Research Article

A Security and Efficient Routing Scheme with Misbehavior Detection in Delay-Tolerant Networks

Algorithm 1

Building and updating TRT.
Input: node maintains the vector table
; The initial
value of trusted routing table contains
only row vectors ;
(1)if  node updated the vector table   then
(2)generate the new row vector
;
(3)update row vector in trusted routing table;
(4);
(5)end
(6)if  node and node meet each other  then
(7)send trusted routing table to node ;
(8)receive trusted routing table from node ;
(9)end
(10)while    do
(11)if    then
(12)verify the validity of the signature ;
(13)if    is valid  then
(14)update row vector in trusted routing
table ;
(15);
(16);
(17);
(18)end
(19)end
(20)end
(21)while   and   do
(22)verify the validity of the signature ;
(23)if   is valid  then
(24)insert into trusted routing
table ;
(25)end
(26)end