A COMPREHENSIVE REVIEW AND ANALYSIS OF SECURITY ISSUES ON ROUTING PROTOCOLS IN DELAY TOLERANT NETWORKS
DOI:
https://doi.org/10.65009/7mgbpd09Keywords:
Delay tolerant networks, DTNs, anonymous routing, DTN Architecture, Interplanetary Internet, etc,,Abstract
In contexts that are characterized by excessive latency and intermittent connectivity, such as
interplanetary communication or isolated terrestrial locations, Delay Tolerant Networks (DTNs) are
utilized. These networks are designed specifically for usage in these environments. Within the scope of
this article, the architectural principles of DTNs are investigated, with a particular focus on the operational
contrasts between DTNs and regular Internet protocols. In addition to this, it investigates the ways in
which the bundle protocol enables robust communication in spite of disturbances. A comprehensive
analysis of their application situations, implementation methodologies, and the most current
advancements made in this field is included in the paper. A particular emphasis is placed on the issues
that actual deployments present, as well as the ways in which changing architectures might fulfill these
requirements.
The Delay Tolerant Network, often known as DTN, is an essential component of today's communications
system. DTNs are utilized in a wide range of scenarios, including but not limited to armed conflicts,
earthquakes, volcanic eruptions, and terrorist strikes, amongst others. The Distributed Transmission
Network (DTN) offers a setting in which two nodes can only communicate with one another when they
are within transmission range of one another. This is because the network contains intermittent
connectivity. When it comes to these kinds of networks, the most significant challenge is security. In
this work, we have explored a variety of DTN routing protocols and their variants, in addition to the
various security aspects that require attention.
References
LunaNet Interoperability Specification Document Version 4; Technical Report; National
Aeronautics and Space Administration and European Space Agency: Washington, DC, USA,
Otero, D.G. ESA Moonlight Initiative. Presented at IPNSIG Academy. 2022. Available online:
https://ipnsig.org/wp-content/uploads/2022/11/IPNSIG-ESA-Moonlight-overview-Nov-2022
Naveen Sai Bommina, Uppu Lokesh, Nandipati Sai Akash, Dr. Hussain Syed, Dr. Syed Umar,
"Optimizing AI-Driven Security Protocols in IoT Networks Using Metaheuristic Algorithms",
International Journal of Intelligent Systems and Applications in Engineering, IJISAE, 2024,
(23s), 3339–3347.
Habeeb, M. S., & Babu, T. R. (2022). Network intrusion detection system: a survey on artificial
intelligence‐based techniques. Expert Systems, 39(9), e13066.
R. Gnanakumaran, Divya Rohatgi, A K Sampath, Nidhi Nagar, D. Amuthaguka, Raj Kumar
Gupta, "Robust Extreme Learning Machine based Sentiment Analysis and Classification", 2023
th International Conference on Smart Systems and Inventive Technology (ICSSIT), (2023), DOI:
1109/ICSSIT55814.2023.10061017.
Cerf, V.; Burleigh, S.; Hooke, A.; Torgerson, L.; Durst, R.; Scott, K.; Fall, K.; Weiss, H. Delay
Tolerant Networking Architecture; RFC 4838; IETF: Fremont, CA, USA, 2007.
https://doi.org/10.17487/RFC4838.
Naveen Sai Bommina, Nandipati Sai Akash, Uppu Lokesh, Dr. Hussain Syed, Dr. Syed Umar, "A
Hybrid Optimization Framework for Enhancing IoT Security via AI-based Anomaly Detection",
International Journal on Recent and Innovation Trends in Computing and Communication, (2023)
ISSN: 2321-8169 Volume: 11 Issue: 3.
NASA Jet Propulsion Laboratory. Interplanetary Overlay Network (ION). Available online:
https://sourceforge.net/projects/ion-dtn/ (accessed on 1 September 2022).
Thakre N, Nimma D, Turukmane AV, Singh AK, Rohatgi D, Bangaru B (2024) Dynamic path
planning for autonomous robots in forest fire scenarios using hybrid deep reinforcement learning
and particle swarm optimization. Int J Adv Comput Sci Appl 15(9).
Nandipati Sai Akash, Uppu Lokesh, Naveen Sai Bommina, Hussain Syed, Syed Umar, "Swarm
Intelligence-Based Hyperparameter Optimization for AI-Powered IoT Threat Detection",
International Journal of Intelligent Systems and Applications in Engineering, (2024), 12(17s),
Bormann, C.; Hoffman, P.E. Concise Binary Object Representation (CBOR); RFC 8949; IETF:
Fremont, CA, USA, 2020. https://doi.org/10.17487/RFC8949.
Habeeb, M. S., & Babu, T. R. (2024). Coarse and fine feature selection for network intrusion
detection systems (IDS) in IoT networks. Transactions on Emerging Telecommunications
Technologies, 35(4), e4961.
Uppu Lokesh, Naveen Sai Bommina, Nandipati Sai Akash, Dr. Hussain Syed, Dr. Syed Umar,
"Designing Energy-Efficient and Secure IoT Architectures Using Evolutionary Optimization
Algorithms", International Journal of Applied Engineering & Technology, Vol. 4 No.2,
September, 2022.
K Sankar, Divya Rohatgi, S Balakrishna Reddy, "COX Regressive Winsorized Correlated
Convolutional Deep Belief Boltzmann Network for Covid-19 Prediction with Big Data", Grenze
International Journal of Engineering & Technology (GIJET), Grenze ID: 01.GIJET.9.1.547, ©
Grenze Scientific Society, 2023.
Uppu Lokesh, Naveen Sai Bommina, Nandipati Sai Akash, Dr. Hussain Syed, Dr. Syed Umar,
"Designing Energy-Efficient and Secure IoT Architectures Using Evolutionary Optimization
Algorithms", International Journal of Applied Engineering & Technology, Vol. 4 No.2,
September, 2022.
RS Supriya Khaitan, Divya Rohatgi, Sana Nalband, Tejali Mhatre, Shweta Patil, "Enhancing
Essay Grading Efficiency and Consistency through Two-Layer LSTM Models and Attention
Mechanisms", Journal of Information Systems Engineering and Management 10 (2), 191-202.
Umar, Syed, Bommina Naveen Sai, Nagineni Sai Lasya, Doppalapudi Asutosh, and LohithaRani.
"Machine Learning based Sentiment Analysis of Product Reviews Using Deep Embedding."
Journal of Optoelectronics Laser 41, no. 6(2022): 108-113.
Habeeb, M. S. (2024). Predictive analytics and cybersecurity. Intelligent Techniques for
Predictive Data Analytics, 151-169.
Killi, B.P.R.; Reddy, E.A.; Rao, S.V. Cooperative game theory based network partitioning for
controller placement in SDN. In Proceedings of the 2018 10th International Conference on
Communication Systems & Networks (COMSNETS), Bengaluru, India, 3–7 January 2018; pp.
–112. https://doi.org/10.1109/COMSNETS.2018.8328186.
Isong, B.; Molose, R.R.S.; Abu-Mahfouz, A.M.; Dladlu, N. Comprehensive Review of SDN
Controller
Strategies.
IEEE
Access
,
,
–170092.
https://doi.org/10.1109/ACCESS.2020.3023974.
Hauser, F.; Häberle, M.; Merling, D.; Lindner, S.; Gurevich, V.; Zeiger, F.; Frank, R.; Menth, M.
A Survey on Data Plane Programming with P4: Fundamentals, Advances, and Applied Research.
arXiv 2021. arXiv:2101.10632.
Musumeci, F.; Fidanci, A.C.; Paolucci, F.; Cugini, F.; Tornatore, M. Machine-Learning-Enabled
DDoS Attacks Detection in P4 Programmable Networks. J. Netw. Syst. Manag. 2022, 30, 21.
https://doi.org/10.1007/s10922-021-09633-5.
NASA Space Communications and Navigation. Cognitive Communications Project. Available
online: https://www1.grc.nasa.gov/space/scan/acs/cognitive-communications/
HABEEB, M. S., & BABU, T. R. (2024). WOA-SA: OPTIMIZING NIDS WITH ENHANCED
DEEP LEARNING FOR ZERO-DAY ATTACK DETECTION. Journal of Jilin University
(Engineering and Technology Edition).
Shamim, M. Z., Syed, S., Shiblee, M., Usman, M., Zaidi, M., Ahmad, Z., & Habeeb, M. (2019,
December). Detecting benign and pre-cancerous tongue lesions using deep convolutional neural
networks for early signs of oral cancer. In BASIC & CLINICAL PHARMACOLOGY &
TOXICOLOGY (Vol. 125, pp. 184-185). 111 RIVER ST, HOBOKEN 07030-5774, NJ USA:
WILEY.
Version
Sipos, B.; Demmer, M.; Ott, J.; Perreault, S. Delay-Tolerant Networking TCP Convergence-Layer
Protocol
;
RFC 9174; IETF: Fremont, CA, USA, 2022.
https://doi.org/10.17487/RFC9174.
Scott, K.; Burleigh, S. Bundle Protocol Specification; RFC 5050; IETF: Fremont, CA, USA, 2007.

