Analyzing Security Schemes in Delay Tolerant Networks

被引:3
|
作者
Kulkarni, Lalit [1 ]
Mukhopadhyay, Debajyoti [2 ]
Bakal, Jagdish [3 ]
机构
[1] GH Raisoni Coll Engn, Nagpur, Maharashtra, India
[2] Maharashtra Inst Technol, Pune, Maharashtra, India
[3] SSJ Coll Engn, Dombivali, India
关键词
Delay tolerant networks; Selfish nodes; Opportunistic network; TRUST MANAGEMENT;
D O I
10.1007/978-981-10-1675-2_60
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As the feature of delay tolerant networks (DTNs) is open, and intermittent, any node can participate in this type of network. Trusting a DTN node becomes a critical task for the routing algorithms. For the past few years, security techniques have evolved and a lot of research has been carried out in this area. Among these security techniques, trust-based, reputation-based systems, and incentive-based security schemes are discussed in this paper. These techniques are useful to detect selfish DTN nodes and noncooperative DTN nodes. These schemes for DTN nodes are the most common methods to detect malicious, selfish DTN nodes.
引用
收藏
页码:613 / 620
页数:8
相关论文
共 50 条
  • [1] Anonymity and security in delay tolerant networks
    Kate, Aniket
    Zaverucha, Gregory M.
    Hengartner, Urs
    2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS, 2007, : 504 - 513
  • [2] Analyzing Security Assessment Schemes In Traditional Networks
    Brooks, James
    Dunn, Rod
    2009 INTERNATIONAL CONFERENCE ON SUSTAINABLE POWER GENERATION AND SUPPLY, VOLS 1-4, 2009, : 588 - 593
  • [3] Security considerations in space and delay tolerant networks
    Farrell, Stephen
    Cahill, Vinny
    SMC-IT 2006: 2ND IEEE INTERNATIONAL CONFERENCE ON SPACE MISSION CHALLENGES FOR INFORMATION TECHNOLOGY, PROCEEDINGS, 2006, : 29 - +
  • [4] Performance Study of Routing Schemes in Delay Tolerant Networks
    Lin, Chien-Shiu
    Chang, Wei-Shyh
    Chen, Ling-Jyh
    Chou, Cheng-Fu
    2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3, 2008, : 1702 - 1707
  • [5] Ensuring Communication Security in Delay-Tolerant Networks
    Karkkainen, Anssi
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 193 - 201
  • [6] Modelling security message propagation in delay tolerant networks
    Jia, Zhongtian
    Li, Shudong
    Peng, Haipeng
    Yang, Yixian
    Guo, Shize
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (01) : 51 - 58
  • [7] Adaptive Infection Recovery Schemes for Multicast Delay Tolerant Networks
    Lorenzo, Beatriz
    Glisic, Savo
    Galluccio, Laura
    Fang, Yuguang
    2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 4420 - 4426
  • [8] Analyzing the ACK Counterfeiting Attack in Delay and Disruption Tolerant Networks
    Naves, Juliano F.
    Moraes, Igor M.
    2014 BRAZILIAN SYMPOSIUM ON COMPUTER NETWORKS AND DISTRIBUTED SYSTEMS (SBRC), 2014, : 52 - 59
  • [9] Security Analysis for Delay/Disruption Tolerant Satellite and Sensor Networks
    Bhutta, N.
    Ansa, G.
    Johnson, E.
    Ahmad, N.
    Alsiyabi, M.
    Cruickshank, H.
    2009 INTERNATIONAL WORKSHOP ON SATELLITE AND SPACE COMMUNICATIONS, CONFERENCE PROCEEDINGS, 2009, : 385 - 389
  • [10] Analyzing and designing energy efficient routing protocol in delay tolerant networks
    Nikita Choudhary
    Kunal Mittal
    Krishna Dwypayan Kota
    Preeti Nagrath
    Sandhya Aneja
    CSI Transactions on ICT, 2016, 4 (2-4) : 285 - 291