Detecting flooding attack in delay tolerant networks by piggybacking encounter records

PTN Diep, CK Yeo - … on Information Science and Security (ICISS …, 2015 - ieeexplore.ieee.org
Delay Tolerant Network (DTN) is developed to cope with intermittent connectivity and long
delay in wireless networks. Due to limited bandwidth, connectivity and buffer space, DTN is …

Analyzing security schemes in delay tolerant networks

L Kulkarni, D Mukhopadhyay, J Bakal - Proceedings of the International …, 2017 - Springer
As the feature of delay tolerant networks (DTNs) is open, and intermittent, any node can
participate in this type of network. Trusting a DTN node becomes a critical task for the routing …

[引用][C] Survey Of Misbehaviors Of Node And Routing Attack In Delay Tolerant Network

DS Singh, K Elayaraja - International Journal of Science Engineering and …, 2015

An energy-efficient technique to combat DOS attacks in delay tolerant networks

G Ansa, H Cruickshank, Z Sun - EAI Endorsed Transactions on Ubiquitous …, 2012 - eudl.eu
Delay tolerant networks (DTN) are highly constrained networking environments low in
resources such as memory, bandwidth, battery and processing power. In opportunistic …

Secure multi-copy routing in compromised delay tolerant networks

E Bulut, BK Szymanski - Wireless personal communications, 2013 - Springer
Routing in delay tolerant networks (DTNs) is challenging due to their unique characteristics
of intermittent node connectivity. Different protocols (single-, multi-copy, erasure-coding …

SF-APP: A secure framework for authentication and privacy preservation in opportunistic networks

P Kumar, N Chauhan, N Chand… - International Journal of …, 2018 - igi-global.com
Opportunistic networks are the special class of ad hoc networks where permanent link
among the nodes are almost absent and communication occurs when an “opportunity” is …

[PDF][PDF] Considerations and open issues in delay tolerant network'S (DTNs) security

HS Bindra, AL Sangal - Wireless Sensor Network, 2010 - file.scirp.org
Abstract Delay Tolerant Network (DTN) addresses challenges of providing end-to-end
service where end-to-end data forwarding paths may not exist. Security and privacy are …

FRID: Flood attack mitigation using resources efficient intrusion detection techniques in delay tolerant networks

W Khalid, N Ahmed, M Khalid, AU Din, A Khan… - IEEE …, 2019 - ieeexplore.ieee.org
Delay tolerant networks (DTNs) are a special type of intermittently connected networks (ICN)
featured by variable delay, frequent disruption, asymmetric data rates, and high-error rates …

[PDF][PDF] A security scheme to mitigate denial of service attacks in delay tolerant networks

G Ansa, H Cruickshank, Z Sun… - Journal of Computer …, 2017 - researchgate.net
Abstract Denial of Service (DoS) attacks are a major network security threat which affects
both wired and wireless networks. The effect of DoS attacks is even more damaging in Delay …

On detecting route hijacking attack in opportunistic mobile networks

A Altaweel, R Stoleru, G Gu, AK Maity… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In this paper, we show that Hybrid Routing and Prophet protocols in Opportunistic Mobile
Networks (OMNs) are vulnerable to the CollusiveHijack attack, in which a malicious attacker …