Detection and Mitigation of Blackhole Attack Effect in Opportunistic Networks

S Barai, P Bhaumik - 2021 19th OITS International Conference …, 2021 - ieeexplore.ieee.org
Blackhole attack is one of the major security concerns in mobile ad-hoc networks that are
hard to detect. In this type of attack, the malicious node attracts message packets by …

Energy efficient reputation mechanism for defending different types of flooding attack

S Aneja, P Nagrath, GN Purohit - Wireless Networks, 2019 - Springer
Delay tolerant network solves technical challenges in the heterogeneous network that may
lack end-to-end connectivity. However, due to the disconnected paths, message delivery is …

A game theory based secure model against black hole attacks in opportunistic networks

A Chhabra, V Vashishth… - 2017 51st Annual …, 2017 - ieeexplore.ieee.org
Opportunistic Networks, a subset of Delay Tolerant Networks (DTNs), do not have a
predefined source to destination end-to-end path and hence, offer a multitude of challenges …

Securing and facilitating communication within opportunistic networks: a holistic survey

CB Avoussoukpo, TB Ogunseyi, M Tchenagnon - IEEE access, 2021 - ieeexplore.ieee.org
Opportunistic Networks is a new concept that is increasingly gaining ground since it appears
as a concrete example of the Internet of Things, Internet of Vehicles, Industrial Internet of …

A jamming attack detection technique for opportunistic networks

J Singh, I Woungang, SK Dhurandher, K Khalid - Internet of Things, 2022 - Elsevier
Opportunistic networks (OppNets) are dispersed in nature, with nodes acting as resource
restrictions, with intermittent connectivity. These nodes are subject to various types of …

Opportunistic networks: fundamentals, applications and emerging trends

A Verma, P Verma, SK Dhurandher, I Woungang - 2021 - books.google.com
The opportunistic network is an emerging and recent area of research. To make this
research area more adaptable for practical and industrial use, there is a need to further …

A heuristic light weight security algorithm for resource constrained DTN routing

V Juyal, N Pandey, R Saggar - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
Delay Tolerant Network is a buzz word in Mobile Adhoc Network. Research in this direction
started with the approach for interplanetary communication. Delay Tolerant Network (in …

Trust calculation and route discovery for delay tolerant networks

NN Pal, K Gaikwad, D Das - TENCON 2018-2018 IEEE Region …, 2018 - ieeexplore.ieee.org
With the advancement in networking technologies and emerging applications that work on
different protocols, the basic usage of networks, ie, transferring by packets and global …

Design, implementation and analysis of routing based attack model for delay tolerant networks for prophet routing protocol

S Bansal, JS Sivia, HS Bindra - International Journal of …, 2019 - inderscienceonline.com
Delay tolerant network (DTN) is an evolution of mobile adhoc network (MANET). In
computing, network security is the main issue as the attacks by malicious and selfish nodes …

Using cluster analysis to detect attackers in vehicular delay tolerant networks

Y Guo, S Schildt, L Wolf - Ad Hoc Networks: 5th International ICST …, 2014 - Springer
Abstract Delay-and Disruption-Tolerant Networks (DTNs) are a suitable technology for many
applications when the network suffers from intermittent connections and significant delays …