Research Article

A Security and Efficient Routing Scheme with Misbehavior Detection in Delay-Tolerant Networks

Table 3

Trusted routing table of node and node after update.

destination nodeVector tableTwIDSignature information

2
1
1
1
1