Trust and Security Management Protocol for Delay Tolerant Networks Using Information Centric Network Architecture (ICNA)

Authors

  • M Arshiya Shajareen Dept. of Computer Science and Engineering,Jntu A, India
  • S Vasundra Dept. of Computer Science and Engineering,Jntu A, India

Keywords:

Verification and Validation, Delay Tolerant Networking, Secure Routing, Performance Analysis

Abstract

Disconnected MANETs have been called as challenged networks and Delay-Tolerant Network (DTN). A DTN provides interoperable communications with and among challenged environments. A challenged network is defined as a network that has one or more of the following characteristics: high end-to-end path latency; end-to-end disconnection meaning a path between a node pair may never exist; limited resources or limited life expectancy either due to lack of battery power, such as in sensor networks, or node damage as may occur in battlefield deployments. Such networks may never have an end-to-end path from source to destination at a given time. Security concerns for delay-tolerant networks vary depending on the environment and application, though authentication and privacy are often critical. The proposed model implements trust and security management protocols for delay tolerant and self contained message forwarding applications based on information centric networks architecture. Further, it is aimed to test the dynamic trust management protocol design on other trust based DTN applications for showing better utility of the algorithm.

References

Ing-Ray Chen, Fenye Bao, “Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 5, MAY 2014, pp.1200-1210.

W. Stallings, Network Security Essentials: Applications and Standards. Prentice Hall Pearson Education Inc., 2003.

P. Windley, Digital Identity. O'Reilly, 12, Aug. 2005.

R. S. Sandhu and P. Samarati, Access Control: Principles and Practice," IEEE Communications Magazine, vol. 32, no. 9, pp. 40{48, 1994.

R. Sinnott, D. W. Chadwick, T. Doherty, D. Martin, A. J. Stell, G. Stewart, L. Su, and J.Watt, Advanced Security for Virtual Organisations: Exploring the Pros and Cons of Centralised vs Decentralized Security Models," in 8th IEEE International Symposium on Cluster Computing and the Grid (CCGrid), Lyon, France, May 2008, May 2008.

T. Dierks and E. Rescorla, The Transport Layer Security (TLS) Protocol Version 1.1." Request for Comments RFC 4346, April 2006.

S. Shirasuna, A. Slominski, L. Fang, and D. Gannon, Performance Comparison of Security Mechanisms for Grid Services," in GRID '04: Proceedings of the Fifth IEEE/ACM International Workshop on Grid Computing, (Washington, DC, USA), pp. 360{364, IEEE Computer Society, 2004.

National Institute of Standards and Technology, Secure Hash Standard (SHS), FIPSPUB 180-1." http://www.itl.nist.gov/_pspubs/_p180-1.htm, 1995. (Visited December 2008).

M. Benantar, Access Control Systems: Security, Identity Management and Trust Models. Secaucus, NJ, USA: Springer-Verlag New York, Inc., 2005.

S. P. Marsh, “Formalising Trust as a Computational Concept,” Department of Computing Science and Mathematics, University of Stirling, Stirling, UK, 1994.

E. Aivaloglou, and S. Gritzalis, “Trust–Based Data Disclosure in Sensor Networks,” IEEE International Conference on Communications, 2009, pp. 1-6.

Downloads

Published

2025-11-10

How to Cite

[1]
M. Arshiya Shajareen and S. Vasundra, “Trust and Security Management Protocol for Delay Tolerant Networks Using Information Centric Network Architecture (ICNA)”, Int. J. Comp. Sci. Eng., vol. 3, no. 7, pp. 6–11, Nov. 2025.

Issue

Section

Research Article