New Classification of Nodes Cooperation in Delay Tolerant Networks
Delay and Disruptive Tolerant Networks (DTNs) is a concept related to environments characterized by very long delay paths and frequent network disruptions. DTN is nowadays a recognized area in networking and communications research, due to its suitability and practical experiences with mobile ad-hoc networks especially in situations where continuous end-to-end paths may not be always guaranteed. In DTNs, nodes store carry and forward messages, called bundles, to other nodes. The forwarding mechanism can occur opportunistically. However, some nodes may show some selfish or malicious behavior, which leads to less cooperation in the network. Thus, one of the main challenges in DTN is to ensure the security and confidentiality within the Network and assure cooperation among nodes. In this paper, we classify some of the threats that have been considered and treated by researchers in the field of DTN, and we propose a new classification based on the degree of cooperation of nodes. We describe different incentive mechanisms used to enhance cooperation among nodes in DTN environment focusing on the strengths of these mechanisms and also their limitations and drawbacks.
KeywordsDelay Tolerant Networks Cooperation Bundle
Unable to display preview. Download preview PDF.
- 1.Scott, K., Burleigh, S.: Bundle Protocol Specification. RFC 5050, November 2007Google Scholar
- 2.Pereira, P.R., Casaca, A., Rodrigues, J.J., Soares, V.N., Triay, J., Cervelló-Pastor, C.: From Delay-Tolerant Networks to Vehicular Delay-Tolerant Networks. IEEE Commun. Surveys Tuts. PP(99), 1–17 (2011)Google Scholar
- 4.Voyiatzis, A.G.: A Survey of Delay- and Disruption-Tolerant Networking Applications. Journal of Internet Engineering 5(1), 331–344 (2012)Google Scholar
- 5.Partan, J., Kurose, J., Levine, B.N.: A survey of practical issues in underwater networks. In: Proc. 1st ACM Int. Work. Underw. networks - WUWNet 2006, p. 17 (2006)Google Scholar
- 7.Krishnan, R., Basu, P., Mikkelson, J.M., Small, C., Ramanathan, R., Brown, D.W., Burgess, J.R., Caro, A.L., Condell, M., Goffee, N.C., Hain, R.R., Hansen, R.E., Jones, C.E., Kawadia, V., Mankins, D.P., Schwartz, B.I., Strayer, W.T., Ward, J.W., Wiggins, D.P., Polit, S.H.: The SPINDLE disruption-tolerant networking system. In: MILCOM 2007 - IEEE Mil. Commun. Conf., pp. 1–7, October 2007Google Scholar
- 8.DTN Work Group: http://datatracker.ietf.org/list/wg/
- 10.Benamar, N., Benamar, M., Bonnin, J.M.: Routing protocols for DTN in vehicular environment. In: 2012 International Conference on Multimedia Computing and Systems (ICMCS), pp. 589–593, May 10–12, 2012Google Scholar
- 11.Benamar, N., Benamar, M., Ahnana, S., Saiyari, F.Z., el Ouadghiri, M.D., Bonnin, J.-M.: Are VDTN routing protocols suitable for data collection in smart cities: a performance assessment. J. Theor. Appl. Inf. Technol. 58(3), 589–600 (2013)Google Scholar
- 12.Benamar, M., Ahnana, S., Saiyari, F.Z., Benamar, N., El Ouadghiri, M.D., Bonnin, J.-M.: Study of VDTN routing protocols performances in sparse and dense traffic in the presence of relay nodes. J. Mob. Multimedia 10(1&2), 78–93 (2014)Google Scholar
- 13.Benamar, M., Benamar, N., Singh, K.D., El Ouadghiri, D.: Recent study of routing protocols in VANET: survey and taxonomy. In: WVNT 2013: 1st International Workshop on Vehicular Networks and Telematics, May 2013, Marrakech, Morocco (2013)Google Scholar
- 15.Guo, S., Falaki, M.H., Oliver, E.A., Rahman, S.U., Seth, A., Zaharia, M.A., Keshav, S.: Very Low-Cost Internet Access Using KioskNet. ACM Computer Communication Review, October 2007Google Scholar
- 17.Ivancic, W.D.: Security analysis of DTN architecture and bundle protocol specification for space-based networks. In: 2010 IEEE Aerosp. Conf., pp. 1–12, March 2010Google Scholar
- 18.DTN Research Group - www.dtnrg.org/
- 20.Ardra, P.S.: A Survey On Detection And Mitigation Of Misbehavior In Disruption Tolerant Networks, vol. 2, pp. 656–660, December 2012Google Scholar
- 21.Ansa, G., Cruickshank, H., Sun, Z.: A proactive DOS filter mechanism for delay tolerant networks. In: ICST PSATS, Conference, Malaga, Spain, February 2011Google Scholar
- 22.Jain, S.: Black Hole Attack in Delay Tolerant Networks: A Survey, no. 4, pp. 172–175 (2014)Google Scholar
- 25.Onen, M., Molva, R.: Denial of service prevention in satellite networks. In: 2004 IEEE Int. Conf. Commun. (IEEE Cat. No. 04CH37577), vol. 7, pp. 4387–4391 (2004)Google Scholar
- 26.Mangrulkar, R.S., Atique, M.: Procedia Computer Science Heterogeneous Highly Dense Mobile Environment, pp. 1–13 (2013)Google Scholar
- 27.Keranen, A., Pitkanen, M., Vuori, M., Ott, J.: Effect of non-cooperative nodes in mobile DTNs. In: Proc. 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1–7, June 2011Google Scholar
- 28.Mishra, D., Chawla, M.: Minimax Theory Based Scheme to Detect Selfish Node and Reduce Latency in Delay Tolerant Network, vol. 2013, no. Cac2s, pp. 78–82 (2013)Google Scholar
- 29.Ahnana, S., Saiyari, F.Z., Benamar, N., el Ouadghiri, M.D.: Study of DTN routing protocols in vehicular environment in the presence of misbehaving nodes. In: Proc. - WINCOM (2013)Google Scholar
- 30.Li, F., Wu, J., Srinivasan, A.: Thwarting blackhole attacks in distruption-tolerant networks using encounter tickets. In: Proc. - IEEE INFOCOM, pp. 2428–2436 (2009)Google Scholar
- 31.Miao, J., Hasan, O., Mokhtar, S.B., Brunie, L., Yim, K.: An Analysis of Strategies for Preventing Selfish Behavior in Mobile Delay Tolerant Networks (2012)Google Scholar
- 32.Liu, L.: A survey on barter-based incentive mechanism in opportunistic networks. In: 2013 2nd Int. Symp. Instrum. Meas. Sens. Netw. Autom., pp. 365–367, December 2013Google Scholar
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 2.5 International License (http://creativecommons.org/licenses/by-nc/2.5/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.
The images or other third party material in this chapter are included in the chapter's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.