Skip to main content

Flooding and Forwarding Based on Efficient Routing Protocol

  • Conference paper
  • First Online:
International Conference on Innovative Computing and Communications

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1166))

Abstract

Delay tolerant network (DTN) is an approach that allows the transmission of data in a difficult situation where refined infrastructures are unavailable and the end-to-end path does not exist at the moment of transmission of data. The DTN efficiently improves network communications where the network connectivity is irregular or prone to disruptions. For transmission, DTN uses different kinds of routing protocols but still, they may lack some aspects such as buffer size, delivery rate, and number of message copy. In this paper, we represent an efficient routing protocol that is based on flooding and forwarding techniques along with the delivery predictability of nodes for transmission of messages. The main idea of the proposed model is to accelerate the dissemination of message in the early phase by employing spray and wait, and then to restrict dissemination in the later phase by using delivery predictability. We evaluated the performance of our protocol by simulation through the Opportunistic Network Environment (ONE) simulation tool. Obtained results show that ERP maintains a balance and offers a better way for the transmission of messages.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. I. Gupta, A.K. Singh, Dynamic threshold based information leaker identification scheme. Inf. Process. Lett. 147, 69–73 (2019)

    Article  MathSciNet  Google Scholar 

  2. I. Gupta, N. Singh, A.K. Singh, Layer-based privacy and security architecture for cloud data sharing. J. Commun. Softw. Syst. (JCOMSS) 15(2) (2019)

    Google Scholar 

  3. I. Gupta, A.K. Singh, A probabilistic approach for guilty agent detection using bigraph after distribution of sample data. Procedia Compu. Sci. 125, 662–668 (2018)

    Article  Google Scholar 

  4. I. Gupta, A.K. Singh, A probability based model for data leakage detection using bigraph, in 7th International Conference on Communication and Network Security (ICCNS-2017) (ACM, Tokyo, Japan, 2017)

    Google Scholar 

  5. H. Wang, et al., Timetable-aware opportunistic DTN routing for vehicular communications in battlefield environments. Future Gener. Comput. Syst. 83, 95–103 (2018)

    Google Scholar 

  6. H. Zekkori, S. Agoujil, Hybrid delay tolerant network routing protocol for heterogeneous networks. J. Netw. Comput. Appl. 148, 102456 (2018)

    Google Scholar 

  7. P. Godha, S. Jadon, A. Patle, I. Gupta, B. Sharma, A.K. Singh, Architecture, an efficient routing, applications, and challenges in delay tolerant network. in International Conference on Intelligent Computing and Control Systems (ICICCS 2019) (2019)

    Google Scholar 

  8. I. Gupta, A.K. Singh, A confidentiality preserving data leaker detection model for secure sharing of cloud data using integrated techniques. in Seventh International Conference on Smart Computing and Communication Systems (ICSCC), (Sarawak, Malaysia, 2019), pp. 1–5

    Google Scholar 

  9. D. Farrell, V. Cahill, Security considerations in space and delay tolerant networks. in  2nd IEEE International Conference on Space Mission Challenges for Information Technology (SMC-IT’06) (IEEE, 2006)

    Google Scholar 

  10. W. Sun, C. Liu, D. Wang, On delay-tolerant networking and its application. in International Conference on Computer Science and Information Technology (ICCSIT 2011) (2011)

    Google Scholar 

  11. J. Gonçalves Filho, et al., A systematic technical survey of DTN and VDTN routing protocols. Comput. Stand. Interfaces 48, 139–159 (2016)

    Google Scholar 

  12. A. Vahdat, D Becker, Epidemic routing for partially connected ad hoc networks. (2000): 2019

    Google Scholar 

  13. A. Hamza-Cherif, et al., Performance evaluation and comparative study of main VDTN routing protocols under small-and large-scale scenarios. Ad Hoc Netw. 81, 122–142 (2018)

    Google Scholar 

  14. T. Spyropoulos, K. Psounis, C.S. Raghavendra, Spray and wait: an efficient routing scheme for intermittently connected mobile networks. in Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking (2005)

    Google Scholar 

  15. H.S. Bindra, A.L. Sangal, Considerations and open issues in delay tolerant network’s (DTNs) security.  Wirel. Sens. Netw. 2(08), 645 (2010)

    Google Scholar 

  16. A. Roy, T. Acharya, S. DasBit, Quality of service in delay tolerant networks: a survey. Comput. Netw. 130, 121–133 (2018)

    Google Scholar 

  17. S. Farrell, V. Cahill, Security considerations in space and delay tolerant networks. in 2nd IEEE International Conference on Space Mission Challenges for Information Technology (SMC-IT’06) (IEEE, 2006)

    Google Scholar 

  18. A. Lindgren, A. Doria, O. Schelen, Probabilistic routing in intermittently connected networks, in International Workshop on Service Assurance with Partial and Intermittent Resources (Springer, Berlin, Heidelberg, 2004)

    Google Scholar 

  19. C.C. Sobin, C.T. Labeeba, K.D. Chandran, An efficient method for secure routing in delay tolerant networks. Procedia Comput. Sci. 143 (2018)

    Google Scholar 

  20. R. Karimi, et al., DTN routing protocols for VANETs: issues and approaches. Int. J. Comput. Sci. Issues (IJCSI) 8(6), 89 (2011)

    Google Scholar 

  21. I. Gupta, A.K. Singh, An integrated approach for data leaker detection in cloud environment. J. Inf. Sci/ Eng. (2019)

    Google Scholar 

  22. D. Patel, R. Shah, A survey on improved PROPHET routing protocol in DTN. Int. Res. J. Eng. Technol 2(8), 1237–1240 (2015)

    Google Scholar 

  23. H. Wang, et al., NWBBMP: a novel weight-based buffer management policy for DTN routing protocols. Peer-to-Peer Netw. Appl. 11(5), 917–923 (2018)

    Google Scholar 

  24. C. Prabha, S. Kumar, R. Khanna, Analysis of routing and forwarding protocols in opportunistic networks. Procedia Comput. Sci. 85, 891–898 (2016)

    Google Scholar 

  25. F. Warthman, Delay and disruption-tolerant networks (DTNs), in A Tutorial. V.. 0, Interplanetary Internet Special Interest Group (2012)

    Google Scholar 

  26. S. Agarwal, et al., Bundle adjustment in the large. in European Conference on Computer Vision (Springer, Berlin, Heidelberg, 2010)

    Google Scholar 

  27. S.-K. Yoon, Z.J. Haas, Application of linear network coding in delay tolerant networks. in 2010 Second International Conference on Ubiquitous and Future Networks (ICUFN) (IEEE, 2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ishu Gupta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Godha, P., Jadon, S., Patle, A., Gupta, I., Sharma, B., Singh, A.K. (2021). Flooding and Forwarding Based on Efficient Routing Protocol. In: Gupta, D., Khanna, A., Bhattacharyya, S., Hassanien, A.E., Anand, S., Jaiswal, A. (eds) International Conference on Innovative Computing and Communications. Advances in Intelligent Systems and Computing, vol 1166. Springer, Singapore. https://doi.org/10.1007/978-981-15-5148-2_19

Download citation

Publish with us

Policies and ethics