Advertisement

New Classification of Nodes Cooperation in Delay Tolerant Networks

  • Salah Eddine LoudariEmail author
  • Maria Benamar
  • Nabil Benamar
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 366)

Abstract

Delay and Disruptive Tolerant Networks (DTNs) is a concept related to environments characterized by very long delay paths and frequent network disruptions. DTN is nowadays a recognized area in networking and communications research, due to its suitability and practical experiences with mobile ad-hoc networks especially in situations where continuous end-to-end paths may not be always guaranteed. In DTNs, nodes store carry and forward messages, called bundles, to other nodes. The forwarding mechanism can occur opportunistically. However, some nodes may show some selfish or malicious behavior, which leads to less cooperation in the network. Thus, one of the main challenges in DTN is to ensure the security and confidentiality within the Network and assure cooperation among nodes. In this paper, we classify some of the threats that have been considered and treated by researchers in the field of DTN, and we propose a new classification based on the degree of cooperation of nodes. We describe different incentive mechanisms used to enhance cooperation among nodes in DTN environment focusing on the strengths of these mechanisms and also their limitations and drawbacks.

Keywords

Delay Tolerant Networks Cooperation Bundle 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Scott, K., Burleigh, S.: Bundle Protocol Specification. RFC 5050, November 2007Google Scholar
  2. 2.
    Pereira, P.R., Casaca, A., Rodrigues, J.J., Soares, V.N., Triay, J., Cervelló-Pastor, C.: From Delay-Tolerant Networks to Vehicular Delay-Tolerant Networks. IEEE Commun. Surveys Tuts. PP(99), 1–17 (2011)Google Scholar
  3. 3.
    Burleigh, S., Hooke, A., Torgerson, L., Durst, B., Scott, K., Corporation, T.M.: Delay-Tolerant Networking : An Approach to Interplanetary Internet. IEEE Communications Magazine, 128–136 (2003)CrossRefGoogle Scholar
  4. 4.
    Voyiatzis, A.G.: A Survey of Delay- and Disruption-Tolerant Networking Applications. Journal of Internet Engineering 5(1), 331–344 (2012)Google Scholar
  5. 5.
    Partan, J., Kurose, J., Levine, B.N.: A survey of practical issues in underwater networks. In: Proc. 1st ACM Int. Work. Underw. networks - WUWNet 2006, p. 17 (2006)Google Scholar
  6. 6.
    Juang, P., Oki, H., Wang, Y.: Energy-Efficient Computing for Wildlife Tracking: Design Tradeoffs and Early Experiences with ZebraNet. In: Proc. ASPLOS, October 2002CrossRefGoogle Scholar
  7. 7.
    Krishnan, R., Basu, P., Mikkelson, J.M., Small, C., Ramanathan, R., Brown, D.W., Burgess, J.R., Caro, A.L., Condell, M., Goffee, N.C., Hain, R.R., Hansen, R.E., Jones, C.E., Kawadia, V., Mankins, D.P., Schwartz, B.I., Strayer, W.T., Ward, J.W., Wiggins, D.P., Polit, S.H.: The SPINDLE disruption-tolerant networking system. In: MILCOM 2007 - IEEE Mil. Commun. Conf., pp. 1–7, October 2007Google Scholar
  8. 8.
  9. 9.
    Benamar, N., Singh, K.D., Benamar, M., Bonnin, J., El Ouadghiri, D.: Routing protocols in Vehicular Delay Tolerant Networksm: A comprehensive survey. Computer Communication (Com Com) 48, 141–158 (2014)CrossRefGoogle Scholar
  10. 10.
    Benamar, N., Benamar, M., Bonnin, J.M.: Routing protocols for DTN in vehicular environment. In: 2012 International Conference on Multimedia Computing and Systems (ICMCS), pp. 589–593, May 10–12, 2012Google Scholar
  11. 11.
    Benamar, N., Benamar, M., Ahnana, S., Saiyari, F.Z., el Ouadghiri, M.D., Bonnin, J.-M.: Are VDTN routing protocols suitable for data collection in smart cities: a performance assessment. J. Theor. Appl. Inf. Technol. 58(3), 589–600 (2013)Google Scholar
  12. 12.
    Benamar, M., Ahnana, S., Saiyari, F.Z., Benamar, N., El Ouadghiri, M.D., Bonnin, J.-M.: Study of VDTN routing protocols performances in sparse and dense traffic in the presence of relay nodes. J. Mob. Multimedia 10(1&2), 78–93 (2014)Google Scholar
  13. 13.
    Benamar, M., Benamar, N., Singh, K.D., El Ouadghiri, D.: Recent study of routing protocols in VANET: survey and taxonomy. In: WVNT 2013: 1st International Workshop on Vehicular Networks and Telematics, May 2013, Marrakech, Morocco (2013)Google Scholar
  14. 14.
  15. 15.
    Guo, S., Falaki, M.H., Oliver, E.A., Rahman, S.U., Seth, A., Zaharia, M.A., Keshav, S.: Very Low-Cost Internet Access Using KioskNet. ACM Computer Communication Review, October 2007Google Scholar
  16. 16.
  17. 17.
    Ivancic, W.D.: Security analysis of DTN architecture and bundle protocol specification for space-based networks. In: 2010 IEEE Aerosp. Conf., pp. 1–12, March 2010Google Scholar
  18. 18.
    DTN Research Group - www.dtnrg.org/
  19. 19.
    Prabhakar, T.V., Nambi Sn, A.U., Jamadagni, H.S., Swaroop, K., Prasad, R.V., Niemegeers, I.G.M.M.: A novel DTN based energy neutral transfer scheme for energy harvested WSN Gateways. ACM SIGMETRICS Perform. Eval. Rev. 38(3), 71 (2011)CrossRefGoogle Scholar
  20. 20.
    Ardra, P.S.: A Survey On Detection And Mitigation Of Misbehavior In Disruption Tolerant Networks, vol. 2, pp. 656–660, December 2012Google Scholar
  21. 21.
    Ansa, G., Cruickshank, H., Sun, Z.: A proactive DOS filter mechanism for delay tolerant networks. In: ICST PSATS, Conference, Malaga, Spain, February 2011Google Scholar
  22. 22.
    Jain, S.: Black Hole Attack in Delay Tolerant Networks: A Survey, no. 4, pp. 172–175 (2014)Google Scholar
  23. 23.
    Nogueira, M., Silva, H., Santos, A., Pujolle, G.: A Security Management Architecture for Supporting Routing Services on WANETs. IEEE Trans. Netw. Serv. Manag. 9(2), 156–168 (2012)CrossRefGoogle Scholar
  24. 24.
    Ren, Y., Chuah, M.C., Yang, J., Chen, Y.: Detecting wormhole attacks in delay tolerant networks. IEEE Wireless Commun. Mag. 17(5), 36–42 (2010)CrossRefGoogle Scholar
  25. 25.
    Onen, M., Molva, R.: Denial of service prevention in satellite networks. In: 2004 IEEE Int. Conf. Commun. (IEEE Cat. No. 04CH37577), vol. 7, pp. 4387–4391 (2004)Google Scholar
  26. 26.
    Mangrulkar, R.S., Atique, M.: Procedia Computer Science Heterogeneous Highly Dense Mobile Environment, pp. 1–13 (2013)Google Scholar
  27. 27.
    Keranen, A., Pitkanen, M., Vuori, M., Ott, J.: Effect of non-cooperative nodes in mobile DTNs. In: Proc. 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1–7, June 2011Google Scholar
  28. 28.
    Mishra, D., Chawla, M.: Minimax Theory Based Scheme to Detect Selfish Node and Reduce Latency in Delay Tolerant Network, vol. 2013, no. Cac2s, pp. 78–82 (2013)Google Scholar
  29. 29.
    Ahnana, S., Saiyari, F.Z., Benamar, N., el Ouadghiri, M.D.: Study of DTN routing protocols in vehicular environment in the presence of misbehaving nodes. In: Proc. - WINCOM (2013)Google Scholar
  30. 30.
    Li, F., Wu, J., Srinivasan, A.: Thwarting blackhole attacks in distruption-tolerant networks using encounter tickets. In: Proc. - IEEE INFOCOM, pp. 2428–2436 (2009)Google Scholar
  31. 31.
    Miao, J., Hasan, O., Mokhtar, S.B., Brunie, L., Yim, K.: An Analysis of Strategies for Preventing Selfish Behavior in Mobile Delay Tolerant Networks (2012)Google Scholar
  32. 32.
    Liu, L.: A survey on barter-based incentive mechanism in opportunistic networks. In: 2013 2nd Int. Symp. Instrum. Meas. Sens. Netw. Autom., pp. 365–367, December 2013Google Scholar
  33. 33.
    Buttyan, L., Dora, L., Felegyhazi, M., Vajda, I.: Barter trade improves message delivery in opportunistic networks. Ad Hoc Networks 8(1), 1–14 (2010)CrossRefGoogle Scholar
  34. 34.
    Dini, G., Duca, A.L.: Ad Hoc Networks Towards a reputation-based routing protocol to contrast blackholes in a delay tolerant network. Ad Hoc Networks 10(7), 1167–1178 (2012)CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media Singapore 2016

Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 2.5 International License (http://creativecommons.org/licenses/by-nc/2.5/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

The images or other third party material in this chapter are included in the chapter's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.

Authors and Affiliations

  • Salah Eddine Loudari
    • 1
    Email author
  • Maria Benamar
    • 1
  • Nabil Benamar
    • 1
  1. 1.University Moulay IsmailMeknesMorocco

Personalised recommendations