Opportunistic mobile networks

S Misra, BK Saha, S Pal - eBook,[Online]. Available: http://www. springer …, 2016 - Springer
As children, many of us were glued to the science fiction stories in comic books or television
shows. Arguably, computer-generated imagery (CGI) in the recent sci-fi shows or movies …

Contact avoidance routing in delay tolerant networks

T Osuki, K Sakai, S Fukumoto - IEEE INFOCOM 2017-IEEE …, 2017 - ieeexplore.ieee.org
Delay tolerant networks (DTNs) are widely adopted to many network applications, such as
disaster recovery and battlefield communications. Such critical network scenarios call for an …

A co-operative approach to thwart selfish and black-hole attacks in DTN for post disaster scenario

AK Gupta, I Bhattacharya, PS Banerjee… - 2014 Fourth …, 2014 - ieeexplore.ieee.org
A Delay Tolerant Network (DTN) is prone to security threats, especially the Selfish and Black-
hole attacks. In this work, we have taken up these two security issues in a DTN based on an …

An improved detecting mechanism against wormhole attacks in delay tolerant networks

J Li, Q Wang, Z Gao - 2018 10th International Conference on …, 2018 - ieeexplore.ieee.org
Delay tolerant network (DTN) is developed for sparse wireless networks with intermittent
connectivity. The low-cost, customized hardware components in DTN nodes leave them …

Dtnma: identifying routing attacks in delay-tolerant network

S Chatterjee, M Nandan, A Ghosh, S Banik - Cyber Intelligence and …, 2022 - Springer
The delay-tolerant networks (DTNs) are mainly characterized by decentralized and self-
managed structures possessing unique features and characteristics. However, limited …

Defending flooding attack in delay tolerant networks

P Nagrath, S Aneja, GN Purohit - … International Conference on …, 2015 - ieeexplore.ieee.org
In Delay Tolerant Networks (DTNs), routing protocols work in an environment where there is
no guarantee of end to end path between source and destination. Mobility of nodes is an …

[HTML][HTML] Message matching-based greedy behavior detection in delay tolerant networks

Y Xie, G Wang - Journal of Computer and System Sciences, 2014 - Elsevier
Delay tolerant networks (DTNs) are resource-constrained networks where messages are
relayed in a store–carry–forward fashion. In most routing protocols of DTNs, each node is …

Authentication in opportunistic networks: State and art

M Abouarork, K Ahmad - Journal of Discrete Mathematical …, 2021 - Taylor & Francis
In opportunistic networks, the nodes connect to each other wirelessly and use the store-carry-
forward technique to transmit the data from one node to another node. Opportunistic …

[PDF][PDF] Preventing Unauthorized Messages and Achieving End-to-End Security in Delay Tolerant Heterogeneous Wireless Networks.

H Samuel, W Zhuang - J. Commun., 2010 - uwaterloo.ca
Maintaining user connectivity over heteroge-neous wireless networks will be a necessity
with the wide spread of wireless networks and limited geographic coverage and capacity of …

Detection and Mitigation of Blackhole Attack Effect in Opportunistic Networks

S Barai, P Bhaumik - 2021 19th OITS International Conference …, 2021 - ieeexplore.ieee.org
Blackhole attack is one of the major security concerns in mobile ad-hoc networks that are
hard to detect. In this type of attack, the malicious node attracts message packets by …