Research Article

A Security and Efficient Routing Scheme with Misbehavior Detection in Delay-Tolerant Networks

Algorithm 2

Detecting malicious and selfish nodes.
Input: Detection node , ,
Output: detection result of node
(1)get the column vector
of node from
trusted routing table;
(2)calculate malicious behavior ratio of node
using Eq. (6);
(3)calculate selfish behavior ratio of node using
Eq. (7);
(4)if    then
(5)return node is a malicious node;
(6)else
(7)if    then
(8)return node is a selfish node;
(9)else
(10)return node is a well-behaving node;
(11)end
(12)end