A taxonomy on misbehaving nodes in delay tolerant networks

Abstract Delay Tolerant Networks (DTNs) are type of Intermittently Connected Networks (ICNs) featured by long delay, intermittent connectivity, asymmetric data rates and high error rates. DTNs have been primarily developed for InterPlanetary Networks (IPNs), however, have shown promising potential in challenged networks i.e. DakNet, ZebraNet, KioskNet and WiderNet. Due to unique nature of intermittent connectivity and long delay, DTNs face challenges in routing, key management, privacy, fragmentation and misbehaving nodes. Here, misbehaving nodes i.e. malicious and selfish nodes launch various attacks including flood, packet drop and fake packets attack, inevitably overuse scarce resources (e.g., buffer and bandwidth) in DTNs. The focus of this survey is on a review of misbehaving node attacks, and detection algorithms. We firstly classify various of attacks depending on the type of misbehaving nodes. Then, detection algorithms for these misbehaving nodes are categorized depending on preventive and detective based features. The panoramic view on misbehaving nodes and detection algorithms are further analyzed, evaluated mathematically through a number of performance metrics. Future directions guiding this topic are also presented.

[1]  Muhammad Arshad,et al.  A survey of local/cooperative-based malicious information detection techniques in VANETs , 2018, EURASIP J. Wirel. Commun. Netw..

[2]  Liang Zhou,et al.  Cooperation advances on vehicular communications: A survey , 2014, Veh. Commun..

[3]  Jiahai Yang,et al.  A Lightweight DDoS Flooding Attack Detection Algorithm Based on Synchronous Long Flows , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[4]  Chandrima Chakrabarti An incentive driven reliable message exchange scheme in post-disaster situation using delay tolerant network , 2016, CSI Transactions on ICT.

[5]  K. Devi,et al.  Detecting misbehavior routing and attacks in disruption tolerant network using itrm , 2013, 2013 International Conference on Current Trends in Engineering and Technology (ICCTET).

[6]  Pan Hui,et al.  Distributed community detection in delay tolerant networks , 2007, MobiArch '07.

[7]  Shou-Chih Lo,et al.  Routing and Buffering Strategies in Delay-Tolerant Networks: Survey and Evaluation , 2011, 2011 40th International Conference on Parallel Processing Workshops.

[8]  Xiaolei Dong,et al.  Secure and Privacy Preserving Protocol for Cloud-Based Vehicular DTNs , 2015, IEEE Transactions on Information Forensics and Security.

[9]  Robin Doss,et al.  Security and Trust in Opportunistic Networks – A Survey , 2016 .

[10]  Debajyoti Mukhopadhyay,et al.  Analyzing Security Schemes in Delay Tolerant Networks , 2017 .

[11]  Haitham S. Cruickshank,et al.  Privacy-Enhanced Group Communication for Vehicular Delay Tolerant Networks , 2015, 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies.

[12]  Hui Cheng,et al.  A routing defense mechanism using evolutionary game theory for Delay Tolerant Networks , 2016, Appl. Soft Comput..

[13]  Li Liu A survey on barter-based incentive mechanism in opportunistic networks , 2013, 2013 2nd International Symposium on Instrumentation and Measurement, Sensor Network and Automation (IMSNA).

[14]  Wenjia Li,et al.  ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.

[15]  C. C. Sobin,et al.  An Efficient Buffer Management Policy for DTN , 2016 .

[16]  Chunming Qiao,et al.  A bargaining-based approach for incentive-compatible message forwarding in opportunistic networks , 2012, 2012 IEEE International Conference on Communications (ICC).

[17]  Davide Dardari,et al.  Distributed faulty node detection in DTNs in presence of Byzantine attack , 2017, 2017 IEEE International Conference on Communications (ICC).

[18]  Gayathri Devi.S,et al.  Deducing Malicious Attacks in Disruption Tolerant Networks , 2014 .

[19]  Haitham S. Cruickshank,et al.  Geographic-Based Spray-and-Relay (GSaR): An Efficient Routing Scheme for DTNs , 2015, IEEE Transactions on Vehicular Technology.

[20]  Anders Lindgren,et al.  Probabilistic routing in intermittently connected networks , 2003, MOCO.

[21]  Chadi Assi,et al.  Disruption-Tolerant Networking: A Comprehensive Survey on Recent Developments and Persisting Challenges , 2012, IEEE Communications Surveys & Tutorials.

[22]  Yezid Donoso,et al.  Delay/Disruption Tolerant Networks based message forwarding algorithm for rural Internet connectivity applications , 2016, 2016 6th International Conference on Computers Communications and Control (ICCCC).

[23]  Soo-Hyun Park,et al.  Security Challenges of DTN Mechanism for IoUT , 2015 .

[24]  Muhammad Arshad,et al.  A Survey of Routing Issues and Associated Protocols in Underwater Wireless Sensor Networks , 2017, J. Sensors.

[25]  Zhenfu Cao,et al.  MobiGame: A User-Centric Reputation Based Incentive Protocol for Delay/Disruption Tolerant Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[26]  Stephen Farrell,et al.  DTN: an architectural retrospective , 2008, IEEE Journal on Selected Areas in Communications.

[27]  Zhenfu Cao,et al.  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks , 2014 .

[28]  Xiangyu Bai,et al.  Content delivery mechanism in Delay Tolerant Network , 2016, 2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS).

[29]  Yong Wang,et al.  Energy-efficient computing for wildlife tracking: design tradeoffs and early experiences with ZebraNet , 2002, ASPLOS X.

[30]  Daniel T. Fokum,et al.  Coping with denial-of-service attacks on the IP telephony system , 2016, SoutheastCon 2016.

[31]  Haitham S. Cruickshank,et al.  A comparative simulation based analysis of location based routing protocols in underwater wireless sensor networks , 2017, 2017 2nd Workshop on Recent Trends in Telecommunications Research (RTTR).

[32]  Zahid Ullah,et al.  Comparison of Localization Free Routing Protocols in Underwater Wireless Sensor Networks , 2017 .

[33]  Yuanda Cao,et al.  Similarity Degree-Based Mobility Pattern Aware Routing in DTNs , 2009, 2009 International Symposium on Intelligent Ubiquitous Computing and Education.

[34]  Cesare Stefanelli,et al.  Information-Centric Networking in next-generation communications scenarios , 2017, J. Netw. Comput. Appl..

[35]  Naércio Magaia,et al.  Nodes' misbehavior in Vehicular Delay-Tolerant Networks , 2013, 2013 Conference on Future Internet Communications (CFIC).

[36]  Chai Kiat Yeo,et al.  Detecting Flooding Attack in Delay Tolerant Networks by Piggybacking Encounter Records , 2015, 2015 2nd International Conference on Information Science and Security (ICISS).

[37]  Nadeem Javaid,et al.  SEDG: Scalable and Efficient Data Gathering Routing Protocol for Underwater WSNs , 2015, ANT/SEIT.

[38]  Roberto Di Pietro,et al.  Security in wireless ad-hoc networks - A survey , 2014, Comput. Commun..

[39]  Honglong Chen,et al.  Making Nodes Cooperative: A Secure Incentive Mechanism for Message Forwarding in DTNs , 2013, 2013 22nd International Conference on Computer Communication and Networks (ICCCN).

[40]  Vishal Gupta,et al.  Protection against packet drop attack , 2014, 2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014).

[41]  Salil S. Kanhere,et al.  A Bayesian Routing Framework for Delay Tolerant Networks , 2010, 2010 IEEE Wireless Communication and Networking Conference.

[42]  Chandrima Chakrabarti,et al.  An observer-based distributed scheme for selfish-node detection in a post-disaster communication environment using delay tolerant network , 2014, 2014 Applications and Innovations in Mobile Computing (AIMoC).

[43]  Jian Ren,et al.  A Novel Delay-Aware and Privacy-Preserving Data-Forwarding Scheme for Urban Sensing Network , 2016, IEEE Transactions on Vehicular Technology.

[44]  Jin-Hee Cho,et al.  PROVEST: Provenance-Based Trust Model for Delay Tolerant Networks , 2018, IEEE Transactions on Dependable and Secure Computing.

[45]  Yue Cao,et al.  A Critical Analysis of Research Potential, Challenges, and Future Directives in Industrial Wireless Sensor Networks , 2018, IEEE Communications Surveys & Tutorials.

[46]  Mun Choon Chan,et al.  Robustness of DTN against routing attacks , 2010, 2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010).

[47]  J. K. Mandal,et al.  Mitigating selfish, blackhole and wormhole attacks in DTN in a secure, cooperative way , 2017, Int. J. Inf. Comput. Secur..

[48]  Gihwan Cho,et al.  Applying a Security Architecture with Key Management Framework to the Delay/Disruption Tolerant Networks , 2015 .

[49]  Jie Yang,et al.  MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks , 2010, 2010 IEEE Wireless Communication and Networking Conference.

[50]  Qinghua Li,et al.  To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks , 2013, IEEE Transactions on Dependable and Secure Computing.

[51]  Milena Radenkovic,et al.  Erasure coding with replication to defend against malicious attacks in DTN , 2011, 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[52]  Lars C. Wolf,et al.  Detecting malicious behavior in a vehicular DTN for public transportation , 2013, Global Information Infrastructure Symposium - GIIS 2013.

[53]  Xiaodong Lin,et al.  SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks , 2009, IEEE Transactions on Vehicular Technology.

[54]  Simin Nadjm-Tehrani,et al.  Opportunistic DTN routing with window-aware adaptive replication , 2008, AINTEC '08.

[55]  Robin Doss,et al.  Malicious Node Traceback in Opportunistic Networks Using Merkle Trees , 2015, 2015 IEEE International Conference on Data Science and Data Intensive Systems.

[56]  Mooi Choo Chuah,et al.  Detecting wormhole attacks in delay-tolerant networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.

[57]  Vassilis Tsaoussidis,et al.  Packet size and DTN transport service: Evaluation on a DTN Testbed , 2010, International Congress on Ultra Modern Telecommunications and Control Systems.

[58]  Md. Yusuf Sarwar Uddin,et al.  RELICS: In-network realization of incentives to combat selfishness in DTNs , 2010, The 18th IEEE International Conference on Network Protocols.

[59]  Preeti Nagrath,et al.  Analysis of malicious activity in delay tolerant networks , 2016, 2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH).

[60]  Mohammad S. Obaidat,et al.  Cryptography-Based Misbehavior Detection and Trust Control Mechanism for Opportunistic Network Systems , 2018, IEEE Systems Journal.

[61]  Sajal K. Das,et al.  Design of efficient lightweight strategies to combat DoS attack in delay tolerant network routing , 2018, Wirel. Networks.

[62]  Nabil Benamar,et al.  New Classification of Nodes Cooperation in Delay Tolerant Networks , 2015, UNet.

[63]  Jörg Ott,et al.  Controlling resource hogs in mobile delay-tolerant networks , 2010, Comput. Commun..

[64]  Honggang Wang,et al.  Security-oriented opportunistic data forwarding in Mobile Social Networks , 2017, Future Gener. Comput. Syst..

[65]  Zhili Sun,et al.  Routing in Delay/Disruption Tolerant Networks: A Taxonomy, Survey and Challenges , 2013, IEEE Communications Surveys & Tutorials.

[66]  Krupa Dave,et al.  Delay Tolerant Network , 2013 .

[67]  Vicky H. Mak-Hau,et al.  Catabolism attack and Anabolism defense: A novel attack and traceback mechanism in Opportunistic Networks , 2015, Comput. Commun..

[68]  Wesley M. Eddy,et al.  A bundle of problems , 2009, 2009 IEEE Aerospace conference.

[69]  Lionel Brunie,et al.  An investigation on the unwillingness of nodes to participate in mobile delay tolerant network routing , 2013, Int. J. Inf. Manag..

[70]  Vicky H. Mak-Hau,et al.  Packet Faking Attack: A Novel Attack and Detection Mechanism in OppNets , 2014, 2014 Tenth International Conference on Computational Intelligence and Security.

[71]  Igor M. Moraes,et al.  Mitigating the ACK counterfeiting attack in Delay and Disruption Tolerant Networks , 2017, 2017 IEEE Symposium on Computers and Communications (ISCC).

[72]  Preeti Nagrath,et al.  Defending flooding attack in Delay Tolerant Networks , 2015, 2015 International Conference on Information Networking (ICOIN).

[73]  V. Umarani,et al.  Detection of selfish & malicious behavior using DTN-chord monitoring in mobile networks , 2016, 2016 International Conference on Information Communication and Embedded Systems (ICICES).

[74]  Doina Bucur,et al.  Improved search methods for assessing Delay-Tolerant Networks vulnerability to colluding strong heterogeneous attacks , 2017, Expert Syst. Appl..

[75]  Célio Vinicius N. de Albuquerque,et al.  NECTAR: a DTN routing protocol based on neighborhood contact history , 2009, SAC '09.

[76]  Zhipeng Cai,et al.  A novel approach for inhibiting misinformation propagation in human mobile opportunistic networks , 2017, Peer-to-Peer Netw. Appl..

[77]  Ing-Ray Chen,et al.  A survey of intrusion detection in wireless network applications , 2014, Comput. Commun..

[78]  C. Balamurugan,et al.  Detection of flood Attacks in DTN using rate limiter Technique , 2014, J. Comput. Sci..

[79]  Toru Fujiwara,et al.  Detecting Flooding Attack and Accommodating Burst Traffic in Delay-Tolerant Networks , 2018, IEEE Transactions on Vehicular Technology.

[80]  J. Dhivya,et al.  A survey of backpressure based scheduling algorithms for delay tolerant networks , 2014, International Conference on Information Communication and Embedded Systems (ICICES2014).

[81]  Lionel Brunie,et al.  4PR: Privacy preserving routing in mobile delay tolerant networks , 2016, Comput. Networks.

[82]  Jörg Ott,et al.  The ONE simulator for DTN protocol evaluation , 2009, SIMUTools 2009.

[83]  Mario Gerla,et al.  A security framework for content retrieval in DTNs , 2016, 2016 International Wireless Communications and Mobile Computing Conference (IWCMC).

[84]  E. A. Mary Anita,et al.  A novel robust routing protocol RAEED to avoid DoS attacks in WSN , 2016, 2016 International Conference on Information Communication and Embedded Systems (ICICES).

[85]  Yue Wu,et al.  Security and trust management in opportunistic networks: a survey , 2015, Secur. Commun. Networks.

[86]  Naércio Magaia,et al.  Selfish and malicious behavior in Delay-Tolerant Networks , 2013, 2013 Future Network & Mobile Summit.

[87]  William L. Van Besien Dynamic, non-interactive key management for the bundle protocol , 2010, CHANTS '10.

[88]  Aniket Kate,et al.  Anonymity and security in delay tolerant networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[89]  Godwin Ansa,et al.  A DOS-resilient design for delay tolerant networks , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.

[90]  Sencun Zhu,et al.  Resource-misuse attack detection in delay-tolerant networks , 2011, 30th IEEE International Performance Computing and Communications Conference.

[91]  Stefan Savage,et al.  Detecting and Isolating Malicious Routers , 2006, IEEE Transactions on Dependable and Secure Computing.

[92]  Vicky H. Mak-Hau,et al.  Defense against packet collusion attacks in opportunistic networks , 2017, Comput. Secur..

[93]  Chai Kiat Yeo,et al.  A Queuing Mechanism to Alleviate Flooding Attacks in Probabilistic Delay Tolerant Networks , 2010, 2010 Sixth Advanced International Conference on Telecommunications.

[94]  Lars C. Wolf,et al.  Mitigating Blackhole attacks in a hybrid VDTN , 2014, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014.

[95]  Rongxing Lu,et al.  PMDS: A probabilistic misbehavior detection scheme in DTN , 2012, 2012 IEEE International Conference on Communications (ICC).

[96]  Haitham S. Cruickshank,et al.  Approach-and-Roam (AaR): A Geographic Routing Scheme for Delay/Disruption Tolerant Networks , 2014, IEEE Transactions on Vehicular Technology.

[97]  Jin-Hee Cho,et al.  Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing , 2014, IEEE Transactions on Parallel and Distributed Systems.

[98]  Yin Zhang,et al.  Incentive-aware routing in DTNs , 2008, 2008 IEEE International Conference on Network Protocols.

[99]  Cauligi S. Raghavendra,et al.  Spray and Focus: Efficient Mobility-Assisted Routing for Heterogeneous and Correlated Mobility , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).

[100]  Sajal K. Das,et al.  A trust-based framework for data forwarding in opportunistic networks , 2013, Ad Hoc Networks.

[101]  Vasilios Katos,et al.  Authenticated Key Exchange (AKE) in Delay Tolerant Networks , 2012, SEC.

[102]  S. Jayashri,et al.  Design and performance of dynamic trust management for secure routing protocol , 2016, 2016 IEEE International Conference on Advances in Computer Applications (ICACA).

[103]  Shin-Ming Cheng,et al.  A responsive probing approach to detect dynamic intrusion in a MANET , 2016, 2016 7th International Conference on Information, Intelligence, Systems & Applications (IISA).

[104]  Haitham S. Cruickshank,et al.  A Mobility-Aware Trust Management Scheme for Emergency Communication Networks Using DTN , 2016, WISATS.

[105]  Qinghua Li,et al.  Mitigating Routing Misbehavior in Disruption Tolerant Networks , 2012, IEEE Transactions on Information Forensics and Security.

[106]  Sudha Krishnamurthy,et al.  CREST: An Opportunistic Forwarding Protocol Based on Conditional Residual Time , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[107]  Abderrahmane Baadache,et al.  Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks , 2012, J. Netw. Comput. Appl..

[108]  Su Deng,et al.  On Modeling The Impact of Selfish Behaviors on Limited Epidemic Routing in Delay Tolerant Networks , 2013, Wirel. Pers. Commun..

[109]  Radhika M. Pai,et al.  Mitigation of insider and outsider DoS attack against signature based authentication in VANETs , 2014, 2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE).

[110]  Chandrima Chakrabarti,et al.  A dynamic two hops reputation assignment scheme for selfish node detection and avoidance in delay tolerant network , 2015, 2015 IEEE International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN).

[111]  Vaskar Raychoudhury,et al.  A survey of routing and data dissemination in Delay Tolerant Networks , 2016, J. Netw. Comput. Appl..

[112]  Liang Zhou,et al.  Performance evaluation of cooperative strategies for Vehicular Delay-Tolerant Networks , 2014, Trans. Emerg. Telecommun. Technol..

[113]  Chai Kiat Yeo,et al.  Detecting flooding attack while accommodating burst traffic in delay tolerant networks , 2017, 2017 Wireless Telecommunications Symposium (WTS).

[114]  Jie Wu,et al.  Thwarting Blackhole Attacks in Disruption-Tolerant Networks using Encounter Tickets , 2009, IEEE INFOCOM 2009.

[115]  Honglong Chen,et al.  A Secure Credit-Based Incentive Mechanism for Message Forwarding in Noncooperative DTNs , 2016, IEEE Transactions on Vehicular Technology.

[116]  Doina Bucur,et al.  Optimizing groups of colluding strong attackers in mobile urban communication networks with evolutionary algorithms , 2016, Appl. Soft Comput..

[117]  Sudip Misra,et al.  Enforcing Cooperation in OMNs , 2016 .

[118]  Divya Kuriakose,et al.  Effective defending against flood attack using stream-check method in tolerant network , 2014, 2014 International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE).

[119]  Stephen Farrell,et al.  Delay-Tolerant Networking Security Overview , 2009 .

[120]  A. Bouabdallah,et al.  A Simulation Analysis of Routing Misbehaviour in Mobile Ad Hoc Networks , 2008, 2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies.

[121]  Boleslaw K. Szymanski,et al.  Cost Efficient Erasure Coding Based Routing in Delay Tolerant Networks , 2010, 2010 IEEE International Conference on Communications.

[122]  Zygmunt J. Haas,et al.  Resource and performance tradeoffs in delay-tolerant wireless networks , 2005, WDTN '05.

[123]  Poonam Sharma,et al.  Selfish nodes detection in delay tolerant networks , 2015, 2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE).

[124]  Jörg Ott,et al.  Message fragmentation in opportunistic DTNs , 2008, 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[125]  Michael Schneider,et al.  Merkle Tree Traversal Revisited , 2008, PQCrypto.

[126]  Haitham S. Cruickshank,et al.  Analysis of DoS Attacks in Delay Tolerant Networks for Emergency Evacuation , 2015, 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies.

[127]  Haitham S. Cruickshank,et al.  Pseudonymised communication in delay tolerant networks , 2011, 2011 Ninth Annual International Conference on Privacy, Security and Trust.

[128]  Vinton G. Cerf,et al.  Delay-tolerant networking: an approach to interplanetary Internet , 2003, IEEE Commun. Mag..

[129]  Srinivasan Keshav,et al.  Very low-cost internet access using KioskNet , 2007, CCRV.

[130]  Rafal Skowronski Fully Distributed GRIDNET protocol, with no trusted authorities , 2017, 2017 International Conference on Information Networking (ICOIN).

[131]  Hongjun Dai,et al.  A Multivariate Classification Algorithm for Malicious Node Detection in Large-Scale WSNs , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[132]  Greg Bigwood,et al.  Incentive-Aware Opportunistic Network Routing , 2013 .

[133]  Ying Cai,et al.  An Incentive-Compatible Routing Protocol for Two-Hop Delay-Tolerant Networks , 2016, IEEE Transactions on Vehicular Technology.

[134]  Iain Parris,et al.  Friend or Flood? Social Prevention of Flooding Attacks in Mobile Opportunistic Networks , 2014, 2014 IEEE 34th International Conference on Distributed Computing Systems Workshops (ICDCSW).

[135]  Tao Li,et al.  CCQR: Constant Cost Quality-based Routing Protocol in Delay Tolerant Networks , 2009, 2009 15th International Conference on Parallel and Distributed Systems.

[136]  M. P. Singh,et al.  A survey paper on routing in delay-tolerant networks , 2013, 2013 International Conference on Information Systems and Computer Networks.

[137]  Mohammad S. Obaidat,et al.  An altruism-based trust-dependent message forwarding protocol for opportunistic networks , 2017, Int. J. Commun. Syst..

[138]  Siuli Roy,et al.  A Global Reputation Estimation and Analysis Technique for detection of malicious nodes in a Post-Disaster Communication environment , 2014, 2014 Applications and Innovations in Mobile Computing (AIMoC).

[139]  Feng Xia,et al.  A Cooperative Watchdog System to Detect Misbehavior Nodes in Vehicular Delay-Tolerant Networks , 2015, IEEE Transactions on Industrial Electronics.

[140]  Erman Ayday,et al.  An Iterative Algorithm for Trust Management and Adversary Detection for Delay-Tolerant Networks , 2012, IEEE Transactions on Mobile Computing.

[141]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[142]  Amir Qayyum,et al.  Cooperation in Opportunistic Networks: An Overlay Approach for Destination-Dependent Utility-Based Schemes , 2017 .

[143]  Soufiene Djahel,et al.  Mitigating Packet Dropping Problem in Mobile Ad Hoc Networks: Proposals and Challenges , 2011, IEEE Communications Surveys & Tutorials.

[144]  Sumet Prabhavat,et al.  An efficient message flooding scheme in delay-tolerant networks , 2015, 2015 7th International Conference on Information Technology and Electrical Engineering (ICITEE).

[145]  Anjali A. Chandavale,et al.  An approach to detect malicious node for Delay Tolerant Networks , 2015, TENCON 2015 - 2015 IEEE Region 10 Conference.

[146]  Tat-Chee Wan,et al.  A survey on current status of Disruption Tolerant Network support for Multicast , 2016, 2016 3rd International Conference on Computer and Information Sciences (ICCOINS).

[147]  Jianhua Fan,et al.  Delay/Disruption Tolerant Network and its application in military communications , 2010, 2010 International Conference On Computer Design and Applications.

[148]  Robin Doss,et al.  Defense against packet dropping attacks in opportunistic networks , 2014, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[149]  Laura Galluccio,et al.  Distributed Faulty Node Detection in DTNs , 2016, 2016 25th International Conference on Computer Communication and Networks (ICCCN).

[150]  Levente Buttyán,et al.  Barter trade improves message delivery in opportunistic networks , 2010, Ad Hoc Networks.

[151]  Kevin R. Fall,et al.  A delay-tolerant network architecture for challenged internets , 2003, SIGCOMM '03.

[152]  Saman Taghavi Zargar,et al.  A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.

[153]  Robin Doss,et al.  Establishing trust relationships in OppNets using Merkle trees , 2016, 2016 8th International Conference on Communication Systems and Networks (COMSNETS).

[154]  Ibrahim Matta,et al.  PreDA: Predicate Routing for DTN Architectures over MANET , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[155]  Liang Zhou,et al.  A Novel Cooperation Strategy for Mobile Health Applications , 2013, IEEE Journal on Selected Areas in Communications.

[156]  C. Siva Ram Murthy,et al.  A Realistic Framework for Delay-Tolerant Network Routing in Open Terrains with Continuous Churn , 2011, ICDCN.

[157]  Robin Doss,et al.  Reputation based malicious node detection in OppNets , 2016, 2016 13th International Joint Conference on Computer Science and Software Engineering (JCSSE).

[158]  Jim Kurose,et al.  A survey of practical issues in underwater networks , 2007 .

[159]  Sudip Misra,et al.  Cooperation in Delay Tolerant Networks , 2013 .

[160]  Xiaodong Lin,et al.  A secure incentive scheme for delay tolerant networks , 2008, 2008 Third International Conference on Communications and Networking in China.

[161]  Shikha Agrawal,et al.  A Detailed Survey on Misbehavior Node Detection Techniques in Vehicular Ad Hoc Networks , 2015 .

[162]  Cauligi S. Raghavendra,et al.  Spray and wait: an efficient routing scheme for intermittently connected mobile networks , 2005, WDTN '05.

[163]  S. Prabhu,et al.  Enhanced techniques to strengthening DTN against flood attacks , 2014, International Conference on Information Communication and Embedded Systems (ICICES2014).

[164]  Haitham S. Cruickshank,et al.  A collaborative trust management scheme for emergency communication using delay tolerant networks , 2016, 2016 8th Advanced Satellite Multimedia Systems Conference and the 14th Signal Processing for Space Communications Workshop (ASMS/SPSC).

[165]  Xuemin Shen,et al.  Modeling of Epidemic Information Dissemination for MSNs , 2016 .

[166]  Ciprian Dobre,et al.  Collaborative selfish node detection with an incentive mechanism for opportunistic networks , 2013, 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013).

[167]  Jalel Ben-Othman,et al.  Survey on VANET security challenges and possible cryptographic solutions , 2014, Veh. Commun..