
drop the packet but it may decide to forward a message with a certain probability. Two kind of
selfishness: 1. Individual Selfishness: Here node forwards only those packets which are generated by it
and drop packets from other node. 2. Social Selfishness: Here nodes are willing to forward packets for
other nodes with whom they have social connect but not others and such willingness varies with the
strength.Strategies [13] for prevention of selfishness are as follows: 1. Barter Based 2. Credit Based 3.
Reputation Based Barter Based is pair wise Tit-For-Tat strategy. The procedure is that two encounter
nodes exchange the equal value of messages. A message in which the nodes are interested is called
primary message and other are secondary messages, hence it degrades the performance of nodes
drastically.
Credit Based strategy are cooperative to forward the messages, the idea is to gets certain amount of
credit as a reward that it can later explore for its own profit. Credit Based are generally of two types:
Message Purse Model and Message Trade Model. In Message Purse Model source node pay credits to
the intermediate nodes which are involve in forward the messages to the destination. In Message Trade
Model the sender of the message pay credits to receivers in each hop-by-hop transmission until the
message reach the destination, which finally pays credits for the message forwarding. Reputation
Based strategy based upon cooperative experiences and observation of its past activities. If the
reputation value of a node is less, it reflects that the node is selfish according to other nodes, otherwise
Cooperative nature to the nodes. Each intermediate node receives a reputation value after pass a
message to other nodes. The reputation value is a proof about the cooperative nature of the
intermediate node. Reputation Based are generally of two types: Detection Based Model and Without
Detection Based Model. In Detection Based every node detects the behaviour of the receiver which
receives the message from him, in order to monitor the selfishness and encourage them to be
cooperative in nature. In reputation the node is punished if it is not cooperate in nature. Reputation is
also used in Social Selfishness Aware Routing (SSAR), the performance of the node is not affected by
the not well-behaved nodes. First check the willingness of receiving node if it is ready then the
message with higher delivery probability in the network is transferred.When a node behave as a selfish
then forward the messages only to its community while a malicious node aims to break all the
C. Rukkumani and Dr. Krishna Mohanta
http://www.iaeme.com/IJCIET/index.asp 11 editor@iaeme.com
protocols of basic DTN routing functionality. A malicious node drops the packets and also performs
the trust related attacks:
• Self-promoting attacks: To attract other packets in the network its increase own importance by
providing good credits or recommendations for itself.
• Bad-monitoring attacks: It decreases the probability of packet routing through good nodes by providing
bad recommendations and its ruin the reputation of well-behaved nodes.
• Ballot stuffing: It increase the probability of packet transfer through malicious node by proving good
recommendations to the bad nodes, it increase the reputation of not well-behaved nodes. A malicious
node attacker performs random attacks to evade detection. We introduce a new random attack
probability to reflect random attack behavior. When random attack probability is equal to 1, the
malicious attacker is a reckless attacker, when random attack probability is less than 1 it is a random
attacker. The node trust value is directly accessed by the trust evaluation and indirect trust value by
recommendations. Upon the encounter process the one node trust is depend upon other.
Trust protocol is independently run by each node. Most of the detection scheme [14] focuses on
the detection of node. However after detection how their behavior can change and how they can be
motivated to avoid such malicious behavior haven’t been explained anywhere. We have also focused
on the scenario when an honestly behaved node changes it’s behavior then how it’s should be
motivated to do honest behaviour.
4. CONCLUSION
In this paper, we first classified the selfish behavior in DTNs and then existing strategies for
preventing selfish behavior. We subsequently analyzed the mechanisms and explored techniques of
the proposed strategies. Further, we pointed out the problems in previous technique. The previous
strategy cannot work in an environment in which the node saves a high probability of being selfish to
other nodes. But, we conducted an experiment to investigate the performance of the representative
strategies in each category. The results of our experiment illustrate that the performance of proposed
strategies outperforms the previous technique.
REFERENCES
[1] "The ns-3 Network Simulator," Nov. 2011, http://www.nsnam.org/.
[2] E. Ayday, H. Lee, and F. Fekri, “Trust Management and Adversary Detection for Delay Tolerant
Networks,” in Military Communications Conference, 2010, pp. 1788-1793.
[3] E. Ayday, H. Lee, and F. Fekri, “An Iterative Algorithm for Trust Management and Adversary
Detection for Delay Tolerant Networks,” IEEE Transactions on Mobile Computing,
DOI:10.1109/TMC.2011.160, online avaiable, 2011.
[4] E. Bulut, Z. Wang, and B. Szymanski, “Cost Effective Multi-Period Spraying for Routing in Delay
Tolerant Networks,” IEEE/ACM Transactions on Networking, vol. 18, no. 5, 2010, pp. 1530-1543.
[5] E. Bulut, Z. Wang, and B. K. Szymanski, “Impact of Social Networks on Delay Tolerant Routing,”
in IEEE Global Telecommunications Conference, Honolulu, HI, Nov. 2009, pp. 1-6.
[6] J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine, “Maxprop: Routing for Vehicle-Based
Disruption-Tolerant Networking,” in IEEE Conference on Computer Communications, Barcelona,
Spain, April 2006, pp. 1-11.
[7] V. Cerf, S. Burleigh, A. Hooke, L. Torgerson, R. Durst, K. Scott, K.Fall, and H. Weiss, "Delay-
Tolerant Networking Architecture," RFC 4838, IETF, 2007.
[8] M. Chang, I.-R. Chen, F. Bao, and J.-H. Cho, “Trust-Threshold Based Routing in Delay Tolerant
Networks,” in 5th IFIP International Conference on Trust Management, Copenhagen,Denmark,
June 2011, pp. 265-276.
Trust Management for Delay Tolerant Network
http://www.iaeme.com/IJCIET/index.asp 12 editor@iaeme.com
[9] I.-R. Chen, F. Bao, M. Chang, and J.-H. Cho, “Trust Management for Encounter-Based Routing in
Delay Tolerant Networks,” in IEEE Global Communications Conference, Miami, Florida, USA,
Dec.2010, pp. 1-6.
[10] E. M. Daly, and M. Haahr, “Social Network Analysis for Information Flow in Disconnected Delay-
Tolerant MANETs,” IEEE Transactions on Mobile Computing, vol. 8, no. 5, May 2009, pp.606-
621.
[11] G. Dini, and A. L. Duca, “A Reputation-Based Approach to Tolerate Misbehaving Carriers in
Delay Tolerant Networks,” in 15th IEEE Symposium on Computers and Communications,
Riccione, Italy,June 2010, pp. 772-777.
[12] F. Li, J. Wu, and A. Srinivasan, “Thwarting Blackhole Attacks in Disruption-Tolerant Networks
using Encounter Tickets,” in IEEE Conference on Computer Communications, 2009, pp. 2428-
2436.
[13] Priti Bhardwaj and Rahul Johari, Routing in Delay Tolerant Network Using Genetic Algorithm.
International Journal of Computer Engineering and Technology (IJCET), 4(2), 2013, pp. 590–597.
[14] M V Rathnamma and Dr. P. Chenna Reddy, Trust Management Scheme for AD-HOC Networks
Using a Social Network Based Approach for Secure Routing. International Journal of Computer
Engineering and Technology (IJCET), 4(3), 2013, pp. 359–369.

More Related Content

What's hot

Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...ijasuc
 
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...inventionjournals
 
Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...
Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...
Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...IJECEIAES
 
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED  ON FEEDBACK CORRELATIONSA MALICIOUS USERS DETECTING MODEL BASED  ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONSIJCNC
 
Efficient radio resource allocation scheme for 5G networks with device-to-devi...
Efficient radio resource allocation scheme for 5G networks with device-to-devi...Efficient radio resource allocation scheme for 5G networks with device-to-devi...
Efficient radio resource allocation scheme for 5G networks with device-to-devi...IJECEIAES
 
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsDesign and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsijsrd.com
 
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSOPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSijasuc
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkijwmn
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc Networks
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc NetworksRouting and Security Issues for Trust Based Framework in Mobile Ad Hoc Networks
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc Networksiosrjce
 
A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...IAEME Publication
 
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLSDATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLSijasuc
 
Improving Network Security in MANETS using IEEACK
Improving Network Security in MANETS using IEEACKImproving Network Security in MANETS using IEEACK
Improving Network Security in MANETS using IEEACKijsrd.com
 

What's hot (14)

Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
 
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
 
Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...
Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...
Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...
 
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED  ON FEEDBACK CORRELATIONSA MALICIOUS USERS DETECTING MODEL BASED  ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS
 
Efficient radio resource allocation scheme for 5G networks with device-to-devi...
Efficient radio resource allocation scheme for 5G networks with device-to-devi...Efficient radio resource allocation scheme for 5G networks with device-to-devi...
Efficient radio resource allocation scheme for 5G networks with device-to-devi...
 
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsDesign and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
 
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSOPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc Networks
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc NetworksRouting and Security Issues for Trust Based Framework in Mobile Ad Hoc Networks
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc Networks
 
A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...
 
Ns2422412247
Ns2422412247Ns2422412247
Ns2422412247
 
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLSDATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
 
Improving Network Security in MANETS using IEEACK
Improving Network Security in MANETS using IEEACKImproving Network Security in MANETS using IEEACK
Improving Network Security in MANETS using IEEACK
 

Viewers also liked

Delay Tolerant Network - Journal
Delay Tolerant Network - JournalDelay Tolerant Network - Journal
Delay Tolerant Network - JournalLaili Aidi
 
CRITICAL ANALYSIS OF THE METHODOLOGY ADOPTED BY CERTAIN CAMEROONIAN STUDIES ...
 CRITICAL ANALYSIS OF THE METHODOLOGY ADOPTED BY CERTAIN CAMEROONIAN STUDIES ... CRITICAL ANALYSIS OF THE METHODOLOGY ADOPTED BY CERTAIN CAMEROONIAN STUDIES ...
CRITICAL ANALYSIS OF THE METHODOLOGY ADOPTED BY CERTAIN CAMEROONIAN STUDIES ...IAEME Publication
 
A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING
A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING
A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING IAEME Publication
 
DETERMINATION OF NET FLOWS INTO ALMATTI RESERVOIR FROM CWC GAUGE DATA AND RES...
DETERMINATION OF NET FLOWS INTO ALMATTI RESERVOIR FROM CWC GAUGE DATA AND RES...DETERMINATION OF NET FLOWS INTO ALMATTI RESERVOIR FROM CWC GAUGE DATA AND RES...
DETERMINATION OF NET FLOWS INTO ALMATTI RESERVOIR FROM CWC GAUGE DATA AND RES...IAEME Publication
 
EXPERIMENTAL VERIFICATION OF MULTIPLE CORRELATIONS BETWEEN THE SOIL YOUNG MOD...
EXPERIMENTAL VERIFICATION OF MULTIPLE CORRELATIONS BETWEEN THE SOIL YOUNG MOD...EXPERIMENTAL VERIFICATION OF MULTIPLE CORRELATIONS BETWEEN THE SOIL YOUNG MOD...
EXPERIMENTAL VERIFICATION OF MULTIPLE CORRELATIONS BETWEEN THE SOIL YOUNG MOD...IAEME Publication
 
A STUDY OF VARIOUS FACTORS AFFECTING CONTRACTOR’S PERFORMANCE IN LOWEST BID...
  A STUDY OF VARIOUS FACTORS AFFECTING CONTRACTOR’S PERFORMANCE IN LOWEST BID...  A STUDY OF VARIOUS FACTORS AFFECTING CONTRACTOR’S PERFORMANCE IN LOWEST BID...
A STUDY OF VARIOUS FACTORS AFFECTING CONTRACTOR’S PERFORMANCE IN LOWEST BID...IAEME Publication
 
STUDY OF FEASIBILITY FOR ADOPTING TOUCHLESS FAUCETS, LOW FLOW AERATORS AND SE...
STUDY OF FEASIBILITY FOR ADOPTING TOUCHLESS FAUCETS, LOW FLOW AERATORS AND SE...STUDY OF FEASIBILITY FOR ADOPTING TOUCHLESS FAUCETS, LOW FLOW AERATORS AND SE...
STUDY OF FEASIBILITY FOR ADOPTING TOUCHLESS FAUCETS, LOW FLOW AERATORS AND SE...IAEME Publication
 
Delay Tolerant Network - Presentation
Delay Tolerant Network - PresentationDelay Tolerant Network - Presentation
Delay Tolerant Network - PresentationLaili Aidi
 
Delay tolerant network routing protocol a comprehensive survey with hybrid...
Delay tolerant network routing protocol    a comprehensive survey with hybrid...Delay tolerant network routing protocol    a comprehensive survey with hybrid...
Delay tolerant network routing protocol a comprehensive survey with hybrid...eSAT Journals
 
Delay Tolerant Network
Delay Tolerant NetworkDelay Tolerant Network
Delay Tolerant NetworkMichel Chamat
 
COMPARATIVE EMISSION ANALYSIS OF CNG AND OCTANE IN RETROFITTED CAR ENGINES
COMPARATIVE EMISSION ANALYSIS OF CNG AND OCTANE IN RETROFITTED CAR ENGINESCOMPARATIVE EMISSION ANALYSIS OF CNG AND OCTANE IN RETROFITTED CAR ENGINES
COMPARATIVE EMISSION ANALYSIS OF CNG AND OCTANE IN RETROFITTED CAR ENGINESIAEME Publication
 
ANALYTICAL TOOL FOR ANALYSING SLAGGING CHARACTERISTIC OF HIGH ASH COALS IN UT...
ANALYTICAL TOOL FOR ANALYSING SLAGGING CHARACTERISTIC OF HIGH ASH COALS IN UT...ANALYTICAL TOOL FOR ANALYSING SLAGGING CHARACTERISTIC OF HIGH ASH COALS IN UT...
ANALYTICAL TOOL FOR ANALYSING SLAGGING CHARACTERISTIC OF HIGH ASH COALS IN UT...IAEME Publication
 
PERFORMANCE OF 3-D POLAR WEAVE CARBON-CARBON COMPOSITES IN HIGH THERMAL EROSI...
PERFORMANCE OF 3-D POLAR WEAVE CARBON-CARBON COMPOSITES IN HIGH THERMAL EROSI...PERFORMANCE OF 3-D POLAR WEAVE CARBON-CARBON COMPOSITES IN HIGH THERMAL EROSI...
PERFORMANCE OF 3-D POLAR WEAVE CARBON-CARBON COMPOSITES IN HIGH THERMAL EROSI...IAEME Publication
 
EFFECT OF SURFACE ROUGHNESS ON CHARACTERISTICS OF SQUEEZE FILM BETWEEN POROUS...
EFFECT OF SURFACE ROUGHNESS ON CHARACTERISTICS OF SQUEEZE FILM BETWEEN POROUS...EFFECT OF SURFACE ROUGHNESS ON CHARACTERISTICS OF SQUEEZE FILM BETWEEN POROUS...
EFFECT OF SURFACE ROUGHNESS ON CHARACTERISTICS OF SQUEEZE FILM BETWEEN POROUS...IAEME Publication
 
COMBUSTION MONITORING THROUGH VIBRATIONAL DATA IN A TURBOCHARGED CITY CAR ENGINE
COMBUSTION MONITORING THROUGH VIBRATIONAL DATA IN A TURBOCHARGED CITY CAR ENGINECOMBUSTION MONITORING THROUGH VIBRATIONAL DATA IN A TURBOCHARGED CITY CAR ENGINE
COMBUSTION MONITORING THROUGH VIBRATIONAL DATA IN A TURBOCHARGED CITY CAR ENGINEIAEME Publication
 
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...Dr. Mazlan Abbas
 
DESIGN AND DEVELOPMENT OF SPECIAL PURPOSE MACHINE USING HYDROPNEUMATIC CYLIND...
DESIGN AND DEVELOPMENT OF SPECIAL PURPOSE MACHINE USING HYDROPNEUMATIC CYLIND...DESIGN AND DEVELOPMENT OF SPECIAL PURPOSE MACHINE USING HYDROPNEUMATIC CYLIND...
DESIGN AND DEVELOPMENT OF SPECIAL PURPOSE MACHINE USING HYDROPNEUMATIC CYLIND...IAEME Publication
 
QUALITY CONTROL AND SAFETY DURING CONSTRUCTIONIjmet 08 03_012
QUALITY CONTROL AND SAFETY DURING CONSTRUCTIONIjmet 08 03_012QUALITY CONTROL AND SAFETY DURING CONSTRUCTIONIjmet 08 03_012
QUALITY CONTROL AND SAFETY DURING CONSTRUCTIONIjmet 08 03_012IAEME Publication
 
COMPRESSIVE STRENGTH AND CARBONATION OF SEA WATER CURED BLENDED CONCRETE
COMPRESSIVE STRENGTH AND CARBONATION OF SEA WATER CURED BLENDED CONCRETE COMPRESSIVE STRENGTH AND CARBONATION OF SEA WATER CURED BLENDED CONCRETE
COMPRESSIVE STRENGTH AND CARBONATION OF SEA WATER CURED BLENDED CONCRETE IAEME Publication
 
COMPARATIVE EMISSION ANALYSIS OF CNG AND OCTANE IN RETROFITTED CAR ENGINES
COMPARATIVE EMISSION ANALYSIS OF CNG AND OCTANE IN RETROFITTED CAR ENGINESCOMPARATIVE EMISSION ANALYSIS OF CNG AND OCTANE IN RETROFITTED CAR ENGINES
COMPARATIVE EMISSION ANALYSIS OF CNG AND OCTANE IN RETROFITTED CAR ENGINESIAEME Publication
 

Viewers also liked (20)

Delay Tolerant Network - Journal
Delay Tolerant Network - JournalDelay Tolerant Network - Journal
Delay Tolerant Network - Journal
 
CRITICAL ANALYSIS OF THE METHODOLOGY ADOPTED BY CERTAIN CAMEROONIAN STUDIES ...
 CRITICAL ANALYSIS OF THE METHODOLOGY ADOPTED BY CERTAIN CAMEROONIAN STUDIES ... CRITICAL ANALYSIS OF THE METHODOLOGY ADOPTED BY CERTAIN CAMEROONIAN STUDIES ...
CRITICAL ANALYSIS OF THE METHODOLOGY ADOPTED BY CERTAIN CAMEROONIAN STUDIES ...
 
A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING
A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING
A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING
 
DETERMINATION OF NET FLOWS INTO ALMATTI RESERVOIR FROM CWC GAUGE DATA AND RES...
DETERMINATION OF NET FLOWS INTO ALMATTI RESERVOIR FROM CWC GAUGE DATA AND RES...DETERMINATION OF NET FLOWS INTO ALMATTI RESERVOIR FROM CWC GAUGE DATA AND RES...
DETERMINATION OF NET FLOWS INTO ALMATTI RESERVOIR FROM CWC GAUGE DATA AND RES...
 
EXPERIMENTAL VERIFICATION OF MULTIPLE CORRELATIONS BETWEEN THE SOIL YOUNG MOD...
EXPERIMENTAL VERIFICATION OF MULTIPLE CORRELATIONS BETWEEN THE SOIL YOUNG MOD...EXPERIMENTAL VERIFICATION OF MULTIPLE CORRELATIONS BETWEEN THE SOIL YOUNG MOD...
EXPERIMENTAL VERIFICATION OF MULTIPLE CORRELATIONS BETWEEN THE SOIL YOUNG MOD...
 
A STUDY OF VARIOUS FACTORS AFFECTING CONTRACTOR’S PERFORMANCE IN LOWEST BID...
  A STUDY OF VARIOUS FACTORS AFFECTING CONTRACTOR’S PERFORMANCE IN LOWEST BID...  A STUDY OF VARIOUS FACTORS AFFECTING CONTRACTOR’S PERFORMANCE IN LOWEST BID...
A STUDY OF VARIOUS FACTORS AFFECTING CONTRACTOR’S PERFORMANCE IN LOWEST BID...
 
STUDY OF FEASIBILITY FOR ADOPTING TOUCHLESS FAUCETS, LOW FLOW AERATORS AND SE...
STUDY OF FEASIBILITY FOR ADOPTING TOUCHLESS FAUCETS, LOW FLOW AERATORS AND SE...STUDY OF FEASIBILITY FOR ADOPTING TOUCHLESS FAUCETS, LOW FLOW AERATORS AND SE...
STUDY OF FEASIBILITY FOR ADOPTING TOUCHLESS FAUCETS, LOW FLOW AERATORS AND SE...
 
Delay Tolerant Network - Presentation
Delay Tolerant Network - PresentationDelay Tolerant Network - Presentation
Delay Tolerant Network - Presentation
 
Delay tolerant network routing protocol a comprehensive survey with hybrid...
Delay tolerant network routing protocol    a comprehensive survey with hybrid...Delay tolerant network routing protocol    a comprehensive survey with hybrid...
Delay tolerant network routing protocol a comprehensive survey with hybrid...
 
Delay Tolerant Network
Delay Tolerant NetworkDelay Tolerant Network
Delay Tolerant Network
 
COMPARATIVE EMISSION ANALYSIS OF CNG AND OCTANE IN RETROFITTED CAR ENGINES
COMPARATIVE EMISSION ANALYSIS OF CNG AND OCTANE IN RETROFITTED CAR ENGINESCOMPARATIVE EMISSION ANALYSIS OF CNG AND OCTANE IN RETROFITTED CAR ENGINES
COMPARATIVE EMISSION ANALYSIS OF CNG AND OCTANE IN RETROFITTED CAR ENGINES
 
ANALYTICAL TOOL FOR ANALYSING SLAGGING CHARACTERISTIC OF HIGH ASH COALS IN UT...
ANALYTICAL TOOL FOR ANALYSING SLAGGING CHARACTERISTIC OF HIGH ASH COALS IN UT...ANALYTICAL TOOL FOR ANALYSING SLAGGING CHARACTERISTIC OF HIGH ASH COALS IN UT...
ANALYTICAL TOOL FOR ANALYSING SLAGGING CHARACTERISTIC OF HIGH ASH COALS IN UT...
 
PERFORMANCE OF 3-D POLAR WEAVE CARBON-CARBON COMPOSITES IN HIGH THERMAL EROSI...
PERFORMANCE OF 3-D POLAR WEAVE CARBON-CARBON COMPOSITES IN HIGH THERMAL EROSI...PERFORMANCE OF 3-D POLAR WEAVE CARBON-CARBON COMPOSITES IN HIGH THERMAL EROSI...
PERFORMANCE OF 3-D POLAR WEAVE CARBON-CARBON COMPOSITES IN HIGH THERMAL EROSI...
 
EFFECT OF SURFACE ROUGHNESS ON CHARACTERISTICS OF SQUEEZE FILM BETWEEN POROUS...
EFFECT OF SURFACE ROUGHNESS ON CHARACTERISTICS OF SQUEEZE FILM BETWEEN POROUS...EFFECT OF SURFACE ROUGHNESS ON CHARACTERISTICS OF SQUEEZE FILM BETWEEN POROUS...
EFFECT OF SURFACE ROUGHNESS ON CHARACTERISTICS OF SQUEEZE FILM BETWEEN POROUS...
 
COMBUSTION MONITORING THROUGH VIBRATIONAL DATA IN A TURBOCHARGED CITY CAR ENGINE
COMBUSTION MONITORING THROUGH VIBRATIONAL DATA IN A TURBOCHARGED CITY CAR ENGINECOMBUSTION MONITORING THROUGH VIBRATIONAL DATA IN A TURBOCHARGED CITY CAR ENGINE
COMBUSTION MONITORING THROUGH VIBRATIONAL DATA IN A TURBOCHARGED CITY CAR ENGINE
 
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...
 
DESIGN AND DEVELOPMENT OF SPECIAL PURPOSE MACHINE USING HYDROPNEUMATIC CYLIND...
DESIGN AND DEVELOPMENT OF SPECIAL PURPOSE MACHINE USING HYDROPNEUMATIC CYLIND...DESIGN AND DEVELOPMENT OF SPECIAL PURPOSE MACHINE USING HYDROPNEUMATIC CYLIND...
DESIGN AND DEVELOPMENT OF SPECIAL PURPOSE MACHINE USING HYDROPNEUMATIC CYLIND...
 
QUALITY CONTROL AND SAFETY DURING CONSTRUCTIONIjmet 08 03_012
QUALITY CONTROL AND SAFETY DURING CONSTRUCTIONIjmet 08 03_012QUALITY CONTROL AND SAFETY DURING CONSTRUCTIONIjmet 08 03_012
QUALITY CONTROL AND SAFETY DURING CONSTRUCTIONIjmet 08 03_012
 
COMPRESSIVE STRENGTH AND CARBONATION OF SEA WATER CURED BLENDED CONCRETE
COMPRESSIVE STRENGTH AND CARBONATION OF SEA WATER CURED BLENDED CONCRETE COMPRESSIVE STRENGTH AND CARBONATION OF SEA WATER CURED BLENDED CONCRETE
COMPRESSIVE STRENGTH AND CARBONATION OF SEA WATER CURED BLENDED CONCRETE
 
COMPARATIVE EMISSION ANALYSIS OF CNG AND OCTANE IN RETROFITTED CAR ENGINES
COMPARATIVE EMISSION ANALYSIS OF CNG AND OCTANE IN RETROFITTED CAR ENGINESCOMPARATIVE EMISSION ANALYSIS OF CNG AND OCTANE IN RETROFITTED CAR ENGINES
COMPARATIVE EMISSION ANALYSIS OF CNG AND OCTANE IN RETROFITTED CAR ENGINES
 

Similar to TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK

Proposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANETProposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANETIJAEMSJORNAL
 
ADHOCFTSIM: A Simulator of Fault Tolerence In the AD-HOC Networks
ADHOCFTSIM: A Simulator of Fault Tolerence In the AD-HOC NetworksADHOCFTSIM: A Simulator of Fault Tolerence In the AD-HOC Networks
ADHOCFTSIM: A Simulator of Fault Tolerence In the AD-HOC Networksijwmn
 
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...IRJET Journal
 
Enhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hocEnhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hoceSAT Publishing House
 
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...ijcsa
 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...CSCJournals
 
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...IOSR Journals
 
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...IAEME Publication
 
Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...
Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...
Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...IJECEIAES
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Alexander Decker
 
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...eSAT Journals
 
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachMitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachIJLT EMAS
 
Minimum Process Coordinated Checkpointing Scheme For Ad Hoc Networks
Minimum Process Coordinated Checkpointing Scheme For Ad Hoc Networks   Minimum Process Coordinated Checkpointing Scheme For Ad Hoc Networks
Minimum Process Coordinated Checkpointing Scheme For Ad Hoc Networks pijans
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”Alexander Decker
 

Similar to TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK (20)

Proposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANETProposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANET
 
ADHOCFTSIM: A Simulator of Fault Tolerence In the AD-HOC Networks
ADHOCFTSIM: A Simulator of Fault Tolerence In the AD-HOC NetworksADHOCFTSIM: A Simulator of Fault Tolerence In the AD-HOC Networks
ADHOCFTSIM: A Simulator of Fault Tolerence In the AD-HOC Networks
 
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
 
Enhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hocEnhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hoc
 
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...
 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
 
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
 
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
 
Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...
Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...
Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...
 
SDSFLF: fault localization framework for optical communication using softwar...
SDSFLF: fault localization framework for optical  communication using softwar...SDSFLF: fault localization framework for optical  communication using softwar...
SDSFLF: fault localization framework for optical communication using softwar...
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
 
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
 
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachMitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
 
40120140506010
4012014050601040120140506010
40120140506010
 
Minimum Process Coordinated Checkpointing Scheme For Ad Hoc Networks
Minimum Process Coordinated Checkpointing Scheme For Ad Hoc Networks   Minimum Process Coordinated Checkpointing Scheme For Ad Hoc Networks
Minimum Process Coordinated Checkpointing Scheme For Ad Hoc Networks
 
wormhole attacks in wireless networks
wormhole attacks in wireless networkswormhole attacks in wireless networks
wormhole attacks in wireless networks
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
 
Thesis on Mobile Ad-hoc Network (MANET)
Thesis on Mobile Ad-hoc Network (MANET) Thesis on Mobile Ad-hoc Network (MANET)
Thesis on Mobile Ad-hoc Network (MANET)
 
Opportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
Opportunistic Routing in Delay Tolerant Network with Different Routing AlgorithmOpportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
Opportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
 
Analytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANETAnalytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANET
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 

Recently uploaded (20)

9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 

TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK

  • 1. http://www.iaeme.com/IJCIET/index. International Journal of Civil Engineering and Technology (IJCIET) Volume 8, Issue 2, February 2017, pp. Available online at http://www.iaeme.com/IJCIET/issues. ISSN Print: 0976-6308 and ISSN Online: 0976 © IAEME Publication Scopus TRUST MANAGEMENT FOR Reasearch Shcholar, Bharath University, Chennai, Professor, Sri Ramanujar College of Engineering, Chennai ABSTRACT Delay Tolerant Networks (DTNs) have high end disconnection, and unreliable wireless connections. It does not mean a delay service instead DTNs provides a service where network imposes disruption or delay. It operates in networks with extremely limited resources such as memory size, CPU processing power etc. This paper presents an efficient trust managing mechanism for providing secure environment. The proposed dynamic trust management protocol uses a dynamic t overcomes the problems with time changing dynamic characteristics by dynamically updating the criteria in response to changing network conditions. This reduces overheads and increases the efficient use of routing network even in con update reduces the false detection probability of the malicious nodes. To show the effectiveness of the proposed system, a detailed simulation in the presence of selfish and malicious nodes is performed with ONE simulator. Finally a comparative analysis of our proposed routing with previous routing protocols is also performed. The results demonstrate that presented algorithm deals effectively with selfish behavior with providing significant gain on effective delive in trade off with message overhead and delay. Key words: Almatti, Netflows, CWC gauge data, Cite this Article: C. Rukkumani and Dr. Krishna Mohanta Tolerant Network. International Journal of Civil Engineering and Technology 08–12. http://www.iaeme.com/IJCIET/issues. 1. INTRODUCTION Wireless Delay Tolerant Network (DTNs) [1] is a new Networks class which is characteriz long message delay and lack of a fully connected path between the source and the target nodes. As a result, the use of mobile nodes acting as a buffer between the one to other end and behave as a store and forward approach. The message moves to a n messages reach their destinations. The message sending is an opportunistic procedure because the messages are sent in an opportunistic way. Because of its characteristics wide range of useful applications have been developed for DTNs and enable a new class of networking applications in the wireless network interface which increases popularity of mobile devices. DTNs can be used for IJCIET/index.asp 8 International Journal of Civil Engineering and Technology (IJCIET) 2017, pp. 08–12 Article ID: IJCIET_08_02_002 http://www.iaeme.com/IJCIET/issues.asp?JType=IJCIET&VType=8&IType=2 6308 and ISSN Online: 0976-6316 Scopus Indexed TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK C. Rukkumani Reasearch Shcholar, Bharath University, Chennai, India Dr. Krishna Mohanta Professor, Sri Ramanujar College of Engineering, Chennai, India Delay Tolerant Networks (DTNs) have high end-to-end latency, which is often faces disconnection, and unreliable wireless connections. It does not mean a delay service instead DTNs provides a service where network imposes disruption or delay. It operates in networks with extremely limited resources such as memory size, CPU processing power etc. This paper presents an efficient trust managing mechanism for providing secure environment. The proposed dynamic trust management protocol uses a dynamic threshold updating which overcomes the problems with time changing dynamic characteristics by dynamically updating the criteria in response to changing network conditions. This reduces overheads and increases the efficient use of routing network even in conditions change. Also the dynamic threshold update reduces the false detection probability of the malicious nodes. To show the effectiveness of the proposed system, a detailed simulation in the presence of selfish and malicious nodes is imulator. Finally a comparative analysis of our proposed routing with previous routing protocols is also performed. The results demonstrate that presented algorithm deals effectively with selfish behavior with providing significant gain on effective delive in trade off with message overhead and delay. atti, Netflows, CWC gauge data, working tables, Catchment C. Rukkumani and Dr. Krishna Mohanta, Trust Management for Delay International Journal of Civil Engineering and Technology http://www.iaeme.com/IJCIET/issues.asp?JType=IJCIET&VType=8&IType=2 Wireless Delay Tolerant Network (DTNs) [1] is a new Networks class which is characteriz long message delay and lack of a fully connected path between the source and the target nodes. As a result, the use of mobile nodes acting as a buffer between the one to other end and behave as a store and forward approach. The message moves to a new node when it appears in the range, similarly the messages reach their destinations. The message sending is an opportunistic procedure because the messages are sent in an opportunistic way. Because of its characteristics wide range of useful have been developed for DTNs and enable a new class of networking applications in the wireless network interface which increases popularity of mobile devices. DTNs can be used for editor@iaeme.com asp?JType=IJCIET&VType=8&IType=2 DELAY TOLERANT India , India end latency, which is often faces disconnection, and unreliable wireless connections. It does not mean a delay service instead DTNs provides a service where network imposes disruption or delay. It operates in challenged networks with extremely limited resources such as memory size, CPU processing power etc. This paper presents an efficient trust managing mechanism for providing secure environment. hreshold updating which overcomes the problems with time changing dynamic characteristics by dynamically updating the criteria in response to changing network conditions. This reduces overheads and increases ditions change. Also the dynamic threshold update reduces the false detection probability of the malicious nodes. To show the effectiveness of the proposed system, a detailed simulation in the presence of selfish and malicious nodes is imulator. Finally a comparative analysis of our proposed routing with previous routing protocols is also performed. The results demonstrate that presented algorithm deals effectively with selfish behavior with providing significant gain on effective delivery ratio working tables, Catchment Trust Management for Delay International Journal of Civil Engineering and Technology, 8(2), 2017, pp. asp?JType=IJCIET&VType=8&IType=2 Wireless Delay Tolerant Network (DTNs) [1] is a new Networks class which is characterized by a long message delay and lack of a fully connected path between the source and the target nodes. As a result, the use of mobile nodes acting as a buffer between the one to other end and behave as a store ew node when it appears in the range, similarly the messages reach their destinations. The message sending is an opportunistic procedure because the messages are sent in an opportunistic way. Because of its characteristics wide range of useful have been developed for DTNs and enable a new class of networking applications in the wireless network interface which increases popularity of mobile devices. DTNs can be used for
  • 2. C. Rukkumani and Dr. Krishna Mohanta http://www.iaeme.com/IJCIET/index.asp 9 editor@iaeme.com developing low-cost internet services on remote area moreover it can be used for vehicle DTNs for local advertising, location-based information collection such as traffic reports and parking information. However, the practical DTNs implementation is questionable because its characteristics making them vulnerable to serious security threats. In the system every node predicted that intermediate nodes (or vehicles) are relaying the message properly. However malicious node not carries the message properly in the network which causes multi-hop communications to fail and detection of their presence may be hard. DTNs relay carriers sharing which is the essential requirement, but this cannot be guarantee because selfish nodes can avoid participating for other messages. On other hand malicious node creates the black hole which carries out attacks by deliberately dropping messages. Overcome these attacks is a real challenge due to the connectivity and distributed nature of DTNs. DTN are resource constrained in nature to save its own resources and nodes may develop selfish behavior. In which its drop the packet of other nodes to maximize its own credit or benefits. Such nodes increase the message drop probability and reduce the message delivery rate. In this paper, we propose a dynamic trust based approach to protect network from black hole and selfish attacks. The rest of the paper is organized as follows: the second section provides a brief discussion of the most recent relative literatures of DTNs and the system model is defined in third section. The fourth section explains the proposed algorithm and the simulated results and the fifth section explain about conclusion and future work on the basis of the simulation results presented in fourth section. 2. LITERATURE REVIEW Since the security in the DTN has already an open issue hence this section presents a brief review of some of the recent and relevant literatures. E. Bulut [2] presented a study on DTNs in presence of malicious nodes (also known as compromised DTNs). The literature analyzes the effects of malicious nodes presence on routing in compromised DTNs. They also proposed a two period routing to achieving the required delivery ratio with limited packet lifetime in presence of malicious nodes. The variants of social psychology based approach is one of the commonly found and widely applied [3] [4] [11] [12] because of their similarity with structure of the DTNs. These methods works by checking social characteristics like locality, community and relations to decide packet forwarding or consider other characteristics such as selfishness, unwillingness to avoid packet forwarding. Most of the literature shows that these techniques can effectively improve the routing performance of DTN. A combined social psychology and game theory is presented in [3] [8] which utilize the game theory to find the solution and cause of the social misbehaving. A probabilistic technique for nodes misbehavior detection and efficient trust establishment named iTrust is proposed by Haojin Zhu [8]. The iTrust utilizes the Trust Authority (TA) to periodically check the nodes behavior by cost. Trust Authority is small in numbers because it is fixed and little bit costly, so availability of TA probability cannot be guaranteed if network size is large. Another common approach [11] is trust management which works by estimating the trust level of the nodes either by locally orglobally. Generally the trust is estimated by observing the packets in surrounding environment. Since the trust estimated by any node is shows its own criteria or vision and the major problem with such systems are false negative trust estimation because of nodes visibility, hence effective approaches are required to reduce the false detection. Geographic routing protocol is one of the recent approaches but they required special costly hardware such as GPS, directional antennas etc. Ing-Ray Chen [9] proposed and analyzes the trust management protocols for encounter based routing. They incorporated in quality-of-service (QoS) trust properties (connectivity) and social trust based properties (honesty and unselfishness) for trust evaluation in the routing protocol. In their literature review two different protocols, an equal-weight QoS, social trust based management protocol and a QoS only trust management protocol are considered. A Credit Based Incentive System is proposed in [5], which allows the routing protocol to search the most efficient routes, with incentive considerations, hence protect against behavior of purposely waste transfer opportunity and unfairly increased rewards of selfish nodes. The algorithm also provides
  • 3. Trust Management for Delay Tolerant Network http://www.iaeme.com/IJCIET/index.asp 10 editor@iaeme.com different incentive mechanisms to effectively handle different properties. A secure data forwarding scheme is presented by Mohamed Elsalih Mahmoud [6], they named it SATS. The SATS uses credits to measure the node’s cooperation in forwarding other node’s messages and to maintain fairness. It also utilizes a trust system to assign a specific trust value to each node. A node’s trust value indicates that how actively it forwards other’s messages. The nodes with high trust values are preferable in data forwarding to avoid the attackers that are not participating in routing process. The SATS forces nodes for cooperation to only earn trust but also maintain it at higher values. Haojin Zhu [7] proposed a multilayer credit based incentive technique, to encourage forwarding cooperation among DTN nodes. The scheme has feature to operate in a fully distributed manner to defend various attacks without depending upon any specialized hardware. The performance of proposed method is further increased by different optimization techniques by exploiting the unique characteristics of DTNs. 3. SYSTEM MODEL In the present work we consider the DTN environment without any centralized trusted authority (TA). Nodes are able to use multi hops communication. Node exchanges the information on encounters with another node. 3.1. System Behavior and Model The system behavior of the node is defined as the unwillingness of node in participation of its resources on others requirement, this is generally done to maintain its limited resources such as power. Since DTNs required participation of all nodes in packet relaying this could cause severe degradation of the performance. They considered selfish nodes acts for its own interests, so to save energy it just drop the packet but it may decide to forward a message with a certain probability. Two kind of selfishness: 1. Individual Selfishness: Here node forwards only those packets which are generated by it and drop packets from other node. 2. Social Selfishness: Here nodes are willing to forward packets for other nodes with whom they have social connect but not others and such willingness varies with the strength.Strategies [13] for prevention of selfishness are as follows: 1. Barter Based 2. Credit Based 3. Reputation Based Barter Based is pair wise Tit-For-Tat strategy. The procedure is that two encounter nodes exchange the equal value of messages. A message in which the nodes are interested is called primary message and other are secondary messages, hence it degrades the performance of nodes drastically. Credit Based strategy are cooperative to forward the messages, the idea is to gets certain amount of credit as a reward that it can later explore for its own profit. Credit Based are generally of two types: Message Purse Model and Message Trade Model. In Message Purse Model source node pay credits to the intermediate nodes which are involve in forward the messages to the destination. In Message Trade Model the sender of the message pay credits to receivers in each hop-by-hop transmission until the message reach the destination, which finally pays credits for the message forwarding. Reputation Based strategy based upon cooperative experiences and observation of its past activities. If the reputation value of a node is less, it reflects that the node is selfish according to other nodes, otherwise Cooperative nature to the nodes. Each intermediate node receives a reputation value after pass a message to other nodes. The reputation value is a proof about the cooperative nature of the intermediate node. Reputation Based are generally of two types: Detection Based Model and Without Detection Based Model. In Detection Based every node detects the behaviour of the receiver which receives the message from him, in order to monitor the selfishness and encourage them to be cooperative in nature. In reputation the node is punished if it is not cooperate in nature. Reputation is also used in Social Selfishness Aware Routing (SSAR), the performance of the node is not affected by the not well-behaved nodes. First check the willingness of receiving node if it is ready then the message with higher delivery probability in the network is transferred.When a node behave as a selfish then forward the messages only to its community while a malicious node aims to break all the
  • 4. C. Rukkumani and Dr. Krishna Mohanta http://www.iaeme.com/IJCIET/index.asp 11 editor@iaeme.com protocols of basic DTN routing functionality. A malicious node drops the packets and also performs the trust related attacks: • Self-promoting attacks: To attract other packets in the network its increase own importance by providing good credits or recommendations for itself. • Bad-monitoring attacks: It decreases the probability of packet routing through good nodes by providing bad recommendations and its ruin the reputation of well-behaved nodes. • Ballot stuffing: It increase the probability of packet transfer through malicious node by proving good recommendations to the bad nodes, it increase the reputation of not well-behaved nodes. A malicious node attacker performs random attacks to evade detection. We introduce a new random attack probability to reflect random attack behavior. When random attack probability is equal to 1, the malicious attacker is a reckless attacker, when random attack probability is less than 1 it is a random attacker. The node trust value is directly accessed by the trust evaluation and indirect trust value by recommendations. Upon the encounter process the one node trust is depend upon other. Trust protocol is independently run by each node. Most of the detection scheme [14] focuses on the detection of node. However after detection how their behavior can change and how they can be motivated to avoid such malicious behavior haven’t been explained anywhere. We have also focused on the scenario when an honestly behaved node changes it’s behavior then how it’s should be motivated to do honest behaviour. 4. CONCLUSION In this paper, we first classified the selfish behavior in DTNs and then existing strategies for preventing selfish behavior. We subsequently analyzed the mechanisms and explored techniques of the proposed strategies. Further, we pointed out the problems in previous technique. The previous strategy cannot work in an environment in which the node saves a high probability of being selfish to other nodes. But, we conducted an experiment to investigate the performance of the representative strategies in each category. The results of our experiment illustrate that the performance of proposed strategies outperforms the previous technique. REFERENCES [1] "The ns-3 Network Simulator," Nov. 2011, http://www.nsnam.org/. [2] E. Ayday, H. Lee, and F. Fekri, “Trust Management and Adversary Detection for Delay Tolerant Networks,” in Military Communications Conference, 2010, pp. 1788-1793. [3] E. Ayday, H. Lee, and F. Fekri, “An Iterative Algorithm for Trust Management and Adversary Detection for Delay Tolerant Networks,” IEEE Transactions on Mobile Computing, DOI:10.1109/TMC.2011.160, online avaiable, 2011. [4] E. Bulut, Z. Wang, and B. Szymanski, “Cost Effective Multi-Period Spraying for Routing in Delay Tolerant Networks,” IEEE/ACM Transactions on Networking, vol. 18, no. 5, 2010, pp. 1530-1543. [5] E. Bulut, Z. Wang, and B. K. Szymanski, “Impact of Social Networks on Delay Tolerant Routing,” in IEEE Global Telecommunications Conference, Honolulu, HI, Nov. 2009, pp. 1-6. [6] J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine, “Maxprop: Routing for Vehicle-Based Disruption-Tolerant Networking,” in IEEE Conference on Computer Communications, Barcelona, Spain, April 2006, pp. 1-11. [7] V. Cerf, S. Burleigh, A. Hooke, L. Torgerson, R. Durst, K. Scott, K.Fall, and H. Weiss, "Delay- Tolerant Networking Architecture," RFC 4838, IETF, 2007. [8] M. Chang, I.-R. Chen, F. Bao, and J.-H. Cho, “Trust-Threshold Based Routing in Delay Tolerant Networks,” in 5th IFIP International Conference on Trust Management, Copenhagen,Denmark, June 2011, pp. 265-276.
  • 5. Trust Management for Delay Tolerant Network http://www.iaeme.com/IJCIET/index.asp 12 editor@iaeme.com [9] I.-R. Chen, F. Bao, M. Chang, and J.-H. Cho, “Trust Management for Encounter-Based Routing in Delay Tolerant Networks,” in IEEE Global Communications Conference, Miami, Florida, USA, Dec.2010, pp. 1-6. [10] E. M. Daly, and M. Haahr, “Social Network Analysis for Information Flow in Disconnected Delay- Tolerant MANETs,” IEEE Transactions on Mobile Computing, vol. 8, no. 5, May 2009, pp.606- 621. [11] G. Dini, and A. L. Duca, “A Reputation-Based Approach to Tolerate Misbehaving Carriers in Delay Tolerant Networks,” in 15th IEEE Symposium on Computers and Communications, Riccione, Italy,June 2010, pp. 772-777. [12] F. Li, J. Wu, and A. Srinivasan, “Thwarting Blackhole Attacks in Disruption-Tolerant Networks using Encounter Tickets,” in IEEE Conference on Computer Communications, 2009, pp. 2428- 2436. [13] Priti Bhardwaj and Rahul Johari, Routing in Delay Tolerant Network Using Genetic Algorithm. International Journal of Computer Engineering and Technology (IJCET), 4(2), 2013, pp. 590–597. [14] M V Rathnamma and Dr. P. Chenna Reddy, Trust Management Scheme for AD-HOC Networks Using a Social Network Based Approach for Secure Routing. International Journal of Computer Engineering and Technology (IJCET), 4(3), 2013, pp. 359–369.