Font Size: a A A

On The Protocol And Security Problems In Delay Tolerant Networks

Posted on:2014-02-24Degree:MasterType:Thesis
Country:ChinaCandidate:S J LiuFull Text:PDF
GTID:2248330392960899Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Delay tolerant networks (DTN) is a kind of networks without stableand constant interconnections, caused by extreme environment such as themobility of communication devices, sparse distribution, high possibility ofbreakdown, and the limitation of energy. Recently, dozens of worksfocuses on the routing problem in DTN environment. To ensure thedelivery rate, most of those schemes use replication-based strategy totransmit the messages, which is wasteful with network resources and easyto cause network congestion. NDN is a newly proposed network protocolmodel. Compared to the traditional TCP/IP architecture, in NDN, routingis based on the data and the name of data the user request, instead of thephysical location or IP address where data actually reside. Thiscommunication paradigm provides us some new methods to build therouting algorithm and other solution under DTN.The thesis proposes a new DTN protocol based on Publish/Subscribemulticast primitive, and a channel-oriented routing algorithm to improvethe performance of networks.The thesis also have a deep discussion on the security and privacyissues under DTN environment and the probable attacks in our scheme,such as privacy leakage, DDos attack, and misbehavior of selfish nodes innetworks. To solve these challenges, the thesis proposes a suite ofsolutions for security and privacy protection, including: privacy protectedauthentication based on group signature and aggregated signature;congestion control scheme based on hash chain; efficient and secureincentive scheme for DTN routing, which calls Incentive Spray&Wait. The analysis and simulation show that the channel oriented routingalgorithm can improve the performance of whole networking, and thesecurity schemes can effectively protect the networking from multiplekinds of attacks and courage cooperation among selfish nodes.
Keywords/Search Tags:Delay tolerant networks, Publish/Subscribe multicastprotocol, privacy protection, security protocol, DTNincentive scheme
PDF Full Text Request
Related items