Analyzing Security Schemes in Delay Tolerant Networks

被引:3
|
作者
Kulkarni, Lalit [1 ]
Mukhopadhyay, Debajyoti [2 ]
Bakal, Jagdish [3 ]
机构
[1] GH Raisoni Coll Engn, Nagpur, Maharashtra, India
[2] Maharashtra Inst Technol, Pune, Maharashtra, India
[3] SSJ Coll Engn, Dombivali, India
来源
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DATA ENGINEERING AND COMMUNICATION TECHNOLOGY, ICDECT 2016, VOL 1 | 2017年 / 468卷
关键词
Delay tolerant networks; Selfish nodes; Opportunistic network; TRUST MANAGEMENT;
D O I
10.1007/978-981-10-1675-2_60
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As the feature of delay tolerant networks (DTNs) is open, and intermittent, any node can participate in this type of network. Trusting a DTN node becomes a critical task for the routing algorithms. For the past few years, security techniques have evolved and a lot of research has been carried out in this area. Among these security techniques, trust-based, reputation-based systems, and incentive-based security schemes are discussed in this paper. These techniques are useful to detect selfish DTN nodes and noncooperative DTN nodes. These schemes for DTN nodes are the most common methods to detect malicious, selfish DTN nodes.
引用
收藏
页码:613 / 620
页数:8
相关论文
共 50 条
  • [21] Efficient Probabilistic Routing in Delay Tolerant Networks
    Sammou, El Mastapha
    2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2012, : 584 - 589
  • [22] Vector routing protocols for Delay Tolerant Networks
    Kang, Hyunwoo
    Kim, Dongkyun
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2010, 6 (01) : 40 - 52
  • [23] An Improved Buffer Scheme in Delay Tolerant Networks
    Shen, Jian
    Zheng, Wenying
    Wang, Jin
    Zheng, Yuhui
    Mei, Yuan
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2013, 6 (04): : 263 - 271
  • [24] Attacks in Delay Tolerant Networks: Classification and Analysis
    Nagrath, Preeti
    Aneja, Sandhya
    Purohit, G. N.
    2019 11TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2019, : 524 - 526
  • [25] A Framework for Anonymous Routing in Delay Tolerant Networks
    Sakai, Kazuya
    Sunk, Min-Te
    Ku, Wei-Shinn
    Wu, Jie
    2017 IEEE 25TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2017,
  • [26] Behavioral Malware Detection in Delay Tolerant Networks
    Peng, Wei
    Li, Feng
    Zou, Xukai
    Wu, Jie
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (01) : 53 - 62
  • [27] Multicast Routing Protocols in Delay Tolerant Networks
    Yin, Wenhua
    Bai, Xiangyu
    Ma, Xuebin
    INTERNATIONAL CONFERENCE MACHINERY, ELECTRONICS AND CONTROL SIMULATION, 2014, 614 : 490 - 496
  • [28] Enhanced delegation forwarding in delay tolerant networks
    Xiao Chen
    Jian Shen
    Jie Wu
    INTERNATIONAL JOURNAL OF PARALLEL EMERGENT AND DISTRIBUTED SYSTEMS, 2011, 26 (05) : 331 - 345
  • [29] Opportunistic key management in delay tolerant networks
    Menesidou S.A.
    Katos V.
    Menesidou, Sofia Anna (smenesid@ee.duth.gr), 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (09): : 212 - 228
  • [30] ARDEN: Anonymous networking in delay tolerant networks
    Shi, Cong
    Luo, Xiapu
    Traynor, Patrick
    Ammar, Mostafa H.
    Zegura, Ellen W.
    AD HOC NETWORKS, 2012, 10 (06) : 918 - 930