Abstract

In this paper will discuss and examine message transmission from the attacker process within the scope of Delay Tolerance Networks (DTNs). DTNs are a new area of research that can be developed in networking. Delay-tolerant networks are those networks that may not have a complete path between networks end-to-end via direct links and may be under development for a long time. As part of the improvement, we will compare a survey of DTN routing protocols with a real region area, and then taking into account the possibilities of detecting the presence of areas of weakness that lead to penetration, which will occur in the nodes while on the move. In this study, we will use the ONE simulator to track messages within nodes.

Highlights

  • Personal devices have a communication by voice and data when using mobile phone or laptop in ad-hoc networks, since the mobile devices are virtually always turned on and have radio interfaces, processor, data storage and battery usage

  • As part of the improvement, we will compare a survey of Delay Tolerance Networks (DTNs) routing protocols with a real region area, and taking into account the possibilities of detecting the presence of areas of weakness that lead to penetration, which will occur in the nodes while on the move

  • We can see that Epidemic routing protocols have more speed when looking at delivering messages, but delivery probability has the lowest one

Read more

Summary

Introduction

Personal devices have a communication by voice and data when using mobile phone or laptop in ad-hoc networks, since the mobile devices are virtually always turned on and have radio interfaces, processor, data storage and battery usage. Delay and disruption-tolerant networks (DTNs) have characteristics of low connectivity; this is because it doesn?t have direct path connection from source to destination In this kind of environment of routing protocols that depend on AOVD (Perkins & Royer 1999) and DSR (Johnson & Maltz 1996), it will fail to route messages. DTN is a model for computer networks and a rule system for transmitting information, often referred to as a set of protocols, which extends the capabilities of the Internet to the challenging communication environments of a space where the traditional Internet does not function well These environments are typically subject to frequent disruptions, restricted one-way connections, and possibly long delays and high error rates. The results of the analysis and conclusion will be explained in sections five and six

Routing Protocol Classification
Epidemic Routing
PRoPHET Routing
Direct Delay Routing
Black Hole Attack
Selfish Attack
Steganography and Deep Learning
Simulation Setup
Simulation Parameters
Analysis Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.