Contribution Of Information Sharing In Wireless Sensor Network With Prune Delay

Jacob Sastry N, Anantha Rao .G


: The increase in the number of smart phone users has lead to the increase in the peer-to-peer adhoc content sharing. Traditional data delivery schemes are not suitable for such networks due to intermittent connectivity between smart phones. Thus new content sharing mechanisms should be proposed. To share the contents in such a scenario, researchers have proposed store-carry-forward as an efficient content sharing scheme where a node stores a message and carries it for certain duration until a communication opportunity arises and then delivers it to the destination. Previous works in this field focused on whether two nodes would encounter each other and the place and time of encounter and did not consider the activities of malicious peers. This paper proposes discover-predict-deliver as efficient content sharing scheme that enable peers to share contents and also presents distributed algorithms that enable a peer to reason about trustworthiness of other peers based on past interactions and recommendations. Interactions and recommendations among peers are evaluated based on importance, recentness and peer satisfaction parameters.


peer-to-peer, store-carry-forward, discover predict-deliver, interaction, recommendation.


V. Jacobson, M. Mosko, D. Smetters, and J. Garcia-Luna-Aceves, "Content-centric networking," Whitepaper, Palo Alto Research Center, pp. 2-4, 2007.

L. Zhang, D. Estrin, J. Burke, V. Jacobson, J. D. Thornton, D. K. Smetters, et al., "Named data networking (ndn) project," RelatórioTécnicoNDN-0001, Xerox Palo Alto Research Center-PARC, 2010.

K. Fall, "A delay-tolerant network architecture for challenged internets," presented at the Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications, Karlsruhe, Germany, 2003.

A. Chaintreau, P. Hui, J. Crowcroft, C. Diot, R. Gass, and J. Scott, "Pocket switched networks: Real-world mobility and its consequences for opportunistic forwarding," Technical Report UCAM-CL-TR-617, University of Cambridge, Computer Laboratory, 2005.

N. Sastry, D. Manjunath, K. Sollins, and J. Crowcroft, "Data Delivery Properties of Human Contact Networks," Mobile Computing, IEEE Transactions on, vol. 10, pp. 868-880, 2011.

W.-j. Hsu and A. Helmy, "Impact: Investigation of mobile-user patterns across university campuses using wlan trace analysis," arXiv preprint cs/0508009, 2005.

E. M. Daly and M. Haahr, "Social Network Analysis for Information Flow in Disconnected Delay-Tolerant MANETs," Mobile Computing, IEEE Transactions on, vol. 8, pp. 606-621, 2009.

A. Mtibaa, M. May, C. Diot, and M. Ammar, "PeopleRank: Social Opportunistic Forwarding," in INFOCOM 2010 Proceedings pp. 1-5, 2010.

S. Brin and L. Page, "The anatomy of a large-scale hypertextual Web search engine," Computer Networks and ISDN Systems, vol. 30, pp. 107117, 4, 1998.

H. Pan, J. Crowcroft, and E. Yoneki, "BUBBLE Rap: Social-Based Forwarding in Delay-Tolerant .

Full Text: PDF [Full Text]


  • There are currently no refbacks.

Copyright © 2013, All rights reserved.|

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at