Open Access   Article Go Back

Trust and Security Management Protocol for Delay Tolerant Networks Using Information Centric Network Architecture (ICNA)

M. Arshiya Shajareen1 , S.Vasundra 2

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-7 , Page no. 6-11, Jul-2015

Online published on Jul 30, 2015

Copyright © M. Arshiya Shajareen , S.Vasundra . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: M. Arshiya Shajareen , S.Vasundra , “Trust and Security Management Protocol for Delay Tolerant Networks Using Information Centric Network Architecture (ICNA),” International Journal of Computer Sciences and Engineering, Vol.3, Issue.7, pp.6-11, 2015.

MLA Style Citation: M. Arshiya Shajareen , S.Vasundra "Trust and Security Management Protocol for Delay Tolerant Networks Using Information Centric Network Architecture (ICNA)." International Journal of Computer Sciences and Engineering 3.7 (2015): 6-11.

APA Style Citation: M. Arshiya Shajareen , S.Vasundra , (2015). Trust and Security Management Protocol for Delay Tolerant Networks Using Information Centric Network Architecture (ICNA). International Journal of Computer Sciences and Engineering, 3(7), 6-11.

BibTex Style Citation:
@article{Shajareen_2015,
author = {M. Arshiya Shajareen , S.Vasundra },
title = {Trust and Security Management Protocol for Delay Tolerant Networks Using Information Centric Network Architecture (ICNA)},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2015},
volume = {3},
Issue = {7},
month = {7},
year = {2015},
issn = {2347-2693},
pages = {6-11},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=566},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=566
TI - Trust and Security Management Protocol for Delay Tolerant Networks Using Information Centric Network Architecture (ICNA)
T2 - International Journal of Computer Sciences and Engineering
AU - M. Arshiya Shajareen , S.Vasundra
PY - 2015
DA - 2015/07/30
PB - IJCSE, Indore, INDIA
SP - 6-11
IS - 7
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2639 2563 downloads 2433 downloads
  
  
           

Abstract

Disconnected MANETs have been called as challenged networks and Delay-Tolerant Network (DTN). A DTN provides interoperable communications with and among challenged environments. A challenged network is defined as a network that has one or more of the following characteristics: high end-to-end path latency; end-to-end disconnection meaning a path between a node pair may never exist; limited resources or limited life expectancy either due to lack of battery power, such as in sensor networks, or node damage as may occur in battlefield deployments. Such networks may never have an end-to-end path from source to destination at a given time. Security concerns for delay-tolerant networks vary depending on the environment and application, though authentication and privacy are often critical. The proposed model implements trust and security management protocols for delay tolerant and self contained message forwarding applications based on information centric networks architecture. Further, it is aimed to test the dynamic trust management protocol design on other trust based DTN applications for showing better utility of the algorithm.

Key-Words / Index Term

Verification and Validation; Delay Tolerant Networking; Secure Routing; Performance Analysis

References

[1] Ing-Ray Chen, Fenye Bao, “Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 5, MAY 2014, pp.1200-1210.
[2] W. Stallings, Network Security Essentials: Applications and Standards. Prentice Hall Pearson Education Inc., 2003.
[3] P. Windley, Digital Identity. O'Reilly, 12, Aug. 2005.
[4] R. S. Sandhu and P. Samarati, Access Control: Principles and Practice," IEEE Communications Magazine, vol. 32, no. 9, pp. 40{48, 1994.
[5] R. Sinnott, D. W. Chadwick, T. Doherty, D. Martin, A. J. Stell, G. Stewart, L. Su, and J.Watt, Advanced Security for Virtual Organisations: Exploring the Pros and Cons of Centralised vs Decentralized Security Models," in 8th IEEE International Symposium on Cluster Computing and the Grid (CCGrid), Lyon, France, May 2008, May 2008.
[6] T. Dierks and E. Rescorla, The Transport Layer Security (TLS) Protocol Version 1.1." Request for Comments RFC 4346, April 2006.
[7] S. Shirasuna, A. Slominski, L. Fang, and D. Gannon, Performance Comparison of Security Mechanisms for Grid Services," in GRID '04: Proceedings of the Fifth IEEE/ACM International Workshop on Grid Computing, (Washington, DC, USA), pp. 360{364, IEEE Computer Society, 2004.
[8] National Institute of Standards and Technology, Secure Hash Standard (SHS), FIPSPUB 180-1." http://www.itl.nist.gov/_pspubs/_p180-1.htm, 1995. (Visited December 2008).
[9] M. Benantar, Access Control Systems: Security, Identity Management and Trust Models. Secaucus, NJ, USA: Springer-Verlag New York, Inc., 2005.
[10] S. P. Marsh, “Formalising Trust as a Computational Concept,” Department of Computing Science and Mathematics, University of Stirling, Stirling, UK, 1994.
[11] E. Aivaloglou, and S. Gritzalis, “Trust–Based Data Disclosure in Sensor Networks,” IEEE International Conference on Communications, 2009, pp. 1-6.