Improving Podcast Distribution on Gwanda using PrivHab: a Multiagent Secure Georouting Protocol.

  • Adrián Sánchez-Carmona
    Universitat Autònoma de Barcelona (UAB) adria.sanchez[at]deic.uab.cat
  • Sergi Robles
    Universidad Autónoma de Barcelona
  • Carlos Borrego
    Universidad Autónoma de Barcelona

Abstract

We present PrivHab, a multiagent secure georouting protocol that improves podcast distribution on Gwanda, Zimbabwe. PrivHab learns the whereabouts of the nodes of the network to select an itinerary for each agent carrying a piece of data. PrivHab makes use of cryptographic techniques to make the decisions while preserving nodes' privacy. PrivHab uses a waypoint-based georouting that achieves a high performance and low overhead in rugged terrain areas that are plenty of physical obstacles. The store-carry-and-forward approach used is based on mobile agents and is designed to operate in areas that lack network infrastructure. The PrivHab protocol is compared with a set of well-known delay-tolerant routing algorithms and shown to outperform them.
  • Referencias
  • Cómo citar
  • Del mismo autor
  • Métricas
Boldrini, C., Conti, M., Jacopini, J., and Passarella, A., 2007. HiBOp: a History Based Routing Protocol for
Opportunistic Networks. In World of Wireless, Mobile and Multimedia Networks, 2007. WoWMoM 2007.
IEEE International Symposium on a, pages 1–12. doi:10.1109/WOWMOM.2007.4351716.

Borrego, C., Castillo, S., and Robles, S., 2014. Striving for sensing: Taming your mobile code to share a
robot sensor network. Information Sciences, (0). ISSN 0020-0255. doi:http://dx.doi.org/10.1016/j.ins.
2014.02.072.

Cheng, P.-C., Lee, K., Gerla, M., and HÃd’rri, J., 2010. GeoDTN+Nav: Geographic DTN Routing with
Navigator Prediction for Urban Vehicular Environments. Mobile Networks and Applications, 15(1):61–
82. ISSN 1383-469X. doi:10.1007/s11036-009-0181-6.

Costa, P., Mascolo, C., Musolesi, M., and Picco, G., 2008. Socially-aware routing for publish-subscribe
in delay-tolerant mobile ad hoc networks. Selected Areas in Communications, IEEE Journal on,
26(5):748–760. ISSN 0733-8716. doi:10.1109/JSAC.2008.080602.

Goldreich, O., 1998. Secure Multi-Party Computation.

Grasic, S. and Lindgren, A., 2014. Revisiting a remote village scenario and its DTN routing objective.
Computer Communications, 48:133–140. ISSN 0140-3664. doi:10.1016/j.comcom.2014.04.003.

Hsu, W., Dutta, D., and Helmy, A., 2008. CSI: A Paradigm for Behavior-oriented Delivery Services in Mobile
Human Networks. CoRR, abs/0807.1153.

Karlof, C. and Wagner, D., 2003. Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures.

Karp, B. and Kung, H. T., 2000. GPSR: Greedy Perimeter Stateless Routing for Wireless Networks.
In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking,MobiCom ’00, pages 243–254. ACM, New York, NY, USA. ISBN 1-58113-197-6. doi:10.1145/345910.
345953.

Keränen, A., Ott, J., and Kärkkäinen, T., 2009. The ONE Simulator for DTN Protocol Evaluation. In
SIMUTools ’09: Proceedings of the 2nd International Conference on Simulation Tools and Techniques.
ICST, New York, NY, USA. ISBN 978-963-9799-45-5.

Kuiper, E. and Nadjm-Tehrani, S., 2011a. Geographical Routing With Location Service in Intermittently
Connected MANETs. Vehicular Technology, IEEE Transactions on, 60(2):592–604. ISSN 0018-9545.
doi:10.1109/TVT.2010.2091658.

Kuiper, E. and Nadjm-Tehrani, S., 2011b. Geographical Routing With Location Service in Intermittently
Connected MANETs. Vehicular Technology, IEEE Transactions on, 60(2):592–604. ISSN 0018-9545.
doi:10.1109/TVT.2010.2091658.

LeBrun, J., Chuah, C.-N., Ghosal, D., and Zhang, M., 2005. Knowledge-based opportunistic forwarding in
vehicular wireless ad hoc networks. In Vehicular Technology Conference, 2005. VTC 2005-Spring. 2005
IEEE 61st, volume 4, pages 2289–2293 Vol. 4. ISSN 1550-2252. doi:10.1109/VETECS.2005.1543743.

Leguay, J., Friedman, T., and Conan, V., 2007. Evaluating MobySpace-based routing strategies in delay-
tolerant networks. Wireless Communications and Mobile Computing, 7(10):1171–1182. ISSN 1530-8677.
doi:10.1002/wcm.520.

Li, Y., Lai, T.-H., Liu, M. T., Sun, M.-T., and Yang, J., 2006. DTGR: Disruption-Tolerant Geographic Routing for Wireless Ad Hoc Networks. Simulation, 82(6):399–411.

Martínez, R., Castillo, S., Robles, S., Sánchez, A., Borrell, J., Cordero, M., Viguria, A., and Giuditta, N.,
2013. Mobile-Agent Based Delay-Tolerant Network Architecture for Non-Critical Aeronautical Data
Communications. In Springer, editor, In 10th International Symposium on Distributed Computing and
Artificial Intelligence.

Mei, A., Morabito, G., Santi, P., and Stefa, J., 2011. Social-aware stateless forwarding in pocket switched
networks. In INFOCOM, 2011 Proceedings IEEE, pages 251–255. ISSN 0743-166X. doi:10.1109/
INFCOM.2011.5935076.

Musolesi, M. and Mascolo, C., 2009. CAR: Context-Aware Adaptive Routing for Delay-Tolerant Mobile
Networks. Mobile Computing, IEEE Transactions on, 8(2):246–260. ISSN 1536-1233. doi:10.1109/
TMC.2008.107.

Sánchez-Carmona, A., Robles, S., and Borrego, C., 2015. Podcast Distribution on Gwanda Using PrivHab: A Multiagent Secure Georouting Protocol. In Bajo, J., Hernández, J. Z., Mathieu, P., Campbell, A., Fernández-Caballero, A., Moreno, M. N., Julián, V., Alonso-Betanzos, A., Jiménez-López, M. D., and Botti, V., editors, Trends in Practical Applications of Agents, Multi-Agent Systems and Sustainability,
volume 372 of Advances in Intelligent Systems and Computing, pages 29–37. Springer International
Publishing. ISBN 978-3-319-19628-2. doi:10.1007/978-3-319-19629-9_4.

Zhong, G., Goldberg, I., and Hengartner, U., 2007. Louis, Lester and Pierre: Three Protocols for Location Privacy. In Borisov, N. and Golle, P., editors, Privacy Enhancing Technologies, volume 4776 of Lecture
Notes in Computer Science, pages 62–76. ISBN 978-3-540-75550-0. doi:10.1007/978-3-540-75551-7_5.
Sánchez-Carmona, A., Robles, S., & Borrego, C. (2015). Improving Podcast Distribution on Gwanda using PrivHab: a Multiagent Secure Georouting Protocol. ADCAIJ: Advances in Distributed Computing and Artificial Intelligence Journal, 4(1), 34–53. https://doi.org/10.14201/ADCAIJ2015413453

Downloads

Download data is not yet available.
+