Open Access   Article Go Back

Provenance Based Assurance Model for Delay Tolerant Network

K. Soni1 , Prabadevi. B2

Section:Research Paper, Product Type: Journal Paper
Volume-5 , Issue-4 , Page no. 105-110, Apr-2017

Online published on Apr 30, 2017

Copyright © K. Soni, Prabadevi. B . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: K. Soni, Prabadevi. B, “Provenance Based Assurance Model for Delay Tolerant Network,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.4, pp.105-110, 2017.

MLA Style Citation: K. Soni, Prabadevi. B "Provenance Based Assurance Model for Delay Tolerant Network." International Journal of Computer Sciences and Engineering 5.4 (2017): 105-110.

APA Style Citation: K. Soni, Prabadevi. B, (2017). Provenance Based Assurance Model for Delay Tolerant Network. International Journal of Computer Sciences and Engineering, 5(4), 105-110.

BibTex Style Citation:
@article{Soni_2017,
author = {K. Soni, Prabadevi. B},
title = {Provenance Based Assurance Model for Delay Tolerant Network},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2017},
volume = {5},
Issue = {4},
month = {4},
year = {2017},
issn = {2347-2693},
pages = {105-110},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1251},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1251
TI - Provenance Based Assurance Model for Delay Tolerant Network
T2 - International Journal of Computer Sciences and Engineering
AU - K. Soni, Prabadevi. B
PY - 2017
DA - 2017/04/30
PB - IJCSE, Indore, INDIA
SP - 105-110
IS - 4
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
626 468 downloads 512 downloads
  
  
           

Abstract

Use of End to End connectivity in todays network connectivity is not secure due to its delay and disconnection. This problem can be avoided by the Provenance-based Assurance model proposed in this paper. This model first assures that a node is trustworthy and to whom the data will be sent. It evaluates trust by the information added by the message carrier as indirect clue when message is forwarding. So the problem of disconnection and delay can reduce by this strategy. This model first splits the file into packets then these packets will be encrypted by using DES algorithm with the secret key which is given by sender. After this we will cluster the nodes and send the packets to receiver’s end. Receiver will receive the packets and decrypt it using the same secret key which sender use for encryption. After decrypting it, receiver will get the original file content. This proposed system ensures high level of security with low communicational cost and high performance.

Key-Words / Index Term

Delay Tolerant Network, End to End Connectivity, Provenance-based Assurance Model, Disconnection, DES Algorithm, Cluster

References

[1] Cho, Jin-Hee, Ray Chen, “PROVEST: Provenance-based Trust Model for Delay Tolerant Networks”, IEEE Transactions on Dependable and Secure Computing, Vol. PP, Issue.99, pp. 1-1, 2016.
[2] B. MALATHY , S.ROSY ROBILDA, “Secure and Reliable ESTAR with Alert Protocols for Heterogeneous Multihop Wireless Network”, International Conference on Emerging Engineering Trends and Science, Vol. 26, Issue.4, pp. 1140-1153, 2016.
[3] M.Arshiya Shajareen, S. Vasundra, "Trust and Security Management Protocol for Delay Tolerant Networks Using Information Centric Network Architecture (ICNA)”, International Journal of Computer Sciences and Engineering, Vol.3, Issue.7, pp.6-11, 2015.
[4] P. McDaniel, “Data provenance and security”, IEEE Security and Privacy, Vol. 9, Issue.2, pp. 83–85, 2011.
[5] Reinier-Jan DeLange, “Provenance Aware Sensor Networks for Real-time Data Analysis”, Master thesis from University of Twente, Netherlands pp.1-220, 2010.
[6] T. Spyropoulos, R. Rais, T. Turletti, K. Obraczka, A. Vasilakos, “Routing for disruption tolerant networks: taxonomy and design”, Wireless Networks, Vol. 16, No. 8, pp. 2349–2370, 2010.
[7] Aldeco-Pérez, Rocío, Luc Moreau. "Securing provenance-based audits”, In International Provenance and Annotation Workshop, Berlin Heidelberg, pp. 148-164, 2010.
[8] R. Hasan, R. Sion, M. Winslett, “The case of the fake picasso: preventing history forgery with secure provenance”, in Proceedings of the 7th Conference on File and Storage Technologies, Berkeley, pp. 1–14, 2009.
[9] L. Moreau, J. Freire, J. Futrelle, R. McGrath, J. Myers, P. Paulson, “The open provenance model: an overview”, in International Provenance and Annotation Workshop, Utah, pp. 323-326, 2008.
[10] Zhou, Runfang, Kai Hwang, “Powertrust: A robust and scalable reputation system for trusted peer-to-peer computing”, IEEE Transactions on Parallel and Distributed Systems, Vol. 18, Issue. 4, pp. 460 - 473 2007.
[11] J. Golbeck, “Combining provenance with trust in social networks for semantic web content filtering”, Provenance and Annotation of Data, USA, pp. 101-108, 2006.
[12] Yeo, Jihwang, David Kotz, Tristan Henderson, “CRAWDAD: a Community Resource for Archiving Wireless Data at Dartmouth”, ACM SIGCOMM Computer Communication Review, Vol. 4, Issue.4, pp.12-14, 2005.
[13] A. Lindgren, O. Doria, “Probabilistic routing in intermittently connected networks”, ACM SIGMOBILE mobile computing and communications review, Vol.7, Issue.3, pp.19-20, 2003.
[14] Li. Xiong,, L. Liu, “Peertrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities”, IEEE transactions on Knowledge and Data Engineering, Vol. 16, Issue. 7, pp. 843-857, 2004.
[15] AA. Selcuk, Ersin Uzun, PM. Resat, “A Reputation-Based Trust Management System for P2P Networks”,. IEEE International Symposium on Cluster Computing and the Grid, USA, pp. 251-258. IEEE, 2004.
[16] J. Golbeck, JA. Hendler, “Reputation Network Analysis for Email Filtering”, Conference on Email and Anti-Spam (CEAS), USA, pp.1-14, 2004.
[17] R. Ismail, “The beta reputation system”, in Bled Electronic Commerce Conference, Slovenia, pp.1-14, 2002.
[18] P. Buneman, S. Khanna, W. Tan, “Why and where: A characterization of data provenance”, in Proceedings of International Conference on Database Theory, Springer-Verlag, pp. 316–330, 2001.
[19] O. Pourgalehdari, M. Salari, "A Review on Data Aggregation Protocols in Wireless Networks", International Journal of Computer Sciences and Engineering, Vol.5, Issue.3, pp.50-56, 2017.