Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 468))

Abstract

As the feature of delay tolerant networks (DTNs) is open, and intermittent, any node can participate in this type of network. Trusting a DTN node becomes a critical task for the routing algorithms. For the past few years, security techniques have evolved and a lot of research has been carried out in this area. Among these security techniques, trust-based, reputation-based systems, and incentive-based security schemes are discussed in this paper. These techniques are useful to detect selfish DTN nodes and noncooperative DTN nodes. These schemes for DTN nodes are the most common methods to detect malicious, selfish DTN nodes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. H. Zhu, X. Lin, R. Lu, Y. Fan, and X. Shen, “SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks”, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 58, NO. 8, OCTOBER 2009.

    Google Scholar 

  2. R. Lu, H. Zhu, X. Lin, Y. Fan, and X. Shen, “Pi: A Practical Incentive Protocol for Delay Tolerant Networks” IEEE Transactions on Wireless Communications, vol. 9, no. 4, April 2010.

    Google Scholar 

  3. E. Ayday and F. Fekri, “Iterative Trust and Reputation Management Using Belief Propagation,” IEEE Transactions On Dependable and Secure Computing, vol. 9, no. 3, pp. 375–386, May. 2012.

    Google Scholar 

  4. H. Zhu, X. Lin, R. Lu, Y. Fan, and X. Shen, “SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks”, IEEE Transactions On Vehicular Technology, vol. 58, no. 8, October 2009.

    Google Scholar 

  5. E. Tamez, I. Woungang and L. Lilien, “Trust Management in Opportunistic Networks: A Semantic Web Approach”, IEEE conference on, Security and Trust and the Management of e-Business, vol. 13 no. 5 pp 235–238. 2009.

    Google Scholar 

  6. A. Shikfa, M. Onen and R. Molva, “Privacy in Content-Based Opportunistic Networks”, IEEE conference on Advanced Information Networking and Applications Workshops, vol. 12 no. 3, pp 832–837.

    Google Scholar 

  7. I. Chen, F. Bao, M Chang and J. Cho, “Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 5, MAY 2014 pp 1200–1210.

    Google Scholar 

  8. E. Ayday, H. Lee, and F. Fekri, “Trust Management and Adversary Detection for Delay Tolerant Networks,” Military Communication Conference, pp. 1788–1793, Oct. 2010.

    Google Scholar 

  9. A. Shikfa, M. Onen and R. Molva, “Privacy in Context-Based and Epidemic Forwarding”, IEEE International Symposium on World of Wireless, Mobile and Multimedia Networks & Workshops, 2009, WoWMoM 2009.

    Google Scholar 

  10. X. Zhuo, W. Gao, G. Cao, and S. Hua “An Incentive Framework for Cellular Traffic Offloading”, IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 13, NO. 3, MARCH 2014 pp. 541–555.

    Google Scholar 

  11. L. Wei, Z. Cao and H. Zhu “MobiGame: A User-Centric Reputation based Incentive Protocol for Delay/Disruption Tolerant Networks”, IEEE Globecom 2011 Proceedings.

    Google Scholar 

  12. H. Zhu, S. Du, Z. Gao, M. Dong and Z. Cao “A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 1, JANUARY 2014.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lalit Kulkarni .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Science+Business Media Singapore

About this paper

Cite this paper

Lalit Kulkarni, Debajyoti Mukhopadhyay, Jagdish Bakal (2017). Analyzing Security Schemes in Delay Tolerant Networks. In: Satapathy, S., Bhateja, V., Joshi, A. (eds) Proceedings of the International Conference on Data Engineering and Communication Technology. Advances in Intelligent Systems and Computing, vol 468. Springer, Singapore. https://doi.org/10.1007/978-981-10-1675-2_60

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-1675-2_60

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-1674-5

  • Online ISBN: 978-981-10-1675-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics