IMPLEMENTATION AND ANALYSIS OF ENHANCEMENT IN OPPORTUNISTIC NETWORK USING NS2
DOI:
https://doi.org/10.18623/rvd.v23.6384Keywords:
Opportunistic Network, Bundle Layer, Store-Carry-Forward Manner and Relay TechniqueAbstract
Opportunistic network is a new class of wireless network. This network is based on store-carry-forward mechanism. An architecture and functionality are different from another wireless network such as wireless sensor network or mobile ad hoc network. Unlike mobile ad hoc network opportunistic network do not need end to end path between source and destination nodes for providing communication between them. In this paper, methodology for enhancement in opportunistic network is proposed and implement by using network simulation. Multi-hop relay technique and Virtual-ID used together to enhance the performance of opportunistic network and at last performance of opportunistic network is analyzed by using three different cases in opportunistic network.
References
Bhandari, S., & Arora, S. (2015a). Issues of multi-hop relaying in opportunistic network. International Journal of Research, 2(10).
Bhandari, S., & Arora, S. (2015b). Privacy enhancement of node in opportunistic network by using virtual-ID. International Journal on Soft Computing, 6(4).
Chaintreau, A., Hui, P., Crowcroft, J., Diot, C., Gass, R., & Scott, J. (2006). Impact of human mobility on the design of opportunistic forwarding algorithms. In Proceedings of IEEE INFOCOM 2006. IEEE Computer Society.
Costantino, G., Martinelli, F., & Santi, P. (2012). Privacy-preserving interest casting in opportunistic networks. In Proceedings of the IEEE Wireless Communications and Networking Conference: Mobile and Wireless Networks. IEEE.
Dong, W., Dave, V., Qiu, L., & Zhang, Y. (2011). Secure friend discovery in mobile social networks. In Proceedings of IEEE INFOCOM 2011 (pp. 1647–1655). IEEE.
Dora, L., & Holczer, T. (2010). Hide-and-lie: Enhancing application-level privacy in opportunistic networks. In Proceedings of the Second International Workshop on Mobile Opportunistic Networking (MobiOpp) (pp. 135–142). ACM.
Fall, K. (2003). A delay-tolerant network architecture for challenged internets. In Proceedings of the ACM Conference on Applications, Technologies, Architecture and Protocols for Computer Communications (pp. 27–34). ACM.
Jain, S., Fall, K., & Patra, R. (2004). Routing in a delay tolerant network. In Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (pp. 145–158). ACM.
Jan, P., Doboš, L., & Čižmar, A. (2012). Opportunistic networks and security. Journal of Electrical and Electronics Engineering, 5(1), 163–166.
Lilien, L., Kamal, Z. H., Bhuse, V., & Gupta, A. (2006). The concept of opportunistic network and their research challenges in privacy and security. In Mobile and wireless network security and privacy (pp. 85–117). Springer.
Mohammed, S. A., & Sadkhan, S. B. (2012). Design of wireless network based on NS2. Journal of Global Research in Computer Science, 3(12), 1–8.
Nain, D., Petigara, N., & Balakrishnan, H. (2003). Integrated routing and storage for messaging applications in mobile ad hoc networks. In Proceedings of WiOpt'03: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks. INRIA.
NS-2. (n.d.). The NS manual (formally known as NS documentation). https://www.isi.edu/nsnam/ns/doc
Pelusi, L., Passarella, A., & Conti, M. (2006). Opportunistic networking: Data forwarding in disconnected mobile ad hoc networks. IEEE Communications Magazine, 44(11).
Poonguzharselvi, B., & Vetriselvi, V. (2012). Trust framework for data forwarding in opportunistic network using mobile traces. International Journal of Wireless Network, 4(6), 115–126.
Shikfa, A., Onen, M., & Molva, R. (2010). Privacy and confidentiality in context based and epidemic forwarding. Computer Communications, 1493–1504.
Shikfa, A., Onen, M., & Molva, R. (2012). Local key management in opportunistic network. International Journal of Networks and Distributed Systems, 9(1), 97–116.
Yao, A. C. (1982). Protocols for secure computation. In Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science (FOCS) (pp. 160–164). IEEE.
Zhang, Y., Zhang, J., Sun, G., & Yan. (2012). Fine-grained private matching for proximity-based mobile social networking. In Proceedings of IEEE INFOCOM 2012 (pp. 1969–1977). IEEE.
Zheng, Y., Xie, X., & Ma, W. (2010). GeoLife: A collaborative social networking service among user, location and trajectory. IEEE Data Engineering Bulletin, 33(2), 32–40.
Downloads
Published
How to Cite
Issue
Section
License
I (we) submit this article which is original and unpublished, of my (our) own authorship, to the evaluation of the Veredas do Direito Journal, and agree that the related copyrights will become exclusive property of the Journal, being prohibited any partial or total copy in any other part or other printed or online communication vehicle dissociated from the Veredas do Direito Journal, without the necessary and prior authorization that should be requested in writing to Editor in Chief. I (we) also declare that there is no conflict of interest between the articles theme, the author (s) and enterprises, institutions or individuals.
I (we) recognize that the Veredas do Direito Journal is licensed under a CREATIVE COMMONS LICENSE.
Licença Creative Commons Attribution 3.0


