Aysha Al Hinai

Learn More
Unlike the conventional routing techniques in Internet where routing privileges are given to trustworthy and fully authenticated nodes, delay-tolerant networks (DTNs) allow any node to participate in routing due to the lack of consistent infrastructure and central administration. This creates new security issues since even authorized nodes in DTNs could(More)
Unlike the conventional routing techniques in the Internet where routing privileges are given to trustworthy and fully authenticated nodes, Delay Tolerant Networks (DTNs) allow any node to participate in routing due to the lack of consistent infrastructure and central administration. This creates new security challenges as even authorized nodes in DTNs(More)
Most existing history-based routing protocols for delay tolerant networks resort to coarse-grained encounter information for making message forwarding decisions. However, this coarse-grained information can not give precise expression of the contact patterns between nodes in the network, thereby leading to inaccurate forwarding decisions. In this paper, we(More)
  • 1