Journal of Machine and Computing


New Trust Based Smart Data Forwarding Mechanism in Vehicular Delay Tolerant Network



Journal of Machine and Computing

Received On : 12 March 2024

Revised On : 06 June 2024

Accepted On : 04 July 2024

Published On : 05 October 2024

Volume 04, Issue 04

Pages : 830-840


Abstract


Vehicular Delay Tolerant Network (VDTN) is the growing field with a considerable possibility to handle future wireless application’s requirements. Using vehicles for the data communication purpose can be contemplated as a substitute for the wired and wireless systems. This paper proposes a trust-based data forwarding mechanism for Vehicular Delay Tolerant Network (VDTN). Data forwarding in VDTN requires every vehicular or stationary node to participate in data forwarding. But some time malicious nodes show non-cooperative behaviour in data forwarding. Therefore, malicious nodes must be identified specifically to accelerate the data forwarding. A threshold based social skeleton membership process along with new trust-based data forwarding mechanism is proposed in this paper. We reveal that the social skeleton members perform better in data forwarding in terms of data delivery ratio, data delay and data overhead. Simulation results demonstrate that the trust-based data forwarding improves the data delivery ratio with trust-based data forwarding approach. After simulation a comparative analysis of two different scenarios is presented with epidemic routing, prophet routing and spray and wait routing.


Keywords


Opportunistic Networks, Social Skeleton, Threshold, Trust Based, Vehicular Delay Tolerant Network.


  1. A. Sharma, N. Goyal, and K. Guleria, “Performance optimization in delay tolerant networks using backtracking algorithm for fully credits distribution to contrast selfish nodes,” The Journal of Supercomputing, vol. 77, no. 6, pp. 6036–6055, Nov. 2020, doi: 10.1007/s11227-020-03507-4.
  2. G. Santhana Devi and M. Germanus Alex, “DFEMD: Delay Tolerant Fast Emergency Message Dissemination Routing Protocol,” Wireless Personal Communications, vol. 120, no. 4, pp. 3071–3093, Jul. 2021, doi: 10.1007/s11277-021-08600-2.
  3. P. R. Pereira, A. Casaca, J. J. P. C. Rodrigues, V. N. G. J. Soares, J. Triay, and C. Cervello-Pastor, “From Delay-Tolerant Networks to Vehicular Delay-Tolerant Networks,” IEEE Communications Surveys Tutorials, vol. 14, no. 4, pp. 1166–1182, 2012, doi: 10.1109/surv.2011.081611.00102.
  4. Haldorai, B. L. R, S. Murugan, and M. Balakrishnan, “AI-Based Effective Communication in Software-Defined VANET: A Study,” EAI/Springer Innovations in Communication and Computing, pp. 271–290, 2024, doi: 10.1007/978-3-031-53972-5_14.
  5. V. N. G. J. Soares, F. Farahmand, and J. J. P. C. Rodrigues, “A layered architecture for Vehicular Delay-Tolerant Networks,” 2009 IEEE Symposium on Computers and Communications, Jul. 2009, doi: 10.1109/iscc.2009.5202332.
  6. L. Li, X. Zhong, and Y. Qin, “A secure routing based on social trust in opportunistic networks,” 2016 IEEE International Conference on Communication Systems (ICCS), Dec. 2016, doi: 10.1109/iccs.2016.7833575.
  7. X. Wang, Y. Lin, Y. Zhao, L. Zhang, J. Liang, and Z. Cai, “A novel approach for inhibiting misinformation propagation in human mobile opportunistic networks,” Peer-to-Peer Networking and Applications, vol. 10, no. 2, pp. 377–394, Feb. 2016, doi: 10.1007/s12083-016-0438-3.
  8. V. Arulkumar, M. Aruna, D. Prakash, M. Amanullah, K. Somasundaram, and R. Thavasimuthu, “A novel cloud-assisted framework for consumer internet of things based on lanner swarm optimization algorithm in smart healthcare systems,” Multimedia Tools and Applications, vol. 83, no. 26, pp. 68155–68179, Mar. 2024, doi: 10.1007/s11042-024-18846-0.
  9. Y. Li, G. Su, D. O. Wu, D. Jin, L. Su, and L. Zeng, “The Impact of Node Selfishness on Multicasting in Delay Tolerant Networks,” IEEE Transactions on Vehicular Technology, vol. 60, no. 5, pp. 2224–2238, 2011, doi: 10.1109/tvt.2011.2149552.
  10. Y. Guo, S. Schildt, T. Pougel, S. Rottmann, and L. Wolf, “Mitigating Blackhole attacks in a hybrid VDTN,” Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014, Jun. 2014, doi: 10.1109/wowmom.2014.6918993.
  11. J. Golbeck and J. Hendler, “Inferring binary trust relationships in Web-based social networks,” ACM Transactions on Internet Technology, vol. 6, no. 4, pp. 497–529, Nov. 2006, doi: 10.1145/1183463.1183470.
  12. M. Blaze, J. Feigenbaum, and J. Lacy, “Decentralized trust management,” Proceedings 1996 IEEE Symposium on Security and Privacy, doi: 10.1109/secpri.1996.502679.
  13. A. Baadache and A. Belmehdi, “Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks,” Journal of Network and Computer Applications, vol. 35, no. 3, pp. 1130–1139, May 2012, doi: 10.1016/j.jnca.2011.12.012.
  14. S. E. Loudari, M. Benamar, and N. Benamar, “New Classification of Nodes Cooperation in Delay Tolerant Networks,” Advances in Ubiquitous Networking, pp. 301–309, 2016, doi: 10.1007/978-981-287-990-5_24.
  15. T. N. D. Pham, C. K. Yeo, N. Yanai, and T. Fujiwara, “Detecting Flooding Attack and Accommodating Burst Traffic in Delay-Tolerant Networks,” IEEE Transactions on Vehicular Technology, vol. 67, no. 1, pp. 795–808, Jan. 2018, doi: 10.1109/tvt.2017.2748345.
  16. J. A. F. F. Dias, J. J. P. C. Rodrigues, F. Xia, and C. X. Mavromoustakis, “A Cooperative Watchdog System to Detect Misbehavior Nodes in Vehicular Delay-Tolerant Networks,” IEEE Transactions on Industrial Electronics, vol. 62, no. 12, pp. 7929–7937, Dec. 2015, doi: 10.1109/tie.2015.2425357.
  17. Q. Li, W. Gao, S. Zhu, and G. Cao, “To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks,” IEEE Transactions on Dependable and Secure Computing, vol. 10, no. 3, pp. 168–182, May 2013, doi: 10.1109/tdsc.2012.84.
  18. M. Y. S. Uddin, B. Godfrey, and T. Abdelzaher, “RELICS: In-network realization of incentives to combat selfishness in DTNs,” The 18th IEEE International Conference on Network Protocols, Oct. 2010, doi: 10.1109/icnp.2010.5762769.
  19. E. Ayday and F. Fekri, “An Iterative Algorithm for Trust Management and Adversary Detection for Delay-Tolerant Networks,” IEEE Transactions on Mobile Computing, vol. 11, no. 9, pp. 1514–1531, Sep. 2012, doi: 10.1109/tmc.2011.160.
  20. Haojin Zhu, Xiaodong Lin, Rongxing Lu, Yanfei Fan, and Xuemin Shen, “SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks,” IEEE Transactions on Vehicular Technology, vol. 58, no. 8, pp. 4628–4639, Oct. 2009, doi: 10.1109/tvt.2009.2020105.
  21. H. Gong, L. Yu, and X. Zhang, “Social Contribution-Based Routing Protocol for Vehicular Network with Selfish Nodes,” International Journal of Distributed Sensor Networks, vol. 10, no. 4, p. 753024, Apr. 2014, doi: 10.1155/2014/753024.
  22. L. Buttyán, L. Dóra, M. Félegyházi, and I. Vajda, “Barter trade improves message delivery in opportunistic networks,” Ad Hoc Networks, vol. 8, no. 1, pp. 1–14, Jan. 2010, doi: 10.1016/j.adhoc.2009.02.005.
  23. F. Wu, T. Chen, S. Zhong, C. Qiao, and G. Chen, “A bargaining-based approach for incentive-compatible message forwarding in opportunistic networks,” 2012 IEEE International Conference on Communications (ICC), Jun. 2012, doi: 10.1109/icc.2012.6363685.
  24. L. Liu, “A survey on barter-based incentive mechanism in opportunistic networks,” 2013 2nd International Symposium on Instrumentation and Measurement, Sensor Network and Automation (IMSNA), Dec. 2013, doi: 10.1109/imsna.2013.6743291.
  25. A. Keränen, J. Ott, and T. Kärkkäinen, “The ONE simulator for DTN protocol evaluation,” Proceedings of the Second International ICST Conference on Simulation Tools and Techniques, 2009, doi: 10.4108/icst.simutools2009.5674.

Acknowledgements


Author(s) thanks to Dr. Amit Kant Pandit for this research completion and support.


Funding


No funding was received to assist with the preparation of this manuscript.


Ethics declarations


Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.


Availability of data and materials


Data sharing is not applicable to this article as no new data were created or analysed in this study.


Author information


Contributions

All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.


Corresponding author


Rights and permissions


Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/


Cite this article


Seema Jangra and Amit Kant Pandit, “New Trust Based Smart Data Forwarding Mechanism in Vehicular Delay Tolerant Network”, Journal of Machine and Computing, pp. 830-840, October 2024. doi: 10.53759/7669/jmc202404077.


Copyright


© 2024 Seema Jangra and Amit Kant Pandit. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.