Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 2761486, 16 pages
Research Article

A Security and Efficient Routing Scheme with Misbehavior Detection in Delay-Tolerant Networks

1Computer and Communication Engineering College, Northeastern University at Qinhuangdao, Qinhuangdao, China
2School of Information Science and Engineering, Yanshan University, Qinhuangdao, China
3School of Liren, Yanshan University, Qinhuangdao, China

Correspondence should be addressed to Ning Lu; nc.ude.quen@gninul

Received 19 August 2017; Accepted 15 October 2017; Published 26 November 2017

Academic Editor: Lianyong Qi

Copyright © 2017 Feng Li et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


Due to the unique network characteristics, the security and efficient routing in DTNs are considered as two great challenges. In this paper, we design a security and efficient routing scheme, called SER, which integrates the routing decision and the attacks detection mechanisms. In SER scheme, each DTNs node locally maintains a one-dimensional vector table to record the summary information about the contact with other nodes and the trust degree of other nodes. To obtain the global status and the contact relationship among all nodes, the trusted routing table consisting of vectors of all nodes is built in each DTNs node. The method for detecting malicious nodes and selfish nodes is proposed, which exploits the global summary information to analyze the history forwarding behavior of node and judge whether it is a malicious node or selfish node. The routing decision method is proposed based on trust degree of forwarding messages between nodes, which adopts trust degree as relay node selection strategy. Simulation results show that compared with existing schemes SER scheme could detect the attacks behavior of malicious nodes and selfish nodes, at the same time, with higher delivery rate and lower average delivery delay.