Analyzing Security Schemes in Delay Tolerant Networks

被引:3
|
作者
Kulkarni, Lalit [1 ]
Mukhopadhyay, Debajyoti [2 ]
Bakal, Jagdish [3 ]
机构
[1] GH Raisoni Coll Engn, Nagpur, Maharashtra, India
[2] Maharashtra Inst Technol, Pune, Maharashtra, India
[3] SSJ Coll Engn, Dombivali, India
关键词
Delay tolerant networks; Selfish nodes; Opportunistic network; TRUST MANAGEMENT;
D O I
10.1007/978-981-10-1675-2_60
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As the feature of delay tolerant networks (DTNs) is open, and intermittent, any node can participate in this type of network. Trusting a DTN node becomes a critical task for the routing algorithms. For the past few years, security techniques have evolved and a lot of research has been carried out in this area. Among these security techniques, trust-based, reputation-based systems, and incentive-based security schemes are discussed in this paper. These techniques are useful to detect selfish DTN nodes and noncooperative DTN nodes. These schemes for DTN nodes are the most common methods to detect malicious, selfish DTN nodes.
引用
收藏
页码:613 / 620
页数:8
相关论文
共 50 条
  • [41] Balanced Routing in Delay Tolerant Networks
    Xie, Rui
    PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 1118 - 1122
  • [42] Pseudonymised Communication in Delay Tolerant Networks
    Ahmad, Naveed
    Cruickshank, Haitham
    Sun, Zhili
    Asif, Muhammad
    2011 NINTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2011, : 1 - 6
  • [43] Opportunistic and Delay-Tolerant Networks
    Sergio Palazzo
    Andrew T. Campbell
    Marcelo Dias de Amorim
    EURASIP Journal on Wireless Communications and Networking, 2011
  • [44] Fair Routing in Delay Tolerant Networks
    Pujol, Josep M.
    Lopez Toledo, Alberto
    Rodriguez, Pablo
    IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, : 837 - 845
  • [45] Custodial multicast in delay tolerant networks
    Symington, Susan
    Durst, Robert C.
    Scott, Keith
    2007 4TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2007, : 207 - 211
  • [46] On Anonymous Routing in Delay Tolerant Networks
    Sakai, Kazuya
    Sun, Min-Te
    Ku, Wei-Shinn
    Wu, Jie
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2019, 18 (12) : 2926 - 2940
  • [47] Social based throwbox placement schemes for large-scale mobile social delay tolerant networks
    Zhu, Ying
    Zhang, Chao
    Mao, Xufei
    Wang, Yu
    COMPUTER COMMUNICATIONS, 2015, 65 : 10 - 26
  • [48] Data communication over challenged networks: Application of error control schemes in the delay tolerant network architectures
    de Cola, T
    Ernst, H
    Marchese, M
    2nd International Symposium on Wireless Communications Systems 2005 (ISWCS 2005), 2005, : 790 - 794
  • [49] Delay tolerant firework routing: a geographic routing protocol for wireless delay tolerant networks
    Anna Sidera
    Stavros Toumpis
    EURASIP Journal on Wireless Communications and Networking, 2013
  • [50] Delay tolerant firework routing: a geographic routing protocol for wireless delay tolerant networks
    Sidera, Anna
    Toumpis, Stavros
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2013,