IMPLEMENTATION AND ANALYSIS OF ENHANCEMENT IN OPPORTUNISTIC NETWORK USING NS2
DOI:
https://doi.org/10.18623/rvd.v23.6384Palavras-chave:
Opportunistic Network, Bundle Layer, Store-Carry-Forward Manner and Relay TechniqueResumo
Opportunistic network is a new class of wireless network. This network is based on store-carry-forward mechanism. An architecture and functionality are different from another wireless network such as wireless sensor network or mobile ad hoc network. Unlike mobile ad hoc network opportunistic network do not need end to end path between source and destination nodes for providing communication between them. In this paper, methodology for enhancement in opportunistic network is proposed and implement by using network simulation. Multi-hop relay technique and Virtual-ID used together to enhance the performance of opportunistic network and at last performance of opportunistic network is analyzed by using three different cases in opportunistic network.
Referências
Bhandari, S., & Arora, S. (2015a). Issues of multi-hop relaying in opportunistic network. International Journal of Research, 2(10).
Bhandari, S., & Arora, S. (2015b). Privacy enhancement of node in opportunistic network by using virtual-ID. International Journal on Soft Computing, 6(4).
Chaintreau, A., Hui, P., Crowcroft, J., Diot, C., Gass, R., & Scott, J. (2006). Impact of human mobility on the design of opportunistic forwarding algorithms. In Proceedings of IEEE INFOCOM 2006. IEEE Computer Society.
Costantino, G., Martinelli, F., & Santi, P. (2012). Privacy-preserving interest casting in opportunistic networks. In Proceedings of the IEEE Wireless Communications and Networking Conference: Mobile and Wireless Networks. IEEE.
Dong, W., Dave, V., Qiu, L., & Zhang, Y. (2011). Secure friend discovery in mobile social networks. In Proceedings of IEEE INFOCOM 2011 (pp. 1647–1655). IEEE.
Dora, L., & Holczer, T. (2010). Hide-and-lie: Enhancing application-level privacy in opportunistic networks. In Proceedings of the Second International Workshop on Mobile Opportunistic Networking (MobiOpp) (pp. 135–142). ACM.
Fall, K. (2003). A delay-tolerant network architecture for challenged internets. In Proceedings of the ACM Conference on Applications, Technologies, Architecture and Protocols for Computer Communications (pp. 27–34). ACM.
Jain, S., Fall, K., & Patra, R. (2004). Routing in a delay tolerant network. In Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (pp. 145–158). ACM.
Jan, P., Doboš, L., & Čižmar, A. (2012). Opportunistic networks and security. Journal of Electrical and Electronics Engineering, 5(1), 163–166.
Lilien, L., Kamal, Z. H., Bhuse, V., & Gupta, A. (2006). The concept of opportunistic network and their research challenges in privacy and security. In Mobile and wireless network security and privacy (pp. 85–117). Springer.
Mohammed, S. A., & Sadkhan, S. B. (2012). Design of wireless network based on NS2. Journal of Global Research in Computer Science, 3(12), 1–8.
Nain, D., Petigara, N., & Balakrishnan, H. (2003). Integrated routing and storage for messaging applications in mobile ad hoc networks. In Proceedings of WiOpt'03: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks. INRIA.
NS-2. (n.d.). The NS manual (formally known as NS documentation). https://www.isi.edu/nsnam/ns/doc
Pelusi, L., Passarella, A., & Conti, M. (2006). Opportunistic networking: Data forwarding in disconnected mobile ad hoc networks. IEEE Communications Magazine, 44(11).
Poonguzharselvi, B., & Vetriselvi, V. (2012). Trust framework for data forwarding in opportunistic network using mobile traces. International Journal of Wireless Network, 4(6), 115–126.
Shikfa, A., Onen, M., & Molva, R. (2010). Privacy and confidentiality in context based and epidemic forwarding. Computer Communications, 1493–1504.
Shikfa, A., Onen, M., & Molva, R. (2012). Local key management in opportunistic network. International Journal of Networks and Distributed Systems, 9(1), 97–116.
Yao, A. C. (1982). Protocols for secure computation. In Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science (FOCS) (pp. 160–164). IEEE.
Zhang, Y., Zhang, J., Sun, G., & Yan. (2012). Fine-grained private matching for proximity-based mobile social networking. In Proceedings of IEEE INFOCOM 2012 (pp. 1969–1977). IEEE.
Zheng, Y., Xie, X., & Ma, W. (2010). GeoLife: A collaborative social networking service among user, location and trajectory. IEEE Data Engineering Bulletin, 33(2), 32–40.
Downloads
Publicado
Como Citar
Edição
Seção
Licença
Submeto (emos) o presente trabalho, texto original e inédito, de minha (nossa) autoria, à avaliação de Veredas do Direito - Revista de Direito, e concordo (amos) que os direitos autorais a ele referentes se tornem propriedade exclusiva da Revista Veredas, sendo vedada qualquer reprodução total ou parcial, em qualquer outra parte ou outro meio de divulgação impresso ou eletrônico, dissociado de Veredas do Direito, sem que a necessária e prévia autorização seja solicitada por escrito e obtida junto ao Editor-gerente. Declaro (amos) ainda que não existe conflito de interesse entre o tema abordado, o (s) autor (es) e empresas, instituições ou indivíduos.
Reconheço (Reconhecemos) ainda que Veredas está licenciada sob uma LICENÇA CREATIVE COMMONS:
Licença Creative Commons Attribution 3.0


