Skip to main content
Log in

An incentive driven reliable message exchange scheme in post-disaster situation using delay tolerant network

  • Special Issue ICAC 2016 of CSIT
  • Published:
CSI Transactions on ICT Aims and scope Submit manuscript

Abstract

In post-disaster situation, re-establishment of communication infrastructure is very critical task. For that delay tolerant network is used by smart phone users like volunteers or victims. In such fragile environment, data can be forwarded by store-carry-forward mechanism. So, for data delivery, multi-hop communication and proper cooperation among nodes are very important aspects. Volunteers are working by forming small groups. In such sensational environment secure and instantaneous group communication among volunteer nodes and to remote monitoring system is imperative as there can be various malicious nodes intentionally intercept and alter data for the purpose of fraudulence. So, proper mechanism is required to detect malicious nodes and encourage them to participate by giving them incentives. Here, the objective is to develop incentive based secure message exchange scheme for reliable data communication. Opportunistic network environment simulator is used for performance measurement.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Asplund M, Tehrani SN, Sigholm J (2009) Emerging information infrastructures: cooperation in disasters, critical information infrastructure security. Third international workshop, CRITIS. 13–15 Oct 2009, Rome, pp 258–270

  2. The audit of disaster-related aid (Main), ISSAI 5520. http://eca.europa.eu/portal/pls/portal/docs/1/22006772.PDF

  3. Chakrabarti C, Banerjee A, Roy S (2014) An observer-based distributed scheme for selfish-node detection in a post-disaster communication environment using delay tolerant network. In: Proceedings of 2014 IEEE international conference on applications and innovations in mobile computing. 1 Feb 27–Mar 2014, Kolkata, pp 151–156

  4. Chakrabarti C, Chaki R (2011) Improved cluster based route discovery algorithm for ad hoc networks. In: Proceedings of IEEE international conference of communications and its industrial applications. 26–28 Dec 2011, Kolkata, pp 1–4

  5. Li F, Zhang C, Gao Z, Zhao L, Wang Y (2012) Social feature enhanced group-based routing for wireless delay tolerant networks. In: Proceedings of eighth IEEE international conference on mobile ad hoc and sensor networks (MSN). 14–16 Dec 2012, Chengdu, pp 68–74

  6. Wu J, Xiao M, Huang L (2013) Homing spread. Community home-based multi-copy routing in mobile social networks. In: Proceedings of 32nd IEEE conference on computer communications IEEE INFOCOM. 14–19 Apr 2013, Turin, pp 2319–2327

  7. Zhou R, Cao Y, Jin J, Zhu D (2010) Group based epidemic routing for delay and tolerant networks. In: Proceedings of 2010 6th international conference on wireless communications networking and mobile computing (WiCOM). 23–25 Sept 2010, Chengdu, pp 1–4

  8. Chang JW, Chien C (2014) CROP community-relevance-based opportunistic routing in delay tolerant networks. In: Proceedings of IEICE TRANSACTIONS on communications, vol E97-B no. 9. 01 Sept 2014, pp 1875–1888

  9. Chakrabarti C, Roy S (2015) Adapting mobility of observers for quick reputation assignment in a sparse post-disaster communication network. In: Proceedings of IEEE applications and innovations in mobile computing (AIMoC). 12–14 Feb 2015, Kolkata, pp 29–35

  10. Chakrabarti C, Banerjee A, Chakrabarti S (2014) A secured group-based communication scheme in disaster response environment using delay tolerant network. In: Proceedings of international conference on computational advancement in communications circuits and systems (ICCACCS), Springer proceedings of lecture notes in electrical engineering, vol 335. Oct 30–Nov 1 2014, Kolkata, pp 217–227. ISBN:978-81-322-2273-6

  11. Chakrabarti C, Banerjee A, Chakrabarti S, Chakraborty A (2014) A novel approach for non-cooperative node detection and avoidance using reputation based scheme in mobile ad hoc network. In: Proceedings of international conference on computational advancement in communications circuits and systems (ICCACCS), Springer proceedings of lecture notes in electrical engineering, vol 335. Oct 30–Nov 1 2014, Kolkata, pp 279–289. ISBN:978-81-322-2273-6

  12. Banerjee A, Chakrabarti C, Chakraborty A (2014) A new approach to trace the behaviour pattern of nodes in delay tolerant network. In: Proceedings of international conference on computational advancement in communications circuits and systems (ICCACCS), Springer proceedings of lecture notes in electrical engineering, vol 335. Oct 30–Nov 1 2014, Kolkata, pp 229–237. ISBN:978-81-322-2273-6

  13. Chakrabarti C, Banerjee A, Chakrabarti S, Chakraborty A (2014) A dynamic reputation estimation technique for selfish node detection and avoidance of non-cooperative nodes in mobile ad hoc network. In: Proceedings of IEM CONGRESS, Elsevier Publications 2014. 28–29 Aug 2014, Kolkata, pp 246–253. ISBN:9789351072485

  14. Banerjee A, Chakrabarti C, Chakraborty A, Chakrabarti, S (2014) A comparative survey on detection and prevention of different routing attacks on MANET. In: Proceedings of IEM CONGRESS, Elsevier Publications 2014. 28–29 Aug 2014, Kolkata, pp 232–237. ISBN:9789351072485

  15. Chakrabarti C (2014) A secured message exchange scheme in post-disaster environment using delay tolerant network. Glob J Res Anal 3(10):64–66. ISSN:2277-8160

  16. Bigwood G, Henderson T (2011) Ironman: using social networks to add incentives and reputation to opportunistic networks. In: Proceedings of IEEE international conference on privacy, security, risk, and trust, and ieee international conference on social computing. 9–11 Oct 2011, Boston, pp 65–72

  17. The Opportunistic Network Environment simulator (The ONE) (2010) http://www.netlab.tkk.fi/tutkimus/dtn/theone/Ver.1.4.0

  18. Chakrabarti C, Chakrabarti S, Chakrabarti SK (2014) Towards cluster based mobility aware secured ad hoc network. In: Proceedings of IEM CONGRESS, Elsevier Publications 2014. 28–29 Aug 2014, Kolkata, pp 123–128. ISBN:9789351072485

  19. Banerjee A, Chakraborty A, Chakrabarti C (2014) Survey on analysis of damage and need assessment in post-disaster environment. Int J Innov Res Sci Eng Technol 3(12): 18274–18279. ISSN:2319-8753

  20. Wei L, Cao Z, Zhu H (2011) MobiGame: a user-centric reputation based incentive protocol for delay/disruption tolerant networks. In: Proceedings of IEEE Globecom. 5–9 Dec 2011, Houston, pp 1–5

  21. Wei L, Zhu H, Cao Z, Shen X (2011) MobiId: a user-centric and social aware reputation based incentive scheme for delay/disruption tolerant networks. Ad hoc, mobile, and wireless networks. In: Proceedings of 10th international conference, ADHOC-NOW, vol 6811. Springer, Berlin, 18–20 July 2011, Paderborn, pp 177–190

  22. Hui P, Yoneki E, Chan SY, Crowcroft J (2007) Distributed community detection in delay tolerant networks. In: Proceedings of 2nd ACM/IEEE international workshop on mobility in the evolving internet architecture, ser. MobiArch’07. 27 Aug 2007, New York, pp 7.1–7.8

  23. Miao J, Hasan O, Mokhtar SB, Brunie L, Yim K (2012) An analysis of strategies for preventing selfish behaviour in mobile delay tolerant networks. In: The sixth international conference on innovative mobile and internet services in ubiquitous computing (IMIS-2012). 4–6 July 2012, Palermo, pp 208–215

  24. Buttyan L, Dora L, Felegyhazi M, Vajda I (2010) Barter trade improves message delivery in opportunistic networks. Ad Hoc Netw Elsevier 8(1):1–14

    Article  Google Scholar 

  25. Chen BB, Chan MC (2010) Mobicent: a credit-based incentive system for disruption tolerant network. In: Proceedings of IEEE INFOCOM. 14–19 Mar 2010, San Diego, pp 1–9

  26. Lu R, Lin X, Zhu H, Shen X, Preiss B (2010) Pi: a practical incentive protocol for delay tolerant networks. IEEE Trans Wirel Commun 9(4):1483–1493

    Article  Google Scholar 

  27. Chen I-R, Bao F, Chang MJ, Cho J-H (2014) Dynamic trust management for delay tolerant networks and its application to secure routing. IEEE Trans Parallel Distrib Syst 25(5):1200–1210

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chandrima Chakrabarti.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chakrabarti, C. An incentive driven reliable message exchange scheme in post-disaster situation using delay tolerant network. CSIT 5, 27–34 (2017). https://doi.org/10.1007/s40012-016-0129-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s40012-016-0129-5

Keywords

Navigation