Analyzing Security Schemes in Delay Tolerant Networks

被引:3
|
作者
Kulkarni, Lalit [1 ]
Mukhopadhyay, Debajyoti [2 ]
Bakal, Jagdish [3 ]
机构
[1] GH Raisoni Coll Engn, Nagpur, Maharashtra, India
[2] Maharashtra Inst Technol, Pune, Maharashtra, India
[3] SSJ Coll Engn, Dombivali, India
来源
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DATA ENGINEERING AND COMMUNICATION TECHNOLOGY, ICDECT 2016, VOL 1 | 2017年 / 468卷
关键词
Delay tolerant networks; Selfish nodes; Opportunistic network; TRUST MANAGEMENT;
D O I
10.1007/978-981-10-1675-2_60
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As the feature of delay tolerant networks (DTNs) is open, and intermittent, any node can participate in this type of network. Trusting a DTN node becomes a critical task for the routing algorithms. For the past few years, security techniques have evolved and a lot of research has been carried out in this area. Among these security techniques, trust-based, reputation-based systems, and incentive-based security schemes are discussed in this paper. These techniques are useful to detect selfish DTN nodes and noncooperative DTN nodes. These schemes for DTN nodes are the most common methods to detect malicious, selfish DTN nodes.
引用
收藏
页码:613 / 620
页数:8
相关论文
共 50 条
  • [41] Routing in delay tolerant networks with periodic connections
    Mergenci, Cem
    Korpeoglu, Ibrahim
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2015,
  • [42] Selfish Node Detection in Delay Tolerant Networks Using Fuzzy Logic
    Rashidjafari, Fahimeh
    Derakhshanfard, Nahideh
    Shahrokhzadeh, Behrouz
    Ghaffari, Ali
    FUZZY INFORMATION AND ENGINEERING, 2024, 16 (04) : 285 - 299
  • [43] Contact Avoidance Routing in Delay Tolerant Networks
    Osuki, Tomoya
    Sakai, Kazuya
    Fukumoto, Satoshi
    IEEE INFOCOM 2017 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2017,
  • [44] On the Delay/Cost Tradeoff in Wireless Mobile Delay-Tolerant Networks
    Sidera, Anna
    Toumpis, Stavros
    2014 12TH INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC, AND WIRELESS NETWORKS (WIOPT), 2014, : 452 - 459
  • [45] Augur: A Delay Aware Forwarding Protocol for Delay-Tolerant Networks
    El Shoghri, Ahmad
    Kusy, Branislav
    Jurdak, Raja
    Bergmann, Neil
    2015 IEEE 11TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2015, : 460 - 467
  • [46] Integrated Social and QoS Trust-Based Routing in Delay Tolerant Networks
    Ing-Ray Chen
    Fenye Bao
    MoonJeong Chang
    Jin-Hee Cho
    Wireless Personal Communications, 2012, 66 : 443 - 459
  • [47] Integrated Social and QoS Trust-Based Routing in Delay Tolerant Networks
    Chen, Ing-Ray
    Bao, Fenye
    Chang, MoonJeong
    Cho, Jin-Hee
    WIRELESS PERSONAL COMMUNICATIONS, 2012, 66 (02) : 443 - 459
  • [48] Network Coding for Overhead Reduction in Delay Tolerant Networks
    Anna Vazintari
    Christina Vlachou
    Panayotis G. Cottis
    Wireless Personal Communications, 2013, 72 : 2653 - 2671
  • [49] Mobility Models for Delay-Tolerant Mobile Networks
    Dang, Ha
    Wu, Hongyi
    2009 3RD INTERNATIONAL CONFERENCE ON SENSOR TECHNOLOGIES AND APPLICATIONS (SENSORCOMM 2009), 2009, : 55 - 60
  • [50] An Optimal Probabilistic Forwarding Protocol in Delay Tolerant Networks
    Liu, Cong
    Wu, Jie
    MOBIHOC'09 PROCEEDINGS OF THE TENTH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING, 2009, : 105 - 114