Research Article
A Security and Efficient Routing Scheme with Misbehavior Detection in Delay-Tolerant Networks
Algorithm 2
Detecting malicious and selfish nodes.
Input: Detection node , , | Output: detection result of node | (1)get the column vector | of node from | trusted routing table; | (2)calculate malicious behavior ratio of node | using Eq. (6); | (3)calculate selfish behavior ratio of node using | Eq. (7); | (4)if then | (5)return node is a malicious node; | (6)else | (7)if then | (8)return node is a selfish node; | (9)else | (10)return node is a well-behaving node; | (11)end | (12)end |
|