13th International Conference on Ubiquitous Computing and Ambient ‪Intelligence UCAmI 2019‬ 2019
DOI: 10.3390/proceedings2019031024
|View full text |Cite
|
Sign up to set email alerts
|

How to Enable Delay Tolerant Network Solutions for Internet of Things: From Taxonomy to Open Challenges

Abstract: Internet of Things (IoT) is witnessing an increasing range of application domains (industry 4.0, eHealth, smart city, etc.). Meanwhile, IoT is still facing communication challenges because of limited capabilities in computing, storage and energy constraints of smart objects. The use of Delay Tolerant Network (DTN) as basis for communication in IoT is promising but needs more development. In this paper, we present a literature review and a classification of DTN routing protocols. Furthermore, we survey a number… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 36 publications
0
7
0
Order By: Relevance
“…In addition, the authors of [ 36 ] presented a data intrusion detection system to trigger false data from malicious attacks; Network Trustworthiness: It can be defined as the probability that a packet will reach its destination unaltered despite the adversities (e.g., link failure, link saturation, malicious attacks), and it is a crucial factor of low-power and lossy networks (LLNs) [ 37 ]. Improving network trustworthiness and performance is a challenge that has been addressed from different perspectives such as transmission coding [ 38 , 39 , 40 , 41 ], load balancing and redundancy protocols [ 42 ], transport protocols [ 43 ], dynamic routing and topology control protocols [ 44 , 45 ], cybersecurity mechanisms [ 46 ], and delay tolerant network (DTN) architectures and protocols [ 47 ]. In the case of routing, both proactive routing protocols (e.g., the IPv6 Routing Protocol for low-power and lossy networks (RPL) and optimized link state routing (OLSR)) and reactive routing protocols (e.g., ad hoc on-demand distance vector (AODV) and link-quality source routing (LQSR)) have been proposed in the literature to solve the drawbacks of LLNs and MANETs [ 44 , 45 ]; Social Trustworthiness: This trend has gained more attention since the irruption of the Social Internet of Things (SIoT) concept [ 48 , 49 ].…”
Section: Related Work On Cyber Physical Systems’ Trustworthinessmentioning
confidence: 99%
“…In addition, the authors of [ 36 ] presented a data intrusion detection system to trigger false data from malicious attacks; Network Trustworthiness: It can be defined as the probability that a packet will reach its destination unaltered despite the adversities (e.g., link failure, link saturation, malicious attacks), and it is a crucial factor of low-power and lossy networks (LLNs) [ 37 ]. Improving network trustworthiness and performance is a challenge that has been addressed from different perspectives such as transmission coding [ 38 , 39 , 40 , 41 ], load balancing and redundancy protocols [ 42 ], transport protocols [ 43 ], dynamic routing and topology control protocols [ 44 , 45 ], cybersecurity mechanisms [ 46 ], and delay tolerant network (DTN) architectures and protocols [ 47 ]. In the case of routing, both proactive routing protocols (e.g., the IPv6 Routing Protocol for low-power and lossy networks (RPL) and optimized link state routing (OLSR)) and reactive routing protocols (e.g., ad hoc on-demand distance vector (AODV) and link-quality source routing (LQSR)) have been proposed in the literature to solve the drawbacks of LLNs and MANETs [ 44 , 45 ]; Social Trustworthiness: This trend has gained more attention since the irruption of the Social Internet of Things (SIoT) concept [ 48 , 49 ].…”
Section: Related Work On Cyber Physical Systems’ Trustworthinessmentioning
confidence: 99%
“…The DTN was first presented as an alternative network architecture designed for challenging networks [8] which suffer from high bit error rates, lack of end-to-end connectivity, and long delays [12]. It was initially designed for interplanetary communications in space [13], given the number of disconnections that this network suffers.…”
Section: Delay Tolerant Networkmentioning
confidence: 99%
“…However, other DTN approaches are not based on the BP but use their own routing protocol designed to be disruption-and delay-tolerant [8]. DISRN [22], PASR [23], RMDTN [24], and PROPHET [25] are some examples of this kind of approach.…”
Section: Delay Tolerant Networkmentioning
confidence: 99%
See 2 more Smart Citations