Skip to main content

An Adaptive Blurring Routing Protocol for Delay-Tolerant Networks in IoT Environments

  • Chapter
  • First Online:
Security, Trust and Privacy Models, and Architectures in IoT Environments

Part of the book series: Internet of Things ((ITTCC))

  • 127 Accesses

Abstract

Common arguments related to delay-tolerant networks in IoT environments are often focused on routing performances, energy consumption or quality of service. Despite privacy-related issues are generally considered critical, they do not arouse the same interest as the other reported aspects. Nevertheless, most of the protocols in use seem to not care about that, assuming that this task should be in charge by others. In this chapter, we propose an innovative routing protocol, which is able to take care of sensitive information, with delivery performances comparable with the most used protocols currently known, taking hint by a feature borrowed from human nature, the vocal timbre.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abbas, A., Hidayet, A., A.Selcuk, U., Conti, M.: A survey on homomorphic encryption schemes: Theory and implementation. ACM Computing Surveys 51(4) (2018)

    Google Scholar 

  2. Benhamida, F.Z., Bouabdellah, A., Challal, Y.: Using delay tolerant network for the internet of things: Opportunities and challenges. In: 2017 8th International Conference on Information and Communication Systems (ICICS). pp. 252–257 (2017). https://doi.org/10.1109/IACS.2017.7921980

  3. CC, S., Raychoudhury, V., Marfia, G., Singla, A.: A survey of routing and data dissemination in delay tolerant networks. Journal of Network and Computer Applications 67, 128–146 (2016). https://doi.org/10.1016/j.jnca.2016.01.002, http://www.sciencedirect.com/science/article/pii/S1084804516000035

  4. Clifton, C., Kantarcioglu, M., Vaidya, J.: Defining privacy for data mining. In: National science foundation workshop on next generation data mining. vol. 1, p. 1. Citeseer (2002)

    Google Scholar 

  5. Fall, K.: A delay-tolerant network architecture for challenged internets. In: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications. pp. 27–34. ACM (2003)

    Google Scholar 

  6. Gentry, C., et al.: A fully homomorphic encryption scheme, vol. 20. Stanford university Stanford (2009)

    Google Scholar 

  7. Hui, P., Crowcroft, J., Yoneki, E.: Bubble rap: Social-based forwarding in delay-tolerant networks. IEEE Transactions on Mobile Computing 10(11), 1576–1589 (2010)

    Article  Google Scholar 

  8. Lindgren, A., Doria, A., Schelén, O.: Probabilistic routing in intermittently connected networks. In: ACM International Symposium on Mobilde Ad Hoc Networking and Computing, MobiHoc 2003: 01/06/2003-03/06/2003 (2003)

    Google Scholar 

  9. Magaia, N., Borrego, C., Pereira, P., Correia, M.: Privo: A privacy-preserving opportunistic routing protocol for delay tolerant networks. In: 2017 IFIP Networking Conference (IFIP Networking) and Workshops. pp. 1–9 (2017). https://doi.org/0.23919/IFIPNetworking.2017.8264835

  10. McKinley, S., Levine, M.: Cubic spline interpolation. College of the Redwoods 45(1), 1049–1060 (1998)

    Google Scholar 

  11. Papapetrou, E., Bourgos, V.F., Voyiatzis, A.G.: Privacy-preserving routing in delay tolerant networks based on bloom filters. In: 2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM). pp. 1–9. IEEE (2015)

    Google Scholar 

  12. Quarteroni, A., Sacco, R., Saleri, F.: Numerical mathematics, vol. 37. Springer Science & Business Media (2010)

    Google Scholar 

  13. Schafer, R.W., Rabiner, L.R.: Digital representations of speech signals. Proceedings of the IEEE 63(4), 662–677 (1975)

    Article  Google Scholar 

  14. Sánchez-Carmona, A., Robles, S., Borrego Iglesias, C.: Privhab+: a secure geographic routing protocol for dtn. Computer Communications 78 (11 2015). https://doi.org/10.1016/j.comcom.2015.10.002

  15. Vahdat, A., Becker, D., et al.: Epidemic routing for partially connected ad hoc networks (2000)

    Google Scholar 

  16. Wood, L., McKim, J., Eddy, W., Ivancic, W., Jackson, C.: Saratoga: A scalable file transfer protocol. work in progress as an Internet-draft (2010)

    Google Scholar 

  17. Zhu, Y., Hu, Y.: Making peer-to-peer anonymous routing resilient to failures. In: 2007 IEEE International Parallel and Distributed Processing Symposium. pp. 1–10. IEEE (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to C. Santoro or Federico Fausto Santoro .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Meli, D., Milotta, F.L.M., Santoro, C., Santoro, F.F., Riccobene, S. (2023). An Adaptive Blurring Routing Protocol for Delay-Tolerant Networks in IoT Environments. In: Fotia, L., Messina, F., Rosaci, D., Sarné, G.M. (eds) Security, Trust and Privacy Models, and Architectures in IoT Environments. Internet of Things. Springer, Cham. https://doi.org/10.1007/978-3-031-21940-5_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-21940-5_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-21939-9

  • Online ISBN: 978-3-031-21940-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics