Detecting colluding blackhole and greyhole attacks in delay tolerant networks

TND Pham, CK Yeo - IEEE Transactions on Mobile Computing, 2015 - ieeexplore.ieee.org
Delay Tolerant Network (DTN) is developed to cope with intermittent connectivity and long
delay in wireless networks. Due to the limited connectivity, DTN is vulnerable to blackhole …

Analysis of dos attacks in delay tolerant networks for emergency evacuation

P Asuquo, H Cruickshank, Z Sun… - … Conference on Next …, 2015 - ieeexplore.ieee.org
In the event of a disaster, there is a severe damage/destruction to physical infrastructures
such as telecommunication and power lines which result in the disruption of communication …

[PDF][PDF] Security in delay-tolerant mobile cyber physical applications

N Magaia, P Pereira, MP Correia, DB Rawat… - … systems: From theory …, 2015 - academia.edu
In delay-tolerant mobile cyber-physical systems, mobile sensing and computing devices
interact following the delay tolerant network (DTN) routing paradigm, storing (or buffering) …

Priority-based approach to mitigate selfish misbehaviour in delay tolerant network

A Patel, D Bhadra - International Journal of Communication …, 2021 - inderscienceonline.com
Delay tolerant networks (DTNs) is a solution to challenged networks which suffer from
intermittent connectivity or high delay, thereby offering delay-tolerant support. DTN focuses …

Security in opportunistic networks

M Singh, P Verma, A Verma - Opportunistic networks, 2021 - taylorfrancis.com
The opportunistic network is a result of intensive research of so many years on mobile ad
hoc networks (MANETs), therefore it is called an extension of MANET. In opportunistic …

Analysis of malicious activity in delay tolerant networks

P Nagrath, A Kumar - … on Innovation and Challenges in Cyber …, 2016 - ieeexplore.ieee.org
Delay Tolerant Network (DTN) is basically a disconnected mobile ad hoc Network. It is
intermittent and sparsely connected because of limited transmission range and mobility. It is …

Cryptography-based misbehavior detection and trust control mechanism for opportunistic network systems

SK Dhurandher, A Kumar, MS Obaidat - IEEE Systems Journal, 2017 - ieeexplore.ieee.org
Opportunistic networks (OppNets) are a subclass of delay tolerant networks and are
characterized by intermittent end-to-end connections. The sparsity in the network and the …

Privacy-preserving history-based routing in Opportunistic Networks

S Rashidibajgan, R Doss - Computers & Security, 2019 - Elsevier
Abstract Opportunistic Networks (OppNets) are a subset of mobile ad-hoc networks
(MANETs) in which mobile nodes negotiate connectivity via short-range wireless …

Detecting flooding attack in delay tolerant networks by piggybacking encounter records

PTN Diep, CK Yeo - … on Information Science and Security (ICISS …, 2015 - ieeexplore.ieee.org
Delay Tolerant Network (DTN) is developed to cope with intermittent connectivity and long
delay in wireless networks. Due to limited bandwidth, connectivity and buffer space, DTN is …

Security and trust in opportunistic networks–a survey

M Alajeely, R Doss, A Ahmad - IETE Technical Review, 2016 - Taylor & Francis
Opportunistic networks or OppNets refer to a number of wireless nodes opportunistically
communicating with each other in a form of “Store–Carry–Forward”. This occurs when they …