Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017 (2017), Article ID 2761486, 16 pages
https://doi.org/10.1155/2017/2761486
Research Article

A Security and Efficient Routing Scheme with Misbehavior Detection in Delay-Tolerant Networks

1Computer and Communication Engineering College, Northeastern University at Qinhuangdao, Qinhuangdao, China
2School of Information Science and Engineering, Yanshan University, Qinhuangdao, China
3School of Liren, Yanshan University, Qinhuangdao, China

Correspondence should be addressed to Ning Lu; nc.ude.quen@gninul

Received 19 August 2017; Accepted 15 October 2017; Published 26 November 2017

Academic Editor: Lianyong Qi

Copyright © 2017 Feng Li et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. N. Chakchouk, “A Survey on Opportunistic Routing in Wireless Communication Networks,” IEEE Communications Surveys and Tutorials, vol. 17, no. 4, pp. 2214–2241, 2015. View at Publisher · View at Google Scholar · View at Scopus
  2. S. Cc, V. Raychoudhury, G. Marfia, and A. Singla, “A survey of routing and data dissemination in Delay Tolerant Networks,” Journal of Network and Computer Applications, vol. 67, pp. 128–146, 2016. View at Publisher · View at Google Scholar · View at Scopus
  3. M. Alajeely, R. Doss, A. Ahmad, and V. Mak-Hau, “Defense against packet collusion attacks in opportunistic networks,” Computers and Security, vol. 65, pp. 269–282, 2017. View at Publisher · View at Google Scholar · View at Scopus
  4. J. Burgess, G. D. Bissias, M. D. Corner, and B. N. Levine, “Surviving attacks on disruption-tolerant networks without authentication,” in Proceedings of the MobiHoc'07: 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 61–70, Canada, September 2007. View at Publisher · View at Google Scholar · View at Scopus
  5. F. Li, J. Wu, and A. Srinivasan, “Thwarting blackhole attacks in distruption-tolerant networks using encounter tickets,” in Proceedings of the 28th Conference on Computer Communications, IEEE INFOCOM 2009, pp. 2428–2436, bra, April 2009. View at Publisher · View at Google Scholar · View at Scopus
  6. D. Pham and C. K. Yeo, “Detecting colluding blackhole and greyhole attack in delay tolerant networks,” IEEE Transactions on Mobile Computing, pp. 1–15, 2015. View at Publisher · View at Google Scholar
  7. H. Zhu, S. Du, Z. Gao, M. Dong, and Z. Cao, “A probabilistic misbehavior detection scheme toward efficient trust establishment in delay-tolerant networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 1, pp. 22–32, 2014. View at Publisher · View at Google Scholar
  8. J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine, “MaxProp: routing for vehicle-based disruption-tolerant networks,” in Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM '06), April 2006. View at Publisher · View at Google Scholar · View at Scopus
  9. P. Hui, J. Crowcroft, and E. Yoneki, “BUBBLE Rap: social-based forwarding in delay-tolerant networks,” IEEE Transactions on Mobile Computing, vol. 10, no. 11, pp. 1576–1589, 2011. View at Publisher · View at Google Scholar · View at Scopus
  10. Q. Li, W. Gao, S. Zhu, and G. Cao, “A routing protocol for socially selfish delay tolerant networks,” Ad Hoc Networks, vol. 10, no. 8, pp. 1619–1632, 2012. View at Publisher · View at Google Scholar · View at Scopus
  11. A. Lindgren, A. Doria, and O. Schelén, “Probabilistic routing in intermittently connected networks,” ACM SIGMOBILE Mobile Computing and Communications Review, vol. 7, no. 3, pp. 19-20, 2003. View at Publisher · View at Google Scholar
  12. S. C. Nelson, M. Bakht, and R. Kravets, “Encounter-based routing in DTNs,” in Proceedings of the 28th Conference on Computer Communications (INFOCOM '09), pp. 846–854, IEEE, April 2009. View at Publisher · View at Google Scholar · View at Scopus
  13. I.-R. Chen, F. Bao, M. Chang, and J.-H. Cho, “Dynamic trust management for delay tolerant networks and its application to secure routing,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 5, pp. 1200–1210, 2014. View at Publisher · View at Google Scholar · View at Scopus
  14. Q. Li and G. Cao, “Mitigating routing misbehavior in disruption tolerant networks,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 664–675, 2012. View at Publisher · View at Google Scholar · View at Scopus
  15. R. Lu, X. Lin, H. Zhu, X. Shen, and B. Preiss, “Pi: a practical incentive protocol for delay tolerant networks,” IEEE Transactions on Wireless Communications, vol. 9, no. 4, pp. 1483–1493, 2010. View at Publisher · View at Google Scholar · View at Scopus
  16. T. Zhou, R. R. Choudhury, and K. Chakrabarty, “Diverse routing: Exploiting social behavior for routing in delay-tolerant networks,” in Proceedings of the 2009 IEEE International Conference on Social Computing, SocialCom 2009, pp. 1115–1122, Canada, August 2009. View at Publisher · View at Google Scholar · View at Scopus
  17. T. Abdelkader, K. Naik, A. Nayak, N. Goel, and V. Srivastava, “SGBR: A routing protocol for delay tolerant networks using social grouping,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 12, pp. 2472–2481, 2013. View at Publisher · View at Google Scholar · View at Scopus
  18. E. Ayday and F. Fekri, “An Iterative Algorithm for Trust Management and Adversary Detection for Delay-Tolerant Networks,” IEEE Transactions on Mobile Computing, vol. 11, no. 9, pp. 1514–1531, 2012. View at Publisher · View at Google Scholar · View at Scopus
  19. H. Zhao, X. Yang, and X. Li, “CTrust: trust management in cyclic mobile Ad Hoc networks,” IEEE Transactions on Vehicular Technology, vol. 62, no. 6, pp. 2792–2806, 2013. View at Publisher · View at Google Scholar · View at Scopus
  20. B. B. Chen and M. C. Chan, “MobiCent: a credit-based incentive system for disruption tolerant network,” in Proceedings of the 2010 IEEE INFOCOM, pp. 1–9, March 2010. View at Publisher · View at Google Scholar · View at Scopus