Congestion Control Network Coding Scheme in Delay-Tolerant Network

  • Uroosa ZaidiEmail author
  • Praneet SaurabhEmail author
  • Ritu Prasad
  • Pradeep Mewada
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 904)


Delay-tolerant network (DTN) allows nodes to follow, store, and forward packets through different delivery mechanisms. These data bundles are created by sender to send data to multiple destinations. DTN supports multicast approach for communication. DTN enables the capability of transmission that involves long interruption, wait, and interoperable communications among these networks. Congestion in wireless network remains a challenging issue as enhancing the available bandwidth of network is not possible. Multicast communication in DTN network might be an intricate subject because nodes generously move within the surroundings that often become insecure due to the absence of centralized architecture. This paper proposes a network-coding-based congestion control scheme for delay-tolerant network communication (NCCCS-DTN). NCCCS-DTN using network coding functions is better than its state of the art (CASPaR). The proposed NCCCS-DTN reduces the bandwidth consumption and also lowers load on the link. NCCCS-DTN approach provides best route and also utilizes bandwidth and offers efficient congestion-free communication.


Congestion Bundles Routing Network coding Delay-tolerant network 


  1. 1.
    Zhu, H., Du, S., Gao, Z., Dong, M., Cao, Z.: A probabilistic misbehavior detection scheme toward efficient trust establishment in delay- tolerant networks. IEEE Trans. Parallel Distrib. Syst. 25(1), 22–32 (2014)CrossRefGoogle Scholar
  2. 2.
    Wei, K., Liang, X., Xu, K.: A survey of social-aware routing protocols in delay tolerant networks: applications, taxonomy and design-related issues. IEEE Commun. Surv. Tutor. 16(1), First (2014) 556–578Google Scholar
  3. 3.
    Burgess, J., Gallagher, G., Jensen, D.: MaxProp: routing for vehicle- based disruption tolerant networking. In: IEEE INFOCOM (April, 2006)Google Scholar
  4. 4.
    Burleigh, S., Jennings, E., Schoolcraft, J.: Autonomous congestion control in delay-tolerant networks. In: American Institute of Aeronautics and Astronautics (2007)Google Scholar
  5. 5.
    Wei, K., Guo, S., Zeng, D., Xu, K.: A multi-attribute decision making approach to congestion control in delay tolerant networks. In: IEEE Mobile and Wireless Networking Symposium, pp. 2742–2747 (2014)Google Scholar
  6. 6.
    Santiago, J., Casaca, A., Pereira, R.P.: Multicast in delay tolerant networks using probabilities and mobility information. Ad Hoc Sens. Wirel. Netw. 7(1–2), 51–68 (2009)Google Scholar
  7. 7.
    Zhao, W., Ammar, M., Zegura, E.: Multicasting in delay tolerant networks: semantic models and routing algorithms. In: Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking, pp. 268–275. ACM, New York (2005)Google Scholar
  8. 8.
    Wei, K., Guo, S., Zeng, D., Xu, K.: A multi attribute decision making approach to congestion control in delay tolerant networks. In: IEEE ICC 2014—Mobile and Wireless Networking Symposium, pp. 2742–2747 (2014)Google Scholar
  9. 9.
    Hur, J., Kang, K.: Secure data retrieval for decentralized disruption-tolerant military networks. IEEE/ACM Trans. Netw. 22(1), 16–26 (2014)CrossRefGoogle Scholar
  10. 10.
    Fall, K.: A delay tolerant network architecture for challenged internets. In: Proceedings of SIGCOMM ’03, pp. 27–34 (2003)Google Scholar
  11. 11.
    Wan, L., Liu, F., Chen, Y., Zhang, H.: Routing protocols for delay tolerant networks: survey and performance evaluation. Int. J. Wirel. Mob. Netw. (IJWMN) 7(3), 5–69 (2015)Google Scholar
  12. 12.
    Burgess, J., Bissias, G., Corner, M.D., Levine, B.: Surviving attacks on disruption-tolerant networks without authentication. In: Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing, pp. 61–70 (2007)Google Scholar
  13. 13.
    Stewart, F., Kannan, R., Dvir, A., Krishnamachari, B.: CASPaR: congestion avoidance shortest path routing for delay tolerant networks. IEEE Int. Conf. Comput., Netw. Commun., Wirel. Ad Hoc Sens. Netw. pp. 1–5 (2016)Google Scholar
  14. 14.
    Saurabh, P., Verma, B.: An efficient proactive artificial immune system based anomaly detection and prevention system. Expert. Syst. Appl. 60, 311–320 (2016)CrossRefGoogle Scholar
  15. 15.
    Saurabh, P., Verma, B, Sharma, S.: An immunity inspired anomaly detection system: a general framework a general framework. In: Proceedings of Seventh International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA 2012) vol 202 of the series Advances in Intelligent Systems and Computing, pp. 417–428. Springer, Berlin (2012)Google Scholar
  16. 16.
    Saurabh, P., Verma, B., Sharma, S.: Biologically inspired computer security system: the way ahead. Recent. Trends Comput. Netw. Distrib. Syst., Secur. Commun. Comput. Inf. Sci. 335, 474–484 (2011)Google Scholar
  17. 17.
    Saurabh, P., Verma, B.: Immunity inspired cooperative agent based security system. Int. Arab J. Inf. Technol. 15(2), 289–295 (2018)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Technocrats Institute of Technology AdvanceBhopalIndia
  2. 2.Technocrats Institute of TechnologyBhopalIndia

Personalised recommendations