Efficient fault-tolerant certificate revocation
Proceedings of the 7th ACM conference on Computer and communications security
Dependent graphs:: a method of fault-tolerant certificate distribution
Journal of Computer Security
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Probabilistic routing in intermittently connected networks
ACM SIGMOBILE Mobile Computing and Communications Review
DTN routing as a resource allocation problem
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
Surviving attacks on disruption-tolerant networks without authentication
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
CAR: Context-Aware Adaptive Routing for Delay-Tolerant Mobile Networks
IEEE Transactions on Mobile Computing
An Evaluation of Routing Reliability in Non-collaborative Opportunistic Networks
AINA '09 Proceedings of the 2009 International Conference on Advanced Information Networking and Applications
Barter trade improves message delivery in opportunistic networks
Ad Hoc Networks
ICCCN '09 Proceedings of the 2009 Proceedings of 18th International Conference on Computer Communications and Networks
Pi: a practical incentive protocol for delay tolerant networks
IEEE Transactions on Wireless Communications
SReD: a secure reputation-based dynamic window scheme for disruption-tolerant networks
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Practical security for disconnected nodes
NPSEC'05 Proceedings of the First international conference on Secure network protocols
A reputation-based approach to tolerate misbehaving carriers in Delay Tolerant Networks
ISCC '10 Proceedings of the The IEEE symposium on Computers and Communications
Detecting blackhole attacks in Disruption-Tolerant Networks through packet exchange recording
WOWMOM '10 Proceedings of the 2010 IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)
Reference based approach to mitigate blackhole attacks in delay tolerant networks
Proceedings of the 8h ACM symposium on QoS and security for wireless and mobile networks
On Modeling The Impact of Selfish Behaviors on Limited Epidemic Routing in Delay Tolerant Networks
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
A Delay Tolerant Network (DTN) relies on the implicit assumption that nodes cooperate towards message forwarding. However, this assumption cannot be satisfied when there are malicious nodes acting as blackholes and voluntarily attracting and dropping messages. In this paper we propose a reputation-based protocol for contrasting blackholes. Every node locally maintains the reputation of forwarding nodes it comes in touch with and, then, upon selecting the next forwarding node, the node chooses among those having the highest reputation. The proposed reputation protocol is composed of three basic mechanisms-acknowledgments, node lists, and aging-that make communication efficient and capable of adapting to the changing operating conditions of a DTN. The protocol has been used to extend CAR [1]. The resulting protocol RCAR (reputation-based CAR) has been compared with T-ProPHET [2], a state-of-the-art reputation-based DTN routing protocol, from several standpoints. As it turns out, RCAR is more effective than T-ProPHET and outperforms it in most cases.