As the feature of delay tolerant networks (DTNs) is open, and intermittent, any node can participate in this type of network. Trusting a DTN node becomes a critical task for the routing algorithms. For the past few years, security techniques have evolved and a lot of research has been carried out in this area. Among these security techniques, trust-based, reputation-based systems, and incentive-based security schemes are discussed in this paper. These techniques are useful to detect selfish DTN nodes and noncooperative DTN nodes. These schemes for DTN nodes are the most common methods to detect malicious, selfish DTN nodes.
CITATION STYLE
Kulkarni, L., Mukhopadhyay, D., & Bakal, J. (2017). Analyzing security schemes in delay tolerant networks. In Advances in Intelligent Systems and Computing (Vol. 468, pp. 613–620). Springer Verlag. https://doi.org/10.1007/978-981-10-1675-2_60
Mendeley helps you to discover research relevant for your work.