Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  A Survey on Malicious Node Detection Method for Delay Tolerant Network  
  Authors : A.N. Jaiswal; Sonika gandhi
  Cite as:

 

Delay tolerant network s (DTNs) is the one of the areas in the field of wireless communication, where in delay is particularly high. They are promising technology in vehicular, disaster response, under water and satellite networks. Delay tolerant networks characterized by large end to end communication latency and the lack of end to end path from a source to its destination and they pose several challenges to the security of DTNs. Daley and disruption tolerant network is a new communication field that can have multiple networks and internet model. After few years there are numbers implementation and application have performance and application domain. In this survey, we can conclude that the recent developments in the field and high potential for future development.

 

Published In : IJCSN Journal Volume 3, Issue 1

Date of Publication : 01 February 2014

Pages : 93 - 96

Figures : 01

Tables : --

Publication Link : IJCSN-2014/3-1/A-Survey-on-Malicious-Node-Detection-Method-for-Delay-Tolerant-Network

 

 

 

Anil Jaiswal : Professor in Department of Computer Science and Engineering @ G.H. Raisoni Institute of Engineering and Technology for Women Nagpur.

Sonika Gandhi : has received her B.E. degree in Electronics & Instrumentation Engineering from Chhatrapati shivaji institute of technology Durg (C.G), CSVTU University in 2012. She is pursuing M.E. in Wireless Communication and Computing from G.H.Raisoni Institute of Engineering and Technology for Women Nagpur. Her research interests include Detection of Malicious node in DTNS.

 

 

 

 

 

 

 

Delay Tolerant Networking

Disruption Tolerant Networking

Attacks

DTN platforms

In this survey, we reviewed developing DTN software, services and application. DTN starting from the deep space communication and then it is evolved in architecture for any networking environment. The DTN provide the sufficient condition for the implementation and their performance. We can conclude from software, simulation, emulation, the DTN can be implemented on the complex scenarios and pursue even harder problem. For the more application more and more application cope with disruptions in the internet domain.

 

 

 

 

 

 

 

 

 

[1] Erman Ayday, and Faramarz Fekri “An Iterative Algorithm for Trust Management and Adversary Detection For Delay-Tolerant Networks” IEEE trans. on mobile computing, VOL. 11, NO. 3, SEP 2012.

[2] Z. Zhang, “Routing in intermittently connected mobile ad hoc networks and delay tolerant networks: overview and challenges,” IEEE Communications Tutorials & Surveys, vol. 8, no. 1, quarter 2006, pp. 24–37.

[3] K. Fall, “A Delay-Tolerant Network Architecture for challenged internets,” in Proceedings of the 2003 conference on protocols, architectures, technologies and application for computer communications. ACM, 2003, pp. 27–34.

[4] Z. Zhang and Q. Zhang, “Delay/disruption tolerant mobile ad hoc networks: latest developments: Research articles,” Wireless Communication Mobile Computer, vol. 7, no. 10, Dec. 2007, pp. 1219–1232.

[5] J. Crowcroft, E. Yoneki, P. Hui, and T. Henderson, “Promoting tolerance for delay tolerant network research,” SIGCOMM Computer Communi. Rev., vol. 38, no. 5, Sept. 2008, pp. 63–68.

[6] A. Lindgren and P. Hui, “The quest for a killer app for opportunistic and delay tolerant networks,” in Proceedings of the ACM workshop on Challenged networks (CHANTS ’09). New York, USA: ACM, 2009, pp. 59–66.

[7] W. D. Ivancic, “Security analysis of DTN architecture and bundle protocol specification for space-based networks,” in 2010 IEEE Aerospace Conference, NJ, USA: IEEE, 2010, pp. 1–12.

[8] S. Domancich, “Security in delay tolerant networks for the Android platform,” Master’s thesis, Royal Institute of Technology (KTH), Sweden, June 2010.

[9] M. Loubser, “Delay tolerant networking for sensor networks,” Swedish Institute of Computer Science, Kista, Sweden, Tech. Rep. T2006:01, 2006.

[10] M. Liu, Y. Yang, and Z, “A survey of routing protocols and simulations in delay-tolerant networks,” in Proceedings of the international conference on Wireless algorithms, applications, and systems. Berlin, Heidelberg on IEEE, 2011, pp. 243–253.

[11] J. Morgenroth, T. Poegel, “Delay-tolerant networking in restricted networks,” in Proceedings of the 6th ACM seminar on Challenged networks. New York, NY, USA: ACM, 2011, pp. 53–56.