Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2016, Article ID 7353691, 18 pages
http://dx.doi.org/10.1155/2016/7353691
Research Article

Cooperation between Trust and Routing Mechanisms for Relay Node Selection in Hybrid MANET-DTN

Department of Electronics and Multimedia Communications, Faculty of Electrical Engineering and Informatics, Technical University of Kosice, Letna 9, 042 00 Kosice, Slovakia

Received 4 January 2016; Revised 8 March 2016; Accepted 23 March 2016

Academic Editor: Ioannis Papapanagiotou

Copyright © 2016 Jan Papaj and Lubomir Dobos. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. A. Cizmar, L. Dobos, and J. Papaj, “Security and QoS integration model for MANETs,” Computing and Informatics, vol. 31, no. 5, pp. 1025–1044, 2012. View at Google Scholar · View at Scopus
  2. J. Papaj, L. Dobos, and A. Čižmár, “Routing strategies in opportunistic networks,” Journal of Electrical and Electronics Engineering, vol. 5, no. 1, pp. 167–172, 2012. View at Google Scholar · View at Scopus
  3. J. Machaj and P. Brida, “Impact of radio map simulation on positioning in indoor environtment using finger printing algorithms,” ARPN Journal of Engineering and Applied Sciences, vol. 10, no. 15, pp. 6404–6409, 2015. View at Google Scholar · View at Scopus
  4. J. Papaj and L. Dobos, “Trust based algorithm for candidate node selection in hybrid MANET-DTN,” Advances in Electrical and Electronic Engineering, vol. 12, no. 4, pp. 271–278, 2014. View at Publisher · View at Google Scholar · View at Scopus
  5. M. Caleffi and L. Paura, “Opportunistic routing for disruption tolerant networks,” in Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications Workshops (WAINA '09), pp. 826–831, Bradford, UK, May 2009. View at Publisher · View at Google Scholar · View at Scopus
  6. M. J. Khabbaz, C. M. Assi, and W. F. Fawaz, “Disruption-tolerant networking: a comprehensive survey on recent developments and persisting challenges,” IEEE Communications Surveys and Tutorials, vol. 14, no. 2, pp. 607–640, 2012. View at Publisher · View at Google Scholar · View at Scopus
  7. P. R. Pereira, A. Casaca, J. J. P. C. Rodrigues, V. N. G. J. Soares, J. Triay, and C. Cervelló-Pastor, “From delay-tolerant networks to vehicular delay-tolerant networks,” IEEE Communications Surveys and Tutorials, vol. 14, no. 4, pp. 1166–1182, 2012. View at Publisher · View at Google Scholar · View at Scopus
  8. R. Sheikh, M. Singh Chande, and D. K. Mishra, “Security issues in MANET: a review,” in Proceedings of the Seventh International Conference on Wireless and Optical Communications Networks (WOCN '10), pp. 1–4, Colombo, Sri Lanka, September 2010. View at Publisher · View at Google Scholar
  9. W. D. Ivancic, “Security analysis of DTN architecture and bundle protocol specification for space-based networks,” in Proceedings of the IEEE Aerospace Conference, pp. 1–12, IEEE, Big Sky, Mont, USA, March 2010. View at Publisher · View at Google Scholar · View at Scopus
  10. Y. Li, W. Chen, and Z.-L. Zhang, “Optimal forwarder list selection in opportunistic routing,” in Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems (MASS '09), pp. 670–675, Macau, China, October 2009. View at Publisher · View at Google Scholar · View at Scopus
  11. J. P. Kurth, A. Zubov, and J. P. Redlich, “Cooperative opportunistic routing using transmit diversity in wireless mesh networks,” in Proceedings of the 27th IEEE Conference on Computer Communications (INFOCOM '08), pp. 1310–1318, Phoenix, Ariz, USA, April 2008. View at Publisher · View at Google Scholar
  12. M. Lu, F. Li, and J. Wu, “Efficient opportunistic routing in utility-based ad hoc networks,” IEEE Transactions on Reliability, vol. 58, no. 3, pp. 485–495, 2009. View at Publisher · View at Google Scholar · View at Scopus
  13. H. Dubois-Ferriere, M. Grossglauser, and M. Vetterli, “Least-cost opportunistic routing,” in Proceedings of the 45th Annual Allerton Conference on Communication, Control, and Computing, pp. 994–1001, September 2007. View at Scopus
  14. P. B. Velloso, R. P. Laufer, D. D. O. O. Cunha, O. C. M. B. Duarte, and G. Pujolle, “Trust management in mobile ad hoc networks using a scalable maturity-based model,” IEEE Transactions on Network and Service Management, vol. 7, no. 3, pp. 172–185, 2010. View at Publisher · View at Google Scholar
  15. K. Govindan and P. Mohapatra, “Trust computations and trust dynamics in mobile adhoc networks: a survey,” IEEE Communications Surveys and Tutorials, vol. 14, no. 2, pp. 279–298, 2012. View at Publisher · View at Google Scholar · View at Scopus
  16. K. Ahmadi, Decision making using trust and risk in self-adaptive agent organization [M.S. thesis], Utah State University, 2014.
  17. M. Li, Y. Xiang, B. Zhang, and Z. Huang, “A sentiment delivering estimate scheme based on trust chain in mobile social network,” Mobile Information Systems, vol. 2015, Article ID 745095, 20 pages, 2015. View at Publisher · View at Google Scholar
  18. I.-R. Chen, F. Bao, M. Chang, and J.-H. Cho, “Dynamic trust management for delay tolerant networks and its application to secure routing,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 5, pp. 1200–1210, 2014. View at Publisher · View at Google Scholar · View at Scopus
  19. S. Trifunovic, F. Legendre, and C. Anastasiades, “Social trust in opportunistic networks,” in IEEE Conference on Computer Communications Workshops (INFOCOM '10), pp. 1–6, San Diego, Calif, USA, March 2010. View at Publisher · View at Google Scholar · View at Scopus
  20. OPNET Modeler Simulation Software, http://www.opnet.com.
  21. A. Lindgren, A. Doria, E. Davies, and S. Grasic, Probabilistic Routing Protocol for Intermittently Connected Networks, 2012, http://tools.ietf.org/html/rfc6693.
  22. K. Scott and S. Burleigh, Bundle Protocol Specification, 2007, http://tools.ietf.org/html/rfc5050.