Table 1 - uploaded by Zhigang Jin
Content may be subject to copyright.
Simulation parameters.

Simulation parameters.

Source publication
Article
Full-text available
A delay tolerant network (DTN) presents a new communication model, which uses a store-carry-forward approach to deliver messages due to the nature of the network. With the development of the mobile internet, the research on DTNs becomes a hot topic. One critical issue in the DTNs with social characteristics is that there could exist selfish and mal...

Context in source publication

Context 1
... simulation experiments have been performed by using QualNet. Simulation parameters are shown in Table 1. As mentioned in system model, we set í µí±ƒ í µí°» = 0.7 and í µí±ƒ í µí° ¶ = 0.1 for 80% of the nodes at each hot spot and í µí±ƒ í µí°» = 0.5 and í µí±ƒ í µí° ¶ = 0.1 for other 20% nodes. ...

Similar publications

Conference Paper
Full-text available
In this demo we present a NDN-based approach to deploy dockerised services closer to end-users when the network is impaired. We further increase resiliency, employing DTN to tunnel traffic between intermittently connected NDN nodes.
Conference Paper
Full-text available
In opportunistic environments data forwarding is challenging where connectivity is intermittent because of network partitioning, dynamic topologies and long delays. Traditional routing protocols of Delay Tolerant Network (DTN) exploit "Store-Carry-and-Forward" strategy in these cases. But the pitfall of this approach is the selection of perfect rel...
Article
Full-text available
Disruption-tolerant networking has gained currency in the United States due to support from DARPA, which has funded many DTN projects. Disruption may occur because of the limits of wireless radio range, sparsity of mobile nodes, energy resources, attack, and noise. The delay-tolerant-network (DTN) model is becoming a viable communication alternativ...
Article
Full-text available
Delay tolerant network (DTN) protocol was proposed for a network where connectivity is not available. In DTN, a message is delivered to a destination node via store-carry-forward approach while using opportunistic contacts. Probabilistic routing protocol for intermittently connected networks (PRoPHET) is one of the widely studied DTN protocols. In...
Article
Full-text available
Delay Tolerant Networking (DTN) is an approach to networking which handles network disruptions and high delays that may occur in many kinds of communication networks. The major reasons for high delay include partial connectivity of networks as can be seen in many types of ad hoc wireless networks with frequent network partitions, long propagation t...

Citations

... The focus of cryptography based security schemes is to protect the network from Outsider attacks while trust management schemes take a further step to protect the network from Insider attacks. These trust management schemes themselves are prone to different attacks such as bad mouthing, ballot stuffing, random opinion [10][11][12] etc. Our research is an attempt to shield trust management scheme(s) in MANETs from attacks stated, the very focus of this paper. ...
... Barring their assistance in trust management, these trust recommendations make trust management systems vulnerable to different attacks triggered by dishonest recommenders, i.e., recommenders give false trust recommendations deviating from their actual experiences [36] paving the way for attacks entailing in degraded performance of trust management system [17]. These attacks [10][11][12] are briefly described in following: ...
... (10) - (12). ...
Article
Trust recommendations, having a pivotal role in computation of trust and hence confidence in peer to peer (P2P) environment, if hampered, may entail in colossal attacks from dishonest recommenders such as bad mouthing, ballot stuffing, random opinion etc. Therefore, mitigation of dishonest trust recommendations is stipulated as a challenging research issue in P2P systems (esp in Mobile Ad Hoc Networks). In order to cater these challenges associated with dishonest trust recommendations, a technique named "intelligently Selection of Trust Recommendations based on Dissimilarity factor (iSTRD)" has been devised for Mobile Ad Hoc Networks. iSTRD exploits personal experience of an "evaluating node" in conjunction with majority vote of the recommenders. It successfully removes the recommendations of "low trustworthy recommenders" as well as dishonest recommendations of "highly trustworthy recommenders". Efficacy of the proposed approach is evident from enhanced accuracy of "recognition rate", "false rejection" and "false acceptance". Moreover, experiential results depict that iSTRD has unprecedented performance compared to contemporary techniques in presence of attacks asserted.