SlideShare a Scribd company logo
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram,
Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
QUALITY-OF-PROTECTION-DRIVEN
DATA FORWARDING FOR
INTERMITTENTLY CONNECTED WIRELESS NETWORKS
ABSTRACT :
The data delivery in ICWN is accomplished in a collaborative
manner, and non-cooperative behavior will gravely impair network
QoP anduser QoE. To select reliable relay nodes for data
transmission, a trust-status-aware data forwarding
strategy is proposed in this article. By exploit in locally recorded
forwarding behaviour information, process-based and relationship
based credibility can be precisely evaluated in adistributed manner.
Additionally, with the assistance of an effective intrusion detection
mechanism, reasonable relay selection can beperfected. Numerical
results show that the proposedmechanism can provide reliable data
transmission with high QoP and improved userQoE, which
dramatically reduces the networkload and enhances the resource
utilization
Existing system :
The data delivery in ICWN is accomplished in a collaborative manner, and non-
cooperative behavior will gravely impair network QoP anduser QoE.
PROPOSED SYSTEM :
By exploit in locally recorded forwarding behaviour information, process-based
and relationship based credibility can be precisely evaluated in adistributed
manner. Additionally, with the assistance of an effective intrusion detection
mechanism, reasonable relay selection can beperfected.
Numerical results show that the proposedmechanism can
provide reliable data transmission with high QoP and improved userQoE, which
dramatically reduces the networkload and enhances the resource utilization
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram,
Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram,
Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Block diagram :
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram,
Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram,
Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Conclusion :
In the resource limited ICWN, the existence ofmalicious nodes greatly degrades
the network
reliability, resource utilization, network QoP,and user QoE. By analyzing the
social relationship
between nodes and forwarding behaviors, aQoP-driven data forwarding strategy
is proposed
in this article. Our major contributions in thearticle include:
1.The relationship strength is estimated
according to the locally recorded encounter
history.
2. Process-basedand relationship-based credibility
are evaluated, and the final node trust status
is obtained with the assistance of the
dynamical intrusion detection and hybrid
credibility update methods.
Based on the results of 1 and 2, the data forwarding
decision can be accomplished with
improved network performance. Our simulation
results show that the QoP and user QoE can be
improved dramatically by the proposed QOPDF,
and then the effectiveness of our proposed
approachis verified.

More Related Content

DOCX
Effects of mobility on latency in a wsn that accommodates mobile nodes
PDF
Ista presentation-malicious url
DOCX
A novel time obfuscated algorithm for trajectory privacy protection
DOCX
Energy efficient detection of malicious nodes using secure clustering with lo...
PDF
Libro desarrollo de la creatividad en la escuela
PDF
Pvc electrical tape log roll
PDF
Optimal configuration of network coding in ad hoc networks
DOC
CV_Diah Lestari
Effects of mobility on latency in a wsn that accommodates mobile nodes
Ista presentation-malicious url
A novel time obfuscated algorithm for trajectory privacy protection
Energy efficient detection of malicious nodes using secure clustering with lo...
Libro desarrollo de la creatividad en la escuela
Pvc electrical tape log roll
Optimal configuration of network coding in ad hoc networks
CV_Diah Lestari

Viewers also liked (13)

PDF
T 3 mengenal-kilang-risdi
PDF
Shared authority based privacy preserving authentication protocol in cloud co...
PPTX
eProseed Oracle Open World 2016 debrief - Oracle 12.2.0.1 Database
PPTX
Food Safety for Food Packaging Production
PDF
Pkl i -v_apoly_loos_pholy Management Kerja Perusahan
PPTX
Informasi bos 2016 (draft 10 des)
PDF
Risk Assessment of Food Packaging Materials_2012
PPT
Rekling02c ekologi bioma
PPT
Rekling03 konservasi
PPTX
Introduction To Cloud Computing
PPTX
Frank lloyd wright- Taliesin East and Taliesin West, Guggenheim Museum, Falli...
PPTX
Musculoskeletal Disorders
PPTX
Introducing DocumentDB
T 3 mengenal-kilang-risdi
Shared authority based privacy preserving authentication protocol in cloud co...
eProseed Oracle Open World 2016 debrief - Oracle 12.2.0.1 Database
Food Safety for Food Packaging Production
Pkl i -v_apoly_loos_pholy Management Kerja Perusahan
Informasi bos 2016 (draft 10 des)
Risk Assessment of Food Packaging Materials_2012
Rekling02c ekologi bioma
Rekling03 konservasi
Introduction To Cloud Computing
Frank lloyd wright- Taliesin East and Taliesin West, Guggenheim Museum, Falli...
Musculoskeletal Disorders
Introducing DocumentDB
Ad

Similar to Quality of-protection-driven data forwarding for intermittently connected wireless networks (20)

PDF
MULTI-OBJECTIVE OPTIMIZATION ASSISTED NETWORK CONDITION AWARE QOS-ROUTING PRO...
PDF
MULTI-OBJECTIVE OPTIMIZATION ASSISTED NETWORK CONDITION AWARE QOS-ROUTING PRO...
PDF
Misconduct disclosure of the intermediates using the trusted authority
PDF
A Survey On Secure Cooperative Bait Detection Approach For...
PDF
A Fuzzy Based Dynamic Queue Management Approach to Improve QOS in Wireless se...
DOCX
Detection and elemination of block hole attack
PDF
A Novel Message Driven Local Repair Algorithm for MANET
PDF
Weighted Coefficient Firefly Optimization Algorithm and Support Vector Machin...
PDF
Weighted Coefficient Firefly Optimization Algorithm and Support Vector Machin...
PDF
WEIGHTED COEFFICIENT FIREFLY OPTIMIZATION ALGORITHM AND SUPPORT VECTOR MACHIN...
PDF
Java on exploiting transient social contact patterns for data forwarding in ...
PDF
Method of controlling access to intellectual switching nodes of telecommunica...
PDF
QOS-APCVS: AN ENHANCED EPS-IMS PCC ARCHITECTURE PROPOSAL TO IMPROVE MOBILE SE...
PDF
10-PAPER PUBLISHED AT IJARTET
PDF
Dotnet on exploiting transient social contact patterns for data forwarding i...
PDF
On exploiting transient social contact patterns for data forwarding in delay ...
PDF
IRJET- Reliable Data Transmission in Wireless Network using Secure Trust ...
PDF
Intrusion detection in heterogeneous network by multipath routing based toler...
PDF
Intrusion detection in heterogeneous network by multipath routing based toler...
DOCX
Final Year Project IEEE 2015
MULTI-OBJECTIVE OPTIMIZATION ASSISTED NETWORK CONDITION AWARE QOS-ROUTING PRO...
MULTI-OBJECTIVE OPTIMIZATION ASSISTED NETWORK CONDITION AWARE QOS-ROUTING PRO...
Misconduct disclosure of the intermediates using the trusted authority
A Survey On Secure Cooperative Bait Detection Approach For...
A Fuzzy Based Dynamic Queue Management Approach to Improve QOS in Wireless se...
Detection and elemination of block hole attack
A Novel Message Driven Local Repair Algorithm for MANET
Weighted Coefficient Firefly Optimization Algorithm and Support Vector Machin...
Weighted Coefficient Firefly Optimization Algorithm and Support Vector Machin...
WEIGHTED COEFFICIENT FIREFLY OPTIMIZATION ALGORITHM AND SUPPORT VECTOR MACHIN...
Java on exploiting transient social contact patterns for data forwarding in ...
Method of controlling access to intellectual switching nodes of telecommunica...
QOS-APCVS: AN ENHANCED EPS-IMS PCC ARCHITECTURE PROPOSAL TO IMPROVE MOBILE SE...
10-PAPER PUBLISHED AT IJARTET
Dotnet on exploiting transient social contact patterns for data forwarding i...
On exploiting transient social contact patterns for data forwarding in delay ...
IRJET- Reliable Data Transmission in Wireless Network using Secure Trust ...
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...
Final Year Project IEEE 2015
Ad

More from Pvrtechnologies Nellore (20)

DOCX
A High Throughput List Decoder Architecture for Polar Codes
DOCX
Performance/Power Space Exploration for Binary64 Division Units
DOCX
Hybrid LUT/Multiplexer FPGA Logic Architectures
DOCX
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
DOCX
2016 2017 ieee matlab project titles
DOCX
2016 2017 ieee vlsi project titles
DOCX
2016 2017 ieee ece embedded- project titles
DOCX
A High-Speed FPGA Implementation of an RSD-Based ECC Processor
DOCX
6On Efficient Retiming of Fixed-Point Circuits
DOCX
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
DOC
11.online library management system
DOC
06.e voting system
DOCX
New web based projects list
DOCX
Power controlled medium access control
DOCX
IEEE PROJECTS LIST
DOCX
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
DOCX
Control cloud data access privilege and anonymity with fully anonymous attrib...
DOCX
Cloud keybank privacy and owner authorization
DOCX
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
DOCX
Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...
A High Throughput List Decoder Architecture for Polar Codes
Performance/Power Space Exploration for Binary64 Division Units
Hybrid LUT/Multiplexer FPGA Logic Architectures
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
2016 2017 ieee matlab project titles
2016 2017 ieee vlsi project titles
2016 2017 ieee ece embedded- project titles
A High-Speed FPGA Implementation of an RSD-Based ECC Processor
6On Efficient Retiming of Fixed-Point Circuits
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
11.online library management system
06.e voting system
New web based projects list
Power controlled medium access control
IEEE PROJECTS LIST
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud data access privilege and anonymity with fully anonymous attrib...
Cloud keybank privacy and owner authorization
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...

Recently uploaded (20)

DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Empathic Computing: Creating Shared Understanding
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Network Security Unit 5.pdf for BCA BBA.
The AUB Centre for AI in Media Proposal.docx
Reach Out and Touch Someone: Haptics and Empathic Computing
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
The Rise and Fall of 3GPP – Time for a Sabbatical?
Programs and apps: productivity, graphics, security and other tools
Advanced methodologies resolving dimensionality complications for autism neur...
Empathic Computing: Creating Shared Understanding
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
MYSQL Presentation for SQL database connectivity
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Chapter 3 Spatial Domain Image Processing.pdf
Big Data Technologies - Introduction.pptx
Electronic commerce courselecture one. Pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Unlocking AI with Model Context Protocol (MCP)
Network Security Unit 5.pdf for BCA BBA.

Quality of-protection-driven data forwarding for intermittently connected wireless networks

  • 1. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457 QUALITY-OF-PROTECTION-DRIVEN DATA FORWARDING FOR INTERMITTENTLY CONNECTED WIRELESS NETWORKS ABSTRACT : The data delivery in ICWN is accomplished in a collaborative manner, and non-cooperative behavior will gravely impair network QoP anduser QoE. To select reliable relay nodes for data transmission, a trust-status-aware data forwarding strategy is proposed in this article. By exploit in locally recorded forwarding behaviour information, process-based and relationship based credibility can be precisely evaluated in adistributed manner. Additionally, with the assistance of an effective intrusion detection mechanism, reasonable relay selection can beperfected. Numerical results show that the proposedmechanism can provide reliable data transmission with high QoP and improved userQoE, which dramatically reduces the networkload and enhances the resource utilization Existing system : The data delivery in ICWN is accomplished in a collaborative manner, and non- cooperative behavior will gravely impair network QoP anduser QoE. PROPOSED SYSTEM : By exploit in locally recorded forwarding behaviour information, process-based and relationship based credibility can be precisely evaluated in adistributed manner. Additionally, with the assistance of an effective intrusion detection mechanism, reasonable relay selection can beperfected. Numerical results show that the proposedmechanism can provide reliable data transmission with high QoP and improved userQoE, which dramatically reduces the networkload and enhances the resource utilization
  • 2. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 3. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457 Block diagram :
  • 4. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 5. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457 Conclusion : In the resource limited ICWN, the existence ofmalicious nodes greatly degrades the network reliability, resource utilization, network QoP,and user QoE. By analyzing the social relationship between nodes and forwarding behaviors, aQoP-driven data forwarding strategy is proposed in this article. Our major contributions in thearticle include: 1.The relationship strength is estimated according to the locally recorded encounter history. 2. Process-basedand relationship-based credibility are evaluated, and the final node trust status is obtained with the assistance of the dynamical intrusion detection and hybrid credibility update methods. Based on the results of 1 and 2, the data forwarding decision can be accomplished with improved network performance. Our simulation results show that the QoP and user QoE can be improved dramatically by the proposed QOPDF, and then the effectiveness of our proposed approachis verified.