Analyzing Security Schemes in Delay Tolerant Networks

被引:3
|
作者
Kulkarni, Lalit [1 ]
Mukhopadhyay, Debajyoti [2 ]
Bakal, Jagdish [3 ]
机构
[1] GH Raisoni Coll Engn, Nagpur, Maharashtra, India
[2] Maharashtra Inst Technol, Pune, Maharashtra, India
[3] SSJ Coll Engn, Dombivali, India
来源
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DATA ENGINEERING AND COMMUNICATION TECHNOLOGY, ICDECT 2016, VOL 1 | 2017年 / 468卷
关键词
Delay tolerant networks; Selfish nodes; Opportunistic network; TRUST MANAGEMENT;
D O I
10.1007/978-981-10-1675-2_60
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As the feature of delay tolerant networks (DTNs) is open, and intermittent, any node can participate in this type of network. Trusting a DTN node becomes a critical task for the routing algorithms. For the past few years, security techniques have evolved and a lot of research has been carried out in this area. Among these security techniques, trust-based, reputation-based systems, and incentive-based security schemes are discussed in this paper. These techniques are useful to detect selfish DTN nodes and noncooperative DTN nodes. These schemes for DTN nodes are the most common methods to detect malicious, selfish DTN nodes.
引用
收藏
页码:613 / 620
页数:8
相关论文
共 50 条
  • [1] Performance Study of Routing Schemes in Delay Tolerant Networks
    Lin, Chien-Shiu
    Chang, Wei-Shyh
    Chen, Ling-Jyh
    Chou, Cheng-Fu
    2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3, 2008, : 1702 - 1707
  • [2] Modelling security message propagation in delay tolerant networks
    Jia, Zhongtian
    Li, Shudong
    Peng, Haipeng
    Yang, Yixian
    Guo, Shize
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (01) : 51 - 58
  • [3] Analyzing and designing energy efficient routing protocol in delay tolerant networks
    Nikita Choudhary
    Kunal Mittal
    Krishna Dwypayan Kota
    Preeti Nagrath
    Sandhya Aneja
    CSI Transactions on ICT, 2016, 4 (2-4) : 285 - 291
  • [4] A Security and Efficient Routing Scheme with Misbehavior Detection in Delay-Tolerant Networks
    Li, Feng
    Si, Yali
    Lu, Ning
    Chen, Zhen
    Shen, Limin
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [5] Probabilistic Bundle Relaying Schemes in Two-Hop Vehicular Delay Tolerant Networks
    Khabbaz, Maurice J.
    Fawaz, Wissam F.
    Assi, Chadi M.
    IEEE COMMUNICATIONS LETTERS, 2011, 15 (03) : 281 - 283
  • [6] A taxonomy on misbehaving nodes in delay tolerant networks
    Khalid, Waqar
    Ullah, Zahid
    Ahmed, Naveed
    Cao, Yue
    Khalid, Muhammad
    Arshad, Muhammad
    Ahmad, Farhan
    Cruickshank, Haitham
    COMPUTERS & SECURITY, 2018, 77 : 442 - 471
  • [7] Social contact graph-based group communication schemes for delay tolerant networks
    Le, Tuan
    Gerla, Mario
    INTERNATIONAL JOURNAL OF PARALLEL EMERGENT AND DISTRIBUTED SYSTEMS, 2021, 36 (04) : 380 - 394
  • [8] A General Model for Store-carry-forward Routing Schemes with Multicast in Delay Tolerant Networks
    Liu, Jiajia
    Jiang, Xiaohong
    Nishiyama, Hiroki
    Kato, Nei
    2011 6TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), 2011, : 494 - 500
  • [9] Performance and Security Analyses of Onion-Based Anonymous Routing for Delay Tolerant Networks
    Sakai, Kazuya
    Sun, Min-Te
    Ku, Wei-Shinn
    Wu, Jie
    Alanazi, Faisal S.
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2017, 16 (12) : 3473 - 3487
  • [10] Balanced Routing in Delay Tolerant Networks
    Xie, Rui
    PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 1118 - 1122