An Iterative Algorithm for Trust Management and Adversary Detection for Delay-Tolerant Networks

  title={An Iterative Algorithm for Trust Management and Adversary Detection for Delay-Tolerant Networks},
  author={Erman Ayday and Faramarz Fekri},
  journal={IEEE Transactions on Mobile Computing},
Delay/Disruption Tolerant Networks (DTNs) have been identified as one of the key areas in the field of wireless communication, wherein sparseness and delay are particularly high. They are emerging as a promising technology in vehicular, planetary/interplanetary, military/tactical, disaster response, underwater and satellite networks. DTNs are characterized by large end-to-end communication latency and the lack of end-to-end path from a source to its destination. These characteristics pose… CONTINUE READING
Highly Cited
This paper has 214 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 43 extracted citations

PROVEST: Provenance-Based Trust Model for Delay Tolerant Networks

IEEE Transactions on Dependable and Secure Computing • 2018
View 20 Excerpts
Highly Influenced

Trust metric integration in resource constrained networks via data fusion

2015 18th International Conference on Information Fusion (Fusion) • 2015
View 4 Excerpts
Highly Influenced

Reputation and Credit Based Incentive Mechanism for Data-Centric Message Delivery in DTNs

2018 19th IEEE International Conference on Mobile Data Management (MDM) • 2018
View 1 Excerpt

215 Citations

Citations per Year
Semantic Scholar estimates that this publication has 215 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 42 references

On the levy-walk nature of human mobility

IEEE/ACM Trans. Netw. • 2011
View 4 Excerpts
Highly Influenced

Performance comparison of trust-based reactive routing protocols

IEEE Transactions on Mobile Computing • 2006
View 13 Excerpts
Highly Influenced

Anonymity and security in delay tolerant networks

2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007 • 2007
View 4 Excerpts
Highly Influenced

A protocol for data availability in mobile ad-hoc networks in the presence of insider attacks

Elsevier Ad Hoc Networks, vol. 8, no. 2, pp. 181–192, Mar. 2010. • 2010

Similar Papers

Loading similar papers…