Provenance-Based Assurance Model for Delay Tolerant Network

Authors

  • K Soni Dept. of CSE, VIT University, Vellore, India
  • Prabadevi B Dept. of CSE, VIT University, Vellore, India

Keywords:

Delay Tolerant Network, End to End Connectivity, Provenance-based Assurance Model, Disconnection, DES Algorithm, Cluster

Abstract

Use of End to End connectivity in today’s network connectivity is not secure due to its delay and disconnection. This problem can be avoided by the Provenance-based Assurance model proposed in this paper. This model first assures that a node is trustworthy and to whom the data will be sent. It evaluate trust by the information added by the message carrier as indirect clue when message is forwarding. So the problem of disconnection and delay can reduce by this strategy. This model first splits the file into packets then these packets will be encrypted by using DES algorithm with the secret key which is given by sender. After this we will cluster the nodes and send the packets to receiver’s end. Receiver will receive the packets and decrypt it using the same secret key which sender use for encryption. After decrypting it, receiver will get the original file content. This proposed system ensures high level of security with low communicational cost and high performance.

References

Cho, Jin-Hee, Ray Chen, “PROVEST: Provenance-based Trust Model for Delay Tolerant Networks”, IEEE Transactions on Dependable and Secure Computing, Vol. PP, Issue.99, pp. 1-1, 2016.

B. MALATHY , S.ROSY ROBILDA, “Secure and Reliable ESTAR with Alert Protocols for Heterogeneous Multihop Wireless Network”, International Conference on Emerging Engineering Trends and Science, Vol. 26, Issue.4, pp. 1140-1153, 2016.

M.Arshiya Shajareen, S. Vasundra, "Trust and Security Management Protocol for Delay Tolerant Networks Using Information Centric Network Architecture (ICNA)”, International Journal of Computer Sciences and Engineering, Vol.3, Issue.7, pp.6-11, 2015.

P. McDaniel, “Data provenance and security”, IEEE Security and Privacy, Vol. 9, Issue.2, pp. 83–85, 2011.

Reinier-Jan DeLange, “Provenance Aware Sensor Networks for Real-time Data Analysis”, Master thesis from University of Twente, Netherlands pp.1-220, 2010.

T. Spyropoulos, R. Rais, T. Turletti, K. Obraczka, A. Vasilakos, “Routing for disruption tolerant networks: taxonomy and design”, Wireless Networks, Vol. 16, No. 8, pp. 2349–2370, 2010.

Aldeco-Pérez, Rocío, Luc Moreau. "Securing provenance-based audits”, In International Provenance and Annotation Workshop, Berlin Heidelberg, pp. 148-164, 2010.

R. Hasan, R. Sion, M. Winslett, “The case of the fake picasso: preventing history forgery with secure provenance”, in Proceedings of the 7th Conference on File and Storage Technologies, Berkeley, pp. 1–14, 2009.

L. Moreau, J. Freire, J. Futrelle, R. McGrath, J. Myers, P. Paulson, “The open provenance model: an overview”, in International Provenance and Annotation Workshop, Utah, pp. 323-326, 2008.

Zhou, Runfang, Kai Hwang, “Powertrust: A robust and scalable reputation system for trusted peer-to-peer computing”, IEEE Transactions on Parallel and Distributed Systems, Vol. 18, Issue. 4, pp. 460 - 473 2007.

J. Golbeck, “Combining provenance with trust in social networks for semantic web content filtering”, Provenance and Annotation of Data, USA, pp. 101-108, 2006.

Yeo, Jihwang, David Kotz, Tristan Henderson, “CRAWDAD: a Community Resource for Archiving Wireless Data at Dartmouth”, ACM SIGCOMM Computer Communication Review, Vol. 4, Issue.4, pp.12-14, 2005.

A. Lindgren, O. Doria, “Probabilistic routing in intermittently connected networks”, ACM SIGMOBILE mobile computing and communications review, Vol.7, Issue.3, pp.19-20, 2003.

Li. Xiong,, L. Liu, “Peertrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities”, IEEE transactions on Knowledge and Data Engineering, Vol. 16, Issue. 7, pp. 843-857, 2004.

AA. Selcuk, Ersin Uzun, PM. Resat, “A Reputation-Based Trust Management System for P2P Networks”,. IEEE International Symposium on Cluster Computing and the Grid, USA, pp. 251-258. IEEE, 2004.

J. Golbeck, JA. Hendler, “Reputation Network Analysis for Email Filtering”, Conference on Email and Anti-Spam (CEAS), USA, pp.1-14, 2004.

R. Ismail, “The beta reputation system”, in Bled Electronic Commerce Conference, Slovenia, pp.1-14, 2002.

P. Buneman, S. Khanna, W. Tan, “Why and where: A characterization of data provenance”, in Proceedings of International Conference on Database Theory, Springer-Verlag, pp. 316–330, 2001.

O. Pourgalehdari, M. Salari, "A Review on Data Aggregation Protocols in Wireless Networks", International Journal of Computer Sciences and Engineering, Vol.5, Issue.3, pp.50-56, 2017.

Downloads

Published

2025-11-11

How to Cite

[1]
K. Soni and B. Prabadevi, “Provenance-Based Assurance Model for Delay Tolerant Network”, Int. J. Comp. Sci. Eng., vol. 5, no. 4, pp. 105–110, Nov. 2025.

Issue

Section

Research Article