首页    期刊浏览 2025年06月29日 星期日
登录注册

文章基本信息

  • 标题:Dynamic Trust and Security Management Protocol For Delay Tolerant Networks using Information centric-Networks Architecture
  • 本地全文:下载
  • 作者:Mrs. Suvarna L. kattimani ; Mr. Jaeerahmad N. Indikar
  • 期刊名称:International Journal of Engineering and Computer Science
  • 印刷版ISSN:2319-7242
  • 出版年度:2015
  • 卷号:4
  • 期号:6
  • 页码:12698-12704
  • 出版社:IJECS
  • 摘要:Trust management in mobile wireless network is always been challenging because of frequently changing networkenvironment. This will cause delay tolerance networks (DTN) a high latency, frequent disconnection over unreliable wireless links. To avoidthese anomalies we proposed Dynamic Trust and Security Management Protocol (DTSMP).In the current Internet architecture (IP-basedarchitecture), data are treated as network elements as a series of bytes that have to be transferred from a specific source to a specificdestination. But the network elements have no knowledge of the information they transfer a, hence cannot realize optimizations that wouldbe possible (e.g., information replication at various points, information-aware traffic engineering, smart in-network caching). To overcomethese issues we use the Information Centric-Networks (ICN) architecture for our proposed DTSM protocol. We design and validate theDynamic Trust and Security Management protocol for delay tolerant networks (DTN) for better optimized secure routing in DTNenvironment; this includes well-behaved, selfish and malicious nodes. Proposed work is analyzed and validated via extensive simulation. Ourprotocol determine and apply the best optimized operational setting at the runtime in response to dynamically changing networkenvironment, by will minimize the trust bias and maximize the routing performance. We do comparative analysis with other trust protocolslike Bayesian trust-based protocol, DTSM protocol (proposed) with IP-based architecture and DTSMP protocol (with ICN architecture). Theresults demonstrate that DTSM protocol is able to deal with selfish behavior, malicious, and unreliable nodes. It also shows that our DTSMprotocol work efficiently on INC architecture which improve the performance of our protocol. Furthermore proposed protocol can dealeffectively with message overhead and message delay which will increase the significant gain in delivery ratio
国家哲学社会科学文献中心版权所有