2012
DOI: 10.1109/tifs.2011.2173195
|View full text |Cite
|
Sign up to set email alerts
|

Mitigating Routing Misbehavior in Disruption Tolerant Networks

Abstract: Abstract-In disruption tolerant networks (DTNs), selfish or malicious nodes may drop received packets. Such routing misbehavior reduces the packet delivery ratio and wastes system resources such as power and bandwidth. Although techniques have been proposed to mitigate routing misbehavior in mobile ad hoc networks, they cannot be directly applied to DTNs because of the intermittent connectivity between nodes. To address the problem, we propose a distributed scheme to detect packet dropping in DTNs. In our sche… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
52
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 73 publications
(52 citation statements)
references
References 30 publications
(45 reference statements)
0
52
0
Order By: Relevance
“…Security and privacy in mobile sensing systems have been addressed by many works (e.g., [13][14][15][16]), but they do not consider aggregation of data. There are many existing works (e.g., [17]) on privacy-preserving data aggregation, but most of them assume a trusted aggregator.…”
Section: Related Workmentioning
confidence: 99%
“…Security and privacy in mobile sensing systems have been addressed by many works (e.g., [13][14][15][16]), but they do not consider aggregation of data. There are many existing works (e.g., [17]) on privacy-preserving data aggregation, but most of them assume a trusted aggregator.…”
Section: Related Workmentioning
confidence: 99%
“…System Model. In this paper, we adopt the system model similar to the literature [13,14]. We consider DTN with no trusted authorization center, which is different from [7] in that it exists with a periodically available TA (trusted authority).…”
Section: System Model and Design Goalsmentioning
confidence: 99%
“…Therefore, we adopt vector and node meet, they exchange the trusted routing tables TRT , TRT with each other. After the update operation, as shown in Table 3, the trusted routing tables TRT , TRT of node and node contain five row vectors send trusted routing table TRT to node ; (8) receive trusted routing table TRT from node ; (9) end (10) while ∀ ∈ TRT ∩ TRT do (11) if TRT ⋅ ⋅ TwID > TRT ⋅ ⋅ TwID then (12) verify the validity of the signature Sig ; (13) if Sig is valid then (14) update row vector in trusted routing table TRT ; (15) TRT ⋅ = TRT ⋅ ; (16) TRT ⋅ ⋅ TwID = TRT ⋅ ⋅ TwID; (17) TRT ⋅ Sig = TRT ⋅ Sig ; (18) end ( Robustness Analysis. In the building and updating process of the trusted routing table, the malicious node may modify the trusted routing table to forge high trust value and message forwarding ratio.…”
Section: Building and Updating Trusted Routingmentioning
confidence: 99%
“…This node can detect whether the node has dropped packets based on the reported records. To detect consistency, a small part of each contact record is disseminated to selected nodes, collect appropriate contact records and detect misbehaving nodes with certain probability [5].…”
Section: Related Workmentioning
confidence: 99%