2021
DOI: 10.1007/s12652-021-02981-9
|View full text |Cite
|
Sign up to set email alerts
|

A blockchain-based secure routing protocol for opportunistic networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(8 citation statements)
references
References 21 publications
0
8
0
Order By: Relevance
“…However, it cannot avoid the attacker directly in order to select the next hope. The author in [ 24 ] proposed a blockchain-based secure routing protocol for opportunistic networks. In [ 24 ], only registered nodes can forward hello packets.…”
Section: Related Work and Motivationsmentioning
confidence: 99%
See 2 more Smart Citations
“…However, it cannot avoid the attacker directly in order to select the next hope. The author in [ 24 ] proposed a blockchain-based secure routing protocol for opportunistic networks. In [ 24 ], only registered nodes can forward hello packets.…”
Section: Related Work and Motivationsmentioning
confidence: 99%
“…The author in [ 24 ] proposed a blockchain-based secure routing protocol for opportunistic networks. In [ 24 ], only registered nodes can forward hello packets. If there is a new node, the node must be registered first, then it can forward the hello packet.…”
Section: Related Work and Motivationsmentioning
confidence: 99%
See 1 more Smart Citation
“…All these factors combined provide a network without fixed infrastructure with a method of remaining secure [22]. It has been proved that such technologies can be used within opportunistic networks [23]. In the proposed method however, two nodes meeting causes their chains to be merged creating a theoretically infinitely long chain.…”
Section: Security In Opportunistic Networkmentioning
confidence: 99%
“…In such a case, most IoT data are exchanged between computationally restricted devices in the untrusted wireless environment 4 . Various security mechanisms are developed to protect the network against different attacks 5 . Since its initiation, blockchain has become the epitome of security algorithms 6 .…”
Section: Introductionmentioning
confidence: 99%