CFP last date
20 January 2025
Reseach Article

Literature Review on Security Aspects of Delay Tolerant Networks

by Ankita Nayal, Sweta Jain
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 116 - Number 9
Year of Publication: 2015
Authors: Ankita Nayal, Sweta Jain
10.5120/20367-2573

Ankita Nayal, Sweta Jain . Literature Review on Security Aspects of Delay Tolerant Networks. International Journal of Computer Applications. 116, 9 ( April 2015), 34-37. DOI=10.5120/20367-2573

@article{ 10.5120/20367-2573,
author = { Ankita Nayal, Sweta Jain },
title = { Literature Review on Security Aspects of Delay Tolerant Networks },
journal = { International Journal of Computer Applications },
issue_date = { April 2015 },
volume = { 116 },
number = { 9 },
month = { April },
year = { 2015 },
issn = { 0975-8887 },
pages = { 34-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume116/number9/20367-2573/ },
doi = { 10.5120/20367-2573 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:56:40.744290+05:30
%A Ankita Nayal
%A Sweta Jain
%T Literature Review on Security Aspects of Delay Tolerant Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 116
%N 9
%P 34-37
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the past few decades, Delay Tolerant Networks (DTNs) have emerged as one of the hot topics for research. It is a network, used in environments where end to end connectivity is unavailable. It has no fixed infrastructure and has scarce resources. DTNs use store and forward technique which is called opportunistic data forwarding. One of the most important aspects of DTNs is security, because they are a new network paradigm and should be acceptable by all. This paper discusses the works related to DTN security, their analysis, drawbacks, comparisons, advantages and other factors.

References
  1. K. Fall, "A Delay-Tolerant Network Architecture for Challenged Internets," Proc. ACM Special Interest Group Data Comm. Workshop (SIGCOMM '03), 2003.
  2. V. Cerf, A. Hooke, L. Torgerson, R. Durst, K. Scott, K. Fall , H. Weiss "Delay-Tolerant Networking Architecture", IETF RFC 4838, Apr. 2007.
  3. S. Symington, S. Farrell, and H. Weiss, Bundle Security Protocol Specification. IRTF, DTN research group , October 2006. Draft version -02; expires in April 2007.
  4. N. Asokan, Kari Kostiainen, Philip Ginzboorg, Jorg Ott, Cheng Luo "Applicability of Identity-Based Cryptography for Disruption-Tolerant Networking" In MobiOpp '07: Proceedings of the 1st international MobiSys workshop on Mobile opportunistic networking, pages 52–56, New York, NY, USA, 2007. ACM.
  5. Bindra H. , Sangal A "Considerations and Open Issues in Delay Tolerant Network's (DTNs) Security". Wireless Sensor Network Scientific Research Journal, pp. 635--648 (2010)
  6. Stephen Farrell, Vinny Cahill "Security Considerations in Space and Delay Tolerant Networks" In SMC-IT '06: Proceedings of the 2nd IEEE International Conference on Space Mission Challenges for Information Technology, pages 29–38, Washington, DC, USA, 2006. IEEE Computer Society.
  7. D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," in CRYPTO 2001, Advances in Cryptology, no. 2139 in Lecture Notes in Computer Science, pp. 213–229, Springer-Verlag, August 2001
  8. A. Seth, U. Hengartner, and S. Keshav, "Practical security for disconnected nodes," in First Workshop on Secure Network Protocols (NPSec), November 2005. Revised 2006 version of the NPSec paper http://www. cs. uwaterloo. ca/_a3seth/
  9. Godwin Ansa, Haitham Cruickshank and Zhili Sun "A Proactive DOS Filter Mechanism for Delay Tolerant Networks"2nd ICST PSATS, Conference, Malaga Spain, February 2011
  10. Feng Li, Jie Wu, Avinash Srinivasan, "Thwarting Blackhole Attacks in Distruption- Tolerant Networks using Encounter Tickets" INFOCOM 2009, IEEE. IEEE 2009
  11. Bin Bin Chen, Mun Choon Chan "MobiCent: A Credit-Based Incentive System for Disruption Tolerant Network" In INFOCOM, 2010 Proceedings IEEE, pages 1–9. IEEE, 2010
  12. Rongxing Lu, Xiaodong Lin, Haojin Zhu, Xuemin (Sherman) Shen, Bruno Preiss "Pi: A Practical Incentive Protocol for Delay Tolerant Networks"IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 9, NO. 4, APRIL 2010
  13. Lifei Wei, Haojin Zhu, Zhenfu Cao, and Xuemin (Sherman) Shen "MobiID: A User-Centric and Social-Aware Reputation Based Incentive Scheme for Delay/Disruption Tolerant Networks" H. Frey, X. Li, and S. Ruehrup (Eds. ): ADHOC-NOW 2011, LNCS 6811, pp. 177–190, 2011. _c Springer-Verlag Berlin Heidelberg 2011
Index Terms

Computer Science
Information Sciences

Keywords

Security Delay Tolerant Networks (DTNs) disconnected environments.