A COMPREHENSIVE REVIEW AND ANALYSIS OF SECURITY ISSUES ON ROUTING PROTOCOLS IN DELAY TOLERANT NETWORKS

Authors

  • B.Rani, Vemula Nikitha , Dikshendra Daulat Sarpate, B. Sankaraiah, Dr. Syed Umar Author

DOI:

https://doi.org/10.65009/7mgbpd09

Keywords:

Delay tolerant networks, DTNs, anonymous routing, DTN Architecture, Interplanetary Internet, etc,,

Abstract

 In contexts that are characterized by excessive latency and intermittent connectivity, such as 
interplanetary communication or isolated terrestrial locations, Delay Tolerant Networks (DTNs) are 
utilized. These networks are designed specifically for usage in these environments.  Within the scope of 
this article, the architectural principles of DTNs are investigated, with a particular focus on the operational 
contrasts between DTNs and regular Internet protocols.  In addition to this, it investigates the ways in 
which the bundle protocol enables robust communication in spite of disturbances.  A comprehensive 
analysis of their application situations, implementation methodologies, and the most current 
advancements made in this field is included in the paper.  A particular emphasis is placed on the issues 
that actual deployments present, as well as the ways in which changing architectures might fulfill these 
requirements. 
The Delay Tolerant Network, often known as DTN, is an essential component of today's communications 
system.  DTNs are utilized in a wide range of scenarios, including but not limited to armed conflicts, 
earthquakes, volcanic eruptions, and terrorist strikes, amongst others.  The Distributed Transmission 
Network (DTN) offers a setting in which two nodes can only communicate with one another when they 
are within transmission range of one another. This is because the network contains intermittent 
connectivity.  When it comes to these kinds of networks, the most significant challenge is security.  In 
this work, we have explored a variety of DTN routing protocols and their variants, in addition to the 
various security aspects that require attention. 

,

References

LunaNet Interoperability Specification Document Version 4; Technical Report; National

Aeronautics and Space Administration and European Space Agency: Washington, DC, USA,

Otero, D.G. ESA Moonlight Initiative. Presented at IPNSIG Academy. 2022. Available online:

https://ipnsig.org/wp-content/uploads/2022/11/IPNSIG-ESA-Moonlight-overview-Nov-2022

pdf

Naveen Sai Bommina, Uppu Lokesh, Nandipati Sai Akash, Dr. Hussain Syed, Dr. Syed Umar,

"Optimizing AI-Driven Security Protocols in IoT Networks Using Metaheuristic Algorithms",

International Journal of Intelligent Systems and Applications in Engineering, IJISAE, 2024,

(23s), 3339–3347.

Habeeb, M. S., & Babu, T. R. (2022). Network intrusion detection system: a survey on artificial

intelligence‐based techniques. Expert Systems, 39(9), e13066.

R. Gnanakumaran, Divya Rohatgi, A K Sampath, Nidhi Nagar, D. Amuthaguka, Raj Kumar

Gupta, "Robust Extreme Learning Machine based Sentiment Analysis and Classification", 2023

th International Conference on Smart Systems and Inventive Technology (ICSSIT), (2023), DOI:

1109/ICSSIT55814.2023.10061017.

Cerf, V.; Burleigh, S.; Hooke, A.; Torgerson, L.; Durst, R.; Scott, K.; Fall, K.; Weiss, H. Delay

Tolerant Networking Architecture; RFC 4838; IETF: Fremont, CA, USA, 2007.

https://doi.org/10.17487/RFC4838.

Naveen Sai Bommina, Nandipati Sai Akash, Uppu Lokesh, Dr. Hussain Syed, Dr. Syed Umar, "A

Hybrid Optimization Framework for Enhancing IoT Security via AI-based Anomaly Detection",

International Journal on Recent and Innovation Trends in Computing and Communication, (2023)

ISSN: 2321-8169 Volume: 11 Issue: 3.

NASA Jet Propulsion Laboratory. Interplanetary Overlay Network (ION). Available online:

https://sourceforge.net/projects/ion-dtn/ (accessed on 1 September 2022).

Thakre N, Nimma D, Turukmane AV, Singh AK, Rohatgi D, Bangaru B (2024) Dynamic path

planning for autonomous robots in forest fire scenarios using hybrid deep reinforcement learning

and particle swarm optimization. Int J Adv Comput Sci Appl 15(9).

Nandipati Sai Akash, Uppu Lokesh, Naveen Sai Bommina, Hussain Syed, Syed Umar, "Swarm

Intelligence-Based Hyperparameter Optimization for AI-Powered IoT Threat Detection",

International Journal of Intelligent Systems and Applications in Engineering, (2024), 12(17s),

Bormann, C.; Hoffman, P.E. Concise Binary Object Representation (CBOR); RFC 8949; IETF:

Fremont, CA, USA, 2020. https://doi.org/10.17487/RFC8949.

Habeeb, M. S., & Babu, T. R. (2024). Coarse and fine feature selection for network intrusion

detection systems (IDS) in IoT networks. Transactions on Emerging Telecommunications

Technologies, 35(4), e4961.

Uppu Lokesh, Naveen Sai Bommina, Nandipati Sai Akash, Dr. Hussain Syed, Dr. Syed Umar,

"Designing Energy-Efficient and Secure IoT Architectures Using Evolutionary Optimization

Algorithms", International Journal of Applied Engineering & Technology, Vol. 4 No.2,

September, 2022.

K Sankar, Divya Rohatgi, S Balakrishna Reddy, "COX Regressive Winsorized Correlated

Convolutional Deep Belief Boltzmann Network for Covid-19 Prediction with Big Data", Grenze

International Journal of Engineering & Technology (GIJET), Grenze ID: 01.GIJET.9.1.547, ©

Grenze Scientific Society, 2023.

Uppu Lokesh, Naveen Sai Bommina, Nandipati Sai Akash, Dr. Hussain Syed, Dr. Syed Umar,

"Designing Energy-Efficient and Secure IoT Architectures Using Evolutionary Optimization

Algorithms", International Journal of Applied Engineering & Technology, Vol. 4 No.2,

September, 2022.

RS Supriya Khaitan, Divya Rohatgi, Sana Nalband, Tejali Mhatre, Shweta Patil, "Enhancing

Essay Grading Efficiency and Consistency through Two-Layer LSTM Models and Attention

Mechanisms", Journal of Information Systems Engineering and Management 10 (2), 191-202.

Umar, Syed, Bommina Naveen Sai, Nagineni Sai Lasya, Doppalapudi Asutosh, and LohithaRani.

"Machine Learning based Sentiment Analysis of Product Reviews Using Deep Embedding."

Journal of Optoelectronics Laser 41, no. 6(2022): 108-113.

Habeeb, M. S. (2024). Predictive analytics and cybersecurity. Intelligent Techniques for

Predictive Data Analytics, 151-169.

Killi, B.P.R.; Reddy, E.A.; Rao, S.V. Cooperative game theory based network partitioning for

controller placement in SDN. In Proceedings of the 2018 10th International Conference on

Communication Systems & Networks (COMSNETS), Bengaluru, India, 3–7 January 2018; pp.

–112. https://doi.org/10.1109/COMSNETS.2018.8328186.

Isong, B.; Molose, R.R.S.; Abu-Mahfouz, A.M.; Dladlu, N. Comprehensive Review of SDN

Controller

Strategies.

IEEE

Access

,

,

–170092.

https://doi.org/10.1109/ACCESS.2020.3023974.

Hauser, F.; Häberle, M.; Merling, D.; Lindner, S.; Gurevich, V.; Zeiger, F.; Frank, R.; Menth, M.

A Survey on Data Plane Programming with P4: Fundamentals, Advances, and Applied Research.

arXiv 2021. arXiv:2101.10632.

Musumeci, F.; Fidanci, A.C.; Paolucci, F.; Cugini, F.; Tornatore, M. Machine-Learning-Enabled

DDoS Attacks Detection in P4 Programmable Networks. J. Netw. Syst. Manag. 2022, 30, 21.

https://doi.org/10.1007/s10922-021-09633-5.

NASA Space Communications and Navigation. Cognitive Communications Project. Available

online: https://www1.grc.nasa.gov/space/scan/acs/cognitive-communications/

HABEEB, M. S., & BABU, T. R. (2024). WOA-SA: OPTIMIZING NIDS WITH ENHANCED

DEEP LEARNING FOR ZERO-DAY ATTACK DETECTION. Journal of Jilin University

(Engineering and Technology Edition).

Shamim, M. Z., Syed, S., Shiblee, M., Usman, M., Zaidi, M., Ahmad, Z., & Habeeb, M. (2019,

December). Detecting benign and pre-cancerous tongue lesions using deep convolutional neural

networks for early signs of oral cancer. In BASIC & CLINICAL PHARMACOLOGY &

TOXICOLOGY (Vol. 125, pp. 184-185). 111 RIVER ST, HOBOKEN 07030-5774, NJ USA:

WILEY.

Version

Sipos, B.; Demmer, M.; Ott, J.; Perreault, S. Delay-Tolerant Networking TCP Convergence-Layer

Protocol

;

RFC 9174; IETF: Fremont, CA, USA, 2022.

https://doi.org/10.17487/RFC9174.

Scott, K.; Burleigh, S. Bundle Protocol Specification; RFC 5050; IETF: Fremont, CA, USA, 2007.

https://doi.org/10.17487/RFC5050.

Downloads.

Published

2025-11-03

How to Cite

A COMPREHENSIVE REVIEW AND ANALYSIS OF SECURITY ISSUES ON ROUTING PROTOCOLS IN DELAY TOLERANT NETWORKS . (2025). Phoenix: International Multidisciplinary Research Journal ( Peer Reviewed High Impact Journal ), 3(4), 65-75. https://doi.org/10.65009/7mgbpd09