Analyzing security schemes in delay tolerant networks

4Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

As the feature of delay tolerant networks (DTNs) is open, and intermittent, any node can participate in this type of network. Trusting a DTN node becomes a critical task for the routing algorithms. For the past few years, security techniques have evolved and a lot of research has been carried out in this area. Among these security techniques, trust-based, reputation-based systems, and incentive-based security schemes are discussed in this paper. These techniques are useful to detect selfish DTN nodes and noncooperative DTN nodes. These schemes for DTN nodes are the most common methods to detect malicious, selfish DTN nodes.

Cite

CITATION STYLE

APA

Kulkarni, L., Mukhopadhyay, D., & Bakal, J. (2017). Analyzing security schemes in delay tolerant networks. In Advances in Intelligent Systems and Computing (Vol. 468, pp. 613–620). Springer Verlag. https://doi.org/10.1007/978-981-10-1675-2_60

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free