A taxonomy on misbehaving nodes in delay tolerant networks
暂无分享,去创建一个
Muhammad Arshad | Haitham S. Cruickshank | Yue Cao | Zahid Ullah | Muhammad Khalid | Naveed Ahmed | Farhan Ahmad | Waqar Khalid | Yue Cao | H. Cruickshank | M. Arshad | Z. Ullah | Muhammad Khalid | Waqar Khalid | Farhan Ahmad | Naveed Ahmed
[1] Muhammad Arshad,et al. A survey of local/cooperative-based malicious information detection techniques in VANETs , 2018, EURASIP J. Wirel. Commun. Netw..
[2] Liang Zhou,et al. Cooperation advances on vehicular communications: A survey , 2014, Veh. Commun..
[3] Jiahai Yang,et al. A Lightweight DDoS Flooding Attack Detection Algorithm Based on Synchronous Long Flows , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).
[4] Chandrima Chakrabarti. An incentive driven reliable message exchange scheme in post-disaster situation using delay tolerant network , 2016, CSI Transactions on ICT.
[5] K. Devi,et al. Detecting misbehavior routing and attacks in disruption tolerant network using itrm , 2013, 2013 International Conference on Current Trends in Engineering and Technology (ICCTET).
[6] Pan Hui,et al. Distributed community detection in delay tolerant networks , 2007, MobiArch '07.
[7] Shou-Chih Lo,et al. Routing and Buffering Strategies in Delay-Tolerant Networks: Survey and Evaluation , 2011, 2011 40th International Conference on Parallel Processing Workshops.
[8] Xiaolei Dong,et al. Secure and Privacy Preserving Protocol for Cloud-Based Vehicular DTNs , 2015, IEEE Transactions on Information Forensics and Security.
[9] Robin Doss,et al. Security and Trust in Opportunistic Networks – A Survey , 2016 .
[10] Debajyoti Mukhopadhyay,et al. Analyzing Security Schemes in Delay Tolerant Networks , 2017 .
[11] Haitham S. Cruickshank,et al. Privacy-Enhanced Group Communication for Vehicular Delay Tolerant Networks , 2015, 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies.
[12] Hui Cheng,et al. A routing defense mechanism using evolutionary game theory for Delay Tolerant Networks , 2016, Appl. Soft Comput..
[13] Li Liu. A survey on barter-based incentive mechanism in opportunistic networks , 2013, 2013 2nd International Symposium on Instrumentation and Measurement, Sensor Network and Automation (IMSNA).
[14] Wenjia Li,et al. ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.
[15] C. C. Sobin,et al. An Efficient Buffer Management Policy for DTN , 2016 .
[16] Chunming Qiao,et al. A bargaining-based approach for incentive-compatible message forwarding in opportunistic networks , 2012, 2012 IEEE International Conference on Communications (ICC).
[17] Davide Dardari,et al. Distributed faulty node detection in DTNs in presence of Byzantine attack , 2017, 2017 IEEE International Conference on Communications (ICC).
[18] Gayathri Devi.S,et al. Deducing Malicious Attacks in Disruption Tolerant Networks , 2014 .
[19] Haitham S. Cruickshank,et al. Geographic-Based Spray-and-Relay (GSaR): An Efficient Routing Scheme for DTNs , 2015, IEEE Transactions on Vehicular Technology.
[20] Anders Lindgren,et al. Probabilistic routing in intermittently connected networks , 2003, MOCO.
[21] Chadi Assi,et al. Disruption-Tolerant Networking: A Comprehensive Survey on Recent Developments and Persisting Challenges , 2012, IEEE Communications Surveys & Tutorials.
[22] Yezid Donoso,et al. Delay/Disruption Tolerant Networks based message forwarding algorithm for rural Internet connectivity applications , 2016, 2016 6th International Conference on Computers Communications and Control (ICCCC).
[23] Soo-Hyun Park,et al. Security Challenges of DTN Mechanism for IoUT , 2015 .
[24] Muhammad Arshad,et al. A Survey of Routing Issues and Associated Protocols in Underwater Wireless Sensor Networks , 2017, J. Sensors.
[25] Zhenfu Cao,et al. MobiGame: A User-Centric Reputation Based Incentive Protocol for Delay/Disruption Tolerant Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[26] Stephen Farrell,et al. DTN: an architectural retrospective , 2008, IEEE Journal on Selected Areas in Communications.
[27] Zhenfu Cao,et al. A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks , 2014 .
[28] Xiangyu Bai,et al. Content delivery mechanism in Delay Tolerant Network , 2016, 2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS).
[29] Yong Wang,et al. Energy-efficient computing for wildlife tracking: design tradeoffs and early experiences with ZebraNet , 2002, ASPLOS X.
[30] Daniel T. Fokum,et al. Coping with denial-of-service attacks on the IP telephony system , 2016, SoutheastCon 2016.
[31] Haitham S. Cruickshank,et al. A comparative simulation based analysis of location based routing protocols in underwater wireless sensor networks , 2017, 2017 2nd Workshop on Recent Trends in Telecommunications Research (RTTR).
[32] Zahid Ullah,et al. Comparison of Localization Free Routing Protocols in Underwater Wireless Sensor Networks , 2017 .
[33] Yuanda Cao,et al. Similarity Degree-Based Mobility Pattern Aware Routing in DTNs , 2009, 2009 International Symposium on Intelligent Ubiquitous Computing and Education.
[34] Cesare Stefanelli,et al. Information-Centric Networking in next-generation communications scenarios , 2017, J. Netw. Comput. Appl..
[35] Naércio Magaia,et al. Nodes' misbehavior in Vehicular Delay-Tolerant Networks , 2013, 2013 Conference on Future Internet Communications (CFIC).
[36] Chai Kiat Yeo,et al. Detecting Flooding Attack in Delay Tolerant Networks by Piggybacking Encounter Records , 2015, 2015 2nd International Conference on Information Science and Security (ICISS).
[37] Nadeem Javaid,et al. SEDG: Scalable and Efficient Data Gathering Routing Protocol for Underwater WSNs , 2015, ANT/SEIT.
[38] Roberto Di Pietro,et al. Security in wireless ad-hoc networks - A survey , 2014, Comput. Commun..
[39] Honglong Chen,et al. Making Nodes Cooperative: A Secure Incentive Mechanism for Message Forwarding in DTNs , 2013, 2013 22nd International Conference on Computer Communication and Networks (ICCCN).
[40] Vishal Gupta,et al. Protection against packet drop attack , 2014, 2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014).
[41] Salil S. Kanhere,et al. A Bayesian Routing Framework for Delay Tolerant Networks , 2010, 2010 IEEE Wireless Communication and Networking Conference.
[42] Chandrima Chakrabarti,et al. An observer-based distributed scheme for selfish-node detection in a post-disaster communication environment using delay tolerant network , 2014, 2014 Applications and Innovations in Mobile Computing (AIMoC).
[43] Jian Ren,et al. A Novel Delay-Aware and Privacy-Preserving Data-Forwarding Scheme for Urban Sensing Network , 2016, IEEE Transactions on Vehicular Technology.
[44] Jin-Hee Cho,et al. PROVEST: Provenance-Based Trust Model for Delay Tolerant Networks , 2018, IEEE Transactions on Dependable and Secure Computing.
[45] Yue Cao,et al. A Critical Analysis of Research Potential, Challenges, and Future Directives in Industrial Wireless Sensor Networks , 2018, IEEE Communications Surveys & Tutorials.
[46] Mun Choon Chan,et al. Robustness of DTN against routing attacks , 2010, 2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010).
[47] J. K. Mandal,et al. Mitigating selfish, blackhole and wormhole attacks in DTN in a secure, cooperative way , 2017, Int. J. Inf. Comput. Secur..
[48] Gihwan Cho,et al. Applying a Security Architecture with Key Management Framework to the Delay/Disruption Tolerant Networks , 2015 .
[49] Jie Yang,et al. MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks , 2010, 2010 IEEE Wireless Communication and Networking Conference.
[50] Qinghua Li,et al. To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks , 2013, IEEE Transactions on Dependable and Secure Computing.
[51] Milena Radenkovic,et al. Erasure coding with replication to defend against malicious attacks in DTN , 2011, 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[52] Lars C. Wolf,et al. Detecting malicious behavior in a vehicular DTN for public transportation , 2013, Global Information Infrastructure Symposium - GIIS 2013.
[53] Xiaodong Lin,et al. SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks , 2009, IEEE Transactions on Vehicular Technology.
[54] Simin Nadjm-Tehrani,et al. Opportunistic DTN routing with window-aware adaptive replication , 2008, AINTEC '08.
[55] Robin Doss,et al. Malicious Node Traceback in Opportunistic Networks Using Merkle Trees , 2015, 2015 IEEE International Conference on Data Science and Data Intensive Systems.
[56] Mooi Choo Chuah,et al. Detecting wormhole attacks in delay-tolerant networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.
[57] Vassilis Tsaoussidis,et al. Packet size and DTN transport service: Evaluation on a DTN Testbed , 2010, International Congress on Ultra Modern Telecommunications and Control Systems.
[58] Md. Yusuf Sarwar Uddin,et al. RELICS: In-network realization of incentives to combat selfishness in DTNs , 2010, The 18th IEEE International Conference on Network Protocols.
[59] Preeti Nagrath,et al. Analysis of malicious activity in delay tolerant networks , 2016, 2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH).
[60] Mohammad S. Obaidat,et al. Cryptography-Based Misbehavior Detection and Trust Control Mechanism for Opportunistic Network Systems , 2018, IEEE Systems Journal.
[61] Sajal K. Das,et al. Design of efficient lightweight strategies to combat DoS attack in delay tolerant network routing , 2018, Wirel. Networks.
[62] Nabil Benamar,et al. New Classification of Nodes Cooperation in Delay Tolerant Networks , 2015, UNet.
[63] Jörg Ott,et al. Controlling resource hogs in mobile delay-tolerant networks , 2010, Comput. Commun..
[64] Honggang Wang,et al. Security-oriented opportunistic data forwarding in Mobile Social Networks , 2017, Future Gener. Comput. Syst..
[65] Zhili Sun,et al. Routing in Delay/Disruption Tolerant Networks: A Taxonomy, Survey and Challenges , 2013, IEEE Communications Surveys & Tutorials.
[66] Krupa Dave,et al. Delay Tolerant Network , 2013 .
[67] Vicky H. Mak-Hau,et al. Catabolism attack and Anabolism defense: A novel attack and traceback mechanism in Opportunistic Networks , 2015, Comput. Commun..
[68] Wesley M. Eddy,et al. A bundle of problems , 2009, 2009 IEEE Aerospace conference.
[69] Lionel Brunie,et al. An investigation on the unwillingness of nodes to participate in mobile delay tolerant network routing , 2013, Int. J. Inf. Manag..
[70] Vicky H. Mak-Hau,et al. Packet Faking Attack: A Novel Attack and Detection Mechanism in OppNets , 2014, 2014 Tenth International Conference on Computational Intelligence and Security.
[71] Igor M. Moraes,et al. Mitigating the ACK counterfeiting attack in Delay and Disruption Tolerant Networks , 2017, 2017 IEEE Symposium on Computers and Communications (ISCC).
[72] Preeti Nagrath,et al. Defending flooding attack in Delay Tolerant Networks , 2015, 2015 International Conference on Information Networking (ICOIN).
[73] V. Umarani,et al. Detection of selfish & malicious behavior using DTN-chord monitoring in mobile networks , 2016, 2016 International Conference on Information Communication and Embedded Systems (ICICES).
[74] Doina Bucur,et al. Improved search methods for assessing Delay-Tolerant Networks vulnerability to colluding strong heterogeneous attacks , 2017, Expert Syst. Appl..
[75] Célio Vinicius N. de Albuquerque,et al. NECTAR: a DTN routing protocol based on neighborhood contact history , 2009, SAC '09.
[76] Zhipeng Cai,et al. A novel approach for inhibiting misinformation propagation in human mobile opportunistic networks , 2017, Peer-to-Peer Netw. Appl..
[77] Ing-Ray Chen,et al. A survey of intrusion detection in wireless network applications , 2014, Comput. Commun..
[78] C. Balamurugan,et al. Detection of flood Attacks in DTN using rate limiter Technique , 2014, J. Comput. Sci..
[79] Toru Fujiwara,et al. Detecting Flooding Attack and Accommodating Burst Traffic in Delay-Tolerant Networks , 2018, IEEE Transactions on Vehicular Technology.
[80] J. Dhivya,et al. A survey of backpressure based scheduling algorithms for delay tolerant networks , 2014, International Conference on Information Communication and Embedded Systems (ICICES2014).
[81] Lionel Brunie,et al. 4PR: Privacy preserving routing in mobile delay tolerant networks , 2016, Comput. Networks.
[82] Jörg Ott,et al. The ONE simulator for DTN protocol evaluation , 2009, SIMUTools 2009.
[83] Mario Gerla,et al. A security framework for content retrieval in DTNs , 2016, 2016 International Wireless Communications and Mobile Computing Conference (IWCMC).
[84] E. A. Mary Anita,et al. A novel robust routing protocol RAEED to avoid DoS attacks in WSN , 2016, 2016 International Conference on Information Communication and Embedded Systems (ICICES).
[85] Yue Wu,et al. Security and trust management in opportunistic networks: a survey , 2015, Secur. Commun. Networks.
[86] Naércio Magaia,et al. Selfish and malicious behavior in Delay-Tolerant Networks , 2013, 2013 Future Network & Mobile Summit.
[87] William L. Van Besien. Dynamic, non-interactive key management for the bundle protocol , 2010, CHANTS '10.
[88] Aniket Kate,et al. Anonymity and security in delay tolerant networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[89] Godwin Ansa,et al. A DOS-resilient design for delay tolerant networks , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.
[90] Sencun Zhu,et al. Resource-misuse attack detection in delay-tolerant networks , 2011, 30th IEEE International Performance Computing and Communications Conference.
[91] Stefan Savage,et al. Detecting and Isolating Malicious Routers , 2006, IEEE Transactions on Dependable and Secure Computing.
[92] Vicky H. Mak-Hau,et al. Defense against packet collusion attacks in opportunistic networks , 2017, Comput. Secur..
[93] Chai Kiat Yeo,et al. A Queuing Mechanism to Alleviate Flooding Attacks in Probabilistic Delay Tolerant Networks , 2010, 2010 Sixth Advanced International Conference on Telecommunications.
[94] Lars C. Wolf,et al. Mitigating Blackhole attacks in a hybrid VDTN , 2014, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014.
[95] Rongxing Lu,et al. PMDS: A probabilistic misbehavior detection scheme in DTN , 2012, 2012 IEEE International Conference on Communications (ICC).
[96] Haitham S. Cruickshank,et al. Approach-and-Roam (AaR): A Geographic Routing Scheme for Delay/Disruption Tolerant Networks , 2014, IEEE Transactions on Vehicular Technology.
[97] Jin-Hee Cho,et al. Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing , 2014, IEEE Transactions on Parallel and Distributed Systems.
[98] Yin Zhang,et al. Incentive-aware routing in DTNs , 2008, 2008 IEEE International Conference on Network Protocols.
[99] Cauligi S. Raghavendra,et al. Spray and Focus: Efficient Mobility-Assisted Routing for Heterogeneous and Correlated Mobility , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).
[100] Sajal K. Das,et al. A trust-based framework for data forwarding in opportunistic networks , 2013, Ad Hoc Networks.
[101] Vasilios Katos,et al. Authenticated Key Exchange (AKE) in Delay Tolerant Networks , 2012, SEC.
[102] S. Jayashri,et al. Design and performance of dynamic trust management for secure routing protocol , 2016, 2016 IEEE International Conference on Advances in Computer Applications (ICACA).
[103] Shin-Ming Cheng,et al. A responsive probing approach to detect dynamic intrusion in a MANET , 2016, 2016 7th International Conference on Information, Intelligence, Systems & Applications (IISA).
[104] Haitham S. Cruickshank,et al. A Mobility-Aware Trust Management Scheme for Emergency Communication Networks Using DTN , 2016, WISATS.
[105] Qinghua Li,et al. Mitigating Routing Misbehavior in Disruption Tolerant Networks , 2012, IEEE Transactions on Information Forensics and Security.
[106] Sudha Krishnamurthy,et al. CREST: An Opportunistic Forwarding Protocol Based on Conditional Residual Time , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[107] Abderrahmane Baadache,et al. Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks , 2012, J. Netw. Comput. Appl..
[108] Su Deng,et al. On Modeling The Impact of Selfish Behaviors on Limited Epidemic Routing in Delay Tolerant Networks , 2013, Wirel. Pers. Commun..
[109] Radhika M. Pai,et al. Mitigation of insider and outsider DoS attack against signature based authentication in VANETs , 2014, 2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE).
[110] Chandrima Chakrabarti,et al. A dynamic two hops reputation assignment scheme for selfish node detection and avoidance in delay tolerant network , 2015, 2015 IEEE International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN).
[111] Vaskar Raychoudhury,et al. A survey of routing and data dissemination in Delay Tolerant Networks , 2016, J. Netw. Comput. Appl..
[112] Liang Zhou,et al. Performance evaluation of cooperative strategies for Vehicular Delay-Tolerant Networks , 2014, Trans. Emerg. Telecommun. Technol..
[113] Chai Kiat Yeo,et al. Detecting flooding attack while accommodating burst traffic in delay tolerant networks , 2017, 2017 Wireless Telecommunications Symposium (WTS).
[114] Jie Wu,et al. Thwarting Blackhole Attacks in Disruption-Tolerant Networks using Encounter Tickets , 2009, IEEE INFOCOM 2009.
[115] Honglong Chen,et al. A Secure Credit-Based Incentive Mechanism for Message Forwarding in Noncooperative DTNs , 2016, IEEE Transactions on Vehicular Technology.
[116] Doina Bucur,et al. Optimizing groups of colluding strong attackers in mobile urban communication networks with evolutionary algorithms , 2016, Appl. Soft Comput..
[117] Sudip Misra,et al. Enforcing Cooperation in OMNs , 2016 .
[118] Divya Kuriakose,et al. Effective defending against flood attack using stream-check method in tolerant network , 2014, 2014 International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE).
[119] Stephen Farrell,et al. Delay-Tolerant Networking Security Overview , 2009 .
[120] A. Bouabdallah,et al. A Simulation Analysis of Routing Misbehaviour in Mobile Ad Hoc Networks , 2008, 2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies.
[121] Boleslaw K. Szymanski,et al. Cost Efficient Erasure Coding Based Routing in Delay Tolerant Networks , 2010, 2010 IEEE International Conference on Communications.
[122] Zygmunt J. Haas,et al. Resource and performance tradeoffs in delay-tolerant wireless networks , 2005, WDTN '05.
[123] Poonam Sharma,et al. Selfish nodes detection in delay tolerant networks , 2015, 2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE).
[124] Jörg Ott,et al. Message fragmentation in opportunistic DTNs , 2008, 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[125] Michael Schneider,et al. Merkle Tree Traversal Revisited , 2008, PQCrypto.
[126] Haitham S. Cruickshank,et al. Analysis of DoS Attacks in Delay Tolerant Networks for Emergency Evacuation , 2015, 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies.
[127] Haitham S. Cruickshank,et al. Pseudonymised communication in delay tolerant networks , 2011, 2011 Ninth Annual International Conference on Privacy, Security and Trust.
[128] Vinton G. Cerf,et al. Delay-tolerant networking: an approach to interplanetary Internet , 2003, IEEE Commun. Mag..
[129] Srinivasan Keshav,et al. Very low-cost internet access using KioskNet , 2007, CCRV.
[130] Rafal Skowronski. Fully Distributed GRIDNET protocol, with no trusted authorities , 2017, 2017 International Conference on Information Networking (ICOIN).
[131] Hongjun Dai,et al. A Multivariate Classification Algorithm for Malicious Node Detection in Large-Scale WSNs , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[132] Greg Bigwood,et al. Incentive-Aware Opportunistic Network Routing , 2013 .
[133] Ying Cai,et al. An Incentive-Compatible Routing Protocol for Two-Hop Delay-Tolerant Networks , 2016, IEEE Transactions on Vehicular Technology.
[134] Iain Parris,et al. Friend or Flood? Social Prevention of Flooding Attacks in Mobile Opportunistic Networks , 2014, 2014 IEEE 34th International Conference on Distributed Computing Systems Workshops (ICDCSW).
[135] Tao Li,et al. CCQR: Constant Cost Quality-based Routing Protocol in Delay Tolerant Networks , 2009, 2009 15th International Conference on Parallel and Distributed Systems.
[136] M. P. Singh,et al. A survey paper on routing in delay-tolerant networks , 2013, 2013 International Conference on Information Systems and Computer Networks.
[137] Mohammad S. Obaidat,et al. An altruism-based trust-dependent message forwarding protocol for opportunistic networks , 2017, Int. J. Commun. Syst..
[138] Siuli Roy,et al. A Global Reputation Estimation and Analysis Technique for detection of malicious nodes in a Post-Disaster Communication environment , 2014, 2014 Applications and Innovations in Mobile Computing (AIMoC).
[139] Feng Xia,et al. A Cooperative Watchdog System to Detect Misbehavior Nodes in Vehicular Delay-Tolerant Networks , 2015, IEEE Transactions on Industrial Electronics.
[140] Erman Ayday,et al. An Iterative Algorithm for Trust Management and Adversary Detection for Delay-Tolerant Networks , 2012, IEEE Transactions on Mobile Computing.
[141] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[142] Amir Qayyum,et al. Cooperation in Opportunistic Networks: An Overlay Approach for Destination-Dependent Utility-Based Schemes , 2017 .
[143] Soufiene Djahel,et al. Mitigating Packet Dropping Problem in Mobile Ad Hoc Networks: Proposals and Challenges , 2011, IEEE Communications Surveys & Tutorials.
[144] Sumet Prabhavat,et al. An efficient message flooding scheme in delay-tolerant networks , 2015, 2015 7th International Conference on Information Technology and Electrical Engineering (ICITEE).
[145] Anjali A. Chandavale,et al. An approach to detect malicious node for Delay Tolerant Networks , 2015, TENCON 2015 - 2015 IEEE Region 10 Conference.
[146] Tat-Chee Wan,et al. A survey on current status of Disruption Tolerant Network support for Multicast , 2016, 2016 3rd International Conference on Computer and Information Sciences (ICCOINS).
[147] Jianhua Fan,et al. Delay/Disruption Tolerant Network and its application in military communications , 2010, 2010 International Conference On Computer Design and Applications.
[148] Robin Doss,et al. Defense against packet dropping attacks in opportunistic networks , 2014, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[149] Laura Galluccio,et al. Distributed Faulty Node Detection in DTNs , 2016, 2016 25th International Conference on Computer Communication and Networks (ICCCN).
[150] Levente Buttyán,et al. Barter trade improves message delivery in opportunistic networks , 2010, Ad Hoc Networks.
[151] Kevin R. Fall,et al. A delay-tolerant network architecture for challenged internets , 2003, SIGCOMM '03.
[152] Saman Taghavi Zargar,et al. A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.
[153] Robin Doss,et al. Establishing trust relationships in OppNets using Merkle trees , 2016, 2016 8th International Conference on Communication Systems and Networks (COMSNETS).
[154] Ibrahim Matta,et al. PreDA: Predicate Routing for DTN Architectures over MANET , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[155] Liang Zhou,et al. A Novel Cooperation Strategy for Mobile Health Applications , 2013, IEEE Journal on Selected Areas in Communications.
[156] C. Siva Ram Murthy,et al. A Realistic Framework for Delay-Tolerant Network Routing in Open Terrains with Continuous Churn , 2011, ICDCN.
[157] Robin Doss,et al. Reputation based malicious node detection in OppNets , 2016, 2016 13th International Joint Conference on Computer Science and Software Engineering (JCSSE).
[158] Jim Kurose,et al. A survey of practical issues in underwater networks , 2007 .
[159] Sudip Misra,et al. Cooperation in Delay Tolerant Networks , 2013 .
[160] Xiaodong Lin,et al. A secure incentive scheme for delay tolerant networks , 2008, 2008 Third International Conference on Communications and Networking in China.
[161] Shikha Agrawal,et al. A Detailed Survey on Misbehavior Node Detection Techniques in Vehicular Ad Hoc Networks , 2015 .
[162] Cauligi S. Raghavendra,et al. Spray and wait: an efficient routing scheme for intermittently connected mobile networks , 2005, WDTN '05.
[163] S. Prabhu,et al. Enhanced techniques to strengthening DTN against flood attacks , 2014, International Conference on Information Communication and Embedded Systems (ICICES2014).
[164] Haitham S. Cruickshank,et al. A collaborative trust management scheme for emergency communication using delay tolerant networks , 2016, 2016 8th Advanced Satellite Multimedia Systems Conference and the 14th Signal Processing for Space Communications Workshop (ASMS/SPSC).
[165] Xuemin Shen,et al. Modeling of Epidemic Information Dissemination for MSNs , 2016 .
[166] Ciprian Dobre,et al. Collaborative selfish node detection with an incentive mechanism for opportunistic networks , 2013, 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013).
[167] Jalel Ben-Othman,et al. Survey on VANET security challenges and possible cryptographic solutions , 2014, Veh. Commun..