Professional Documents
Culture Documents
Abstract— Delay (or disruption) tolerant networks (DTNs) have of the connecting nodes which is expected to communicate
widely studied as promising technology for providing with the receiver or closer-to-receiver nodes to store the data
communications in environments where all nodes are not to relay the communication. Which and how many nodes are
connected with each other. Assuming the existence of adversary selected are depending on the routing protocol applied. In the
nodes, in this study we evaluate effectiveness of erasure-code-
figure, the sender requests to two nodes painted with dark
based DTN routing in terms of secure transmission. We combine
secret-sharing-based multi-path routing with several routing color to relay the data. After the upper node leaves from the
strategies, and evaluate the ratio of successful transmission by sender, it connects to another relaying node, and when the
simulation. second relaying node connects to the receiver, transmission
between the sender and receiver completes.
Keywords-Delay Tolerant Network, contact avoidance, multi-
path routing, erasure code
I. INTRODUCTION sender
receiver
Success Ratio
infinite computational ability, thus existing data encryption 0.6
C
III. EVALUATION OF ERASURE-CODE-BASED DTN Figure 3. Simulation results of ratio of successful transmission for
ROUTING FOR CONTACT AVOIDANCE different number of adversaries. (100 nodes, (4, 8) secret sharing)
We evaluate the effectiveness of erasure-code-based Figure 4 compares the transmission delay for successful
routing in terms of not only delay reduction but also secure transmission, in the same setup as Fig. 3. In exchange of
transmission under existence of adversary nodes. We assume improved reachability, delay is increased.
to apply (k, n) secret sharing which is information- 50 A+D
theoretically secure, that is, even the set of adversaries with C+L+A+D
C+L+A
infinite computational ability cannot reconstruct the original 40 C+L
Average of Success_time
C+A+D
data unless they acquire at least k out of n fragments. C+A
30 C
In addition to erasure coding (C), we applied the
combination of the following three strategies to routing 20
protocol:
10
Longcut avoidance (L): avoids to select nodes which are not
0
closer to the receiver 0 2 4 6 8 10
Advsersary avoidance (A): avoids to select adversary nodes # adversaries
216