Please use this identifier to cite or link to this item:
Title: SAGE-PRoPHET: A security aided and group encounter based PRoPHET routing protocol for dissemination of post disaster situational data
Authors: Basu, Souvik
Bhattacharjee, Suman
Roy, Siuli
Bandyopadhyay, Somprakash
Keywords: Delay tolerant network
Digital signature
Post disaster communication network
Rescue groups
Issue Date: 2015
Publisher: SCOPUS
ACM International Conference Proceeding Series
Association for Computing Machinery
Series/Report no.: 04-07-January-2015
Abstract: In this paper, we propose SAGE-PRoPHET, a security enhanced PRoPHET routing protocol that enables secure dissemination of post disaster situational messages using history of group encounters. Post disaster rescue and relief operations are essentially group based, where volunteers and rescue workers, belonging to different rescue groups, relay situational information relevant to their group to their respective relief camps, in multiple hops on a peer-to-peer basis. Now, it is evidently better to route situational information, destined for a relief camp of a particular group, through volunteers of that group or who has a history of encountering volunteers of that group frequently. Such history of encounters based routing resembles the PRoPHET routing protocol for delay tolerant networks that forwards messages intended to a particular receiver through those nodes that encounter that receiver frequently. However, to use PRoPHET for such group based routing of group specific messages the protocol needs to be tuned to use history of group encounters rather than individual encounters. On the other hand, PRoPHET assumes that nodes in the network are trusted and cooperate towards message forwarding. Such assumption turns out inaccurate in presence of malicious nodes that may severely impede the delivery, accuracy and timeliness of situational messages. Therefore, integrating proper security components with PRoPHET is extremely important. Our proposed protocol adapts PRoPHET for post disaster group encounter based routing and enhances it by incorporating certain security elements into it to provide full security against possible attacks by malicious nodes in the network. Simulation results show that our proposed protocol, in a disaster scenario, offers better performance in comparison to other well known routing protocols. Copyright 2015 ACM.
Description: Basu, Souvik, Heritage Institute of Technology, Kolkata, India; Bhattacharjee, Suman, Heritage Institute of Technology, Kolkata, India; Roy, Siuli, Heritage Institute of Technology, Kolkata, India; Bandyopadhyay, Somprakash, MIS Group, IIM, Calcutta, India
ISSN/ISBN - 978-145032928-6
DOI - 10.1145/2684464.2684492
Appears in Collections:Management Information Systems

Files in This Item:
There are no files associated with this item.

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.