CFP last date
20 May 2024
Reseach Article

An Efficient Trust Management Technique for Delay Tolerant Network

by Ranjan Singh, Meenu Chawla
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 98 - Number 21
Year of Publication: 2014
Authors: Ranjan Singh, Meenu Chawla

Ranjan Singh, Meenu Chawla . An Efficient Trust Management Technique for Delay Tolerant Network. International Journal of Computer Applications. 98, 21 ( July 2014), 8-12. DOI=10.5120/17305-7736

@article{ 10.5120/17305-7736,
author = { Ranjan Singh, Meenu Chawla },
title = { An Efficient Trust Management Technique for Delay Tolerant Network },
journal = { International Journal of Computer Applications },
issue_date = { July 2014 },
volume = { 98 },
number = { 21 },
month = { July },
year = { 2014 },
issn = { 0975-8887 },
pages = { 8-12 },
numpages = {9},
url = { },
doi = { 10.5120/17305-7736 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-06T22:26:46.101249+05:30
%A Ranjan Singh
%A Meenu Chawla
%T An Efficient Trust Management Technique for Delay Tolerant Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 98
%N 21
%P 8-12
%D 2014
%I Foundation of Computer Science (FCS), NY, USA

Delay Tolerant Networks (DTNs) have high end-to-end latency, which is often faces disconnection, and unreliable wireless connections. It does not mean a delay service instead DTNs provides a service where network imposes disruption or delay. It operates in challenged networks with extremely limited resources such as memory size, CPU processing power etc. This paper presents an efficient trust managing mechanism for providing secure environment. The proposed dynamic trust management protocol uses a dynamic threshold updating which overcomes the problems with time changing dynamic characteristics by dynamically updating the criteria in response to changing network conditions. This reduces overheads and increases the efficient use of routing network even in conditions change. Also the dynamic threshold update reduces the false detection probability of the malicious nodes. To show the effectiveness of the proposed system, a detailed simulation in the presence of selfish and malicious nodes is performed with ONE simulator. Finally a comparative analysis of our proposed routing with previous routing protocols is also performed. The results demonstrate that presented algorithm deals effectively with selfish behavior with providing significant gain on effective delivery ratio in trade off with message overhead and delay.

  1. Forrest Warthman, Delay Tolerant Networks (DTNs), a tutorial, March 2008
  2. E. Bulut, B. Szymanski "Secure Multi-copy Routing in Compromised Delay Tolerant Networks", Wireless Personal Communication, vol. 73(1), November 2013, pp. 149-168.
  3. WANG Cheng-jun, GONG Zheng-hu, TAO Yong, ZHANG Zi-wen, ZHAO Bao-kang "CRSG: A congestion control routing algorithm for security defense based on social psychology and game theory in DTN", J. Cent. South Univ. (2013) 20: 440–450
  4. Ying Zhu, Bin Xu, Xinghua Shi, and Yu Wang "A Survey of Social-Based Routing in Delay Tolerant Networks: Positive and Negative Social Effects", IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 15, NO. 1, FIRST QUARTER 2013.
  5. Bin Bin Chen &MunChoon Chan, "MobiCent: a Credit-Based Incentive System for Disruption Tolerant Network",National University of Singapore,2008
  6. Mohamed Elsalih Mahmoud, MrinmoyBarua, and Xuemin (Sherman) Shen, "SATS: Secure Data-Forwarding Scheme for Delay-Tolerant Wireless Networks",IEEEGlobecom –Communication and system security,2011
  7. Haojin Zhu, XiaodongLin,Rongxing Lu, Yanfei Fan, and Xuemin (Sherman) Shen, "SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks",IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 58,OCTOBER 2009
  8. Haojin Zhu, Member, Suguo Du, ZhaoyuGao, Mianxiong Dong, Member, IEEE, and Zhenfu Cao "A Probabilistic Misbehavior Detection Scheme towards Ef?cient Trust Establishment in Delay-tolerant Networks",IEEE,2013
  9. Ing-Ray Chen, FenyeBao, Moonjeong Chang, Jin-Hee Cho, "Trust Management for Encounter-Based Routing in Delay Tolerant Networks",Standard Form 298 (Rev. 8-98) Prescribed by ANSI-Std Z39-18,2010
  10. Ing-Ray Chen, FenyeBao, MoonJeong Chang, and Jin-Hee Cho, "Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing",IEEE TRANSACTION,2013
  11. Ting Ning, Zhipeng Yang, Hongyi Wu, and Zhu Han, "Self-Interest-Driven Incentives for Ad Dissemination in Autonomous Mobile Social Networks",2013 Proceedings IEEE INFOCON
  12. LIFEI WEI,HAOJIN ZHU,ZHENFU CAO,XUEMIN SHEN, "SUCCESS: A Secure User-centric andSocial-aware Reputation based Incentive Scheme for DTNs", 15 October 2011, Grant No. 61033014, National Natural Science Foundation of China
  13. Jingwei Miao, Omar Hasan, Sonia Ben Mokhtar, Lionel Brunie, Kangbin Yim, "An analysis of strategies for preventing selfish behaviour in mobile DTN",University of lyon france,2011
  14. Jingwei Miao, Omar Hasan, Sonia Ben Mokhtar, Lionel Brunie, KangbinYim, "An investigation on the unwillingness of nodes to participate in mobile delay tolerant network routing",International Journal of Information Management,2012
Index Terms

Computer Science
Information Sciences


Delay Tolerant Networks (DTN) Selfish Attack Network Security Trust Management.