References
- S. Burleigh, A. Hooke, L. Torgerson, K. Fall, V. Cerf, B. Durst, K. Scott, and H. Weiss, "Delay-tolerant networking: An approach to interplanetary Internet," IEEE Communications Magazine, vol.41, no.6, pp.128-136, Jun.2003. https://doi.org/10.1109/MCOM.2003.1204759
- K. Fall, "A delay-tolerant network architecture for challenged Internets," Computer Communication Review, vol.33, no.4, pp.27-34, Oct.2003.
- K. Fall and S. Farrell, "DTN: An architectural retrospective," IEEE Journal on Selected Areas in Communications, vol.26, no.5, pp.828-836, Jun.2008.
- A. McMahon and S. Farrell, "Delay- and Disruption-Tolerant Networking," IEEE Internet Computing, vol.13, no.6, pp.82-87, Nov.2009.
- S. Farrell, V. Cahill, D. Geraghty, I. Humphreys and P. McDonald, "When TCP breaks - Delayand disruption-tolerant networking," IEEE Internet Computing, vol.10, no.4, pp.72-78, Jul.2006.
- S. Jain, K. Fall and R. Patra, "Routing in a delay tolerant network," Computer Communication Review, vol.34, no.4, pp.145-157, Oct.2004. https://doi.org/10.1145/1030194.1015484
- T. Spyropoulos, K. Psounis and C. S. Raghavendra, "Efficient routing in intermittently connected mobile networks: The single-copy case," IEEE-ACM Transactions on Networking, vol.16, no.1, pp.63-76, Feb.2008.
- T. Spyropoulos, K. Psounis and C. S. Raghavendra, "Efficient routing in intermittently connected mobile networks: The multiple-copy case," IEEE-ACM Transactions on Networking, vol.16, no.1, pp.77-90, Feb.2008.
- H. J. Zhu, X. D. Lin, R. X. Lu, Y. F. Fan and X. M. Shen, "SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks," IEEE Transactions on Vehicular Technology, vol.58, no.8, pp.4628-4639, Oct.2009. https://doi.org/10.1109/TVT.2009.2020105
- R. Lu, X. Lin, H. Zhu and X. Shen, "Pi:A Practical Incentive Protocol for Delay Tolerant Networks," IEEE Transactions on Wireless Communications, vol.9, no.4, pp.1483-1493, Apr. 2010.
- Y. Li, G. L. Su, D. O. Wu, D. P. Jin, L. Su and L. G. Zeng, "The Impact of Node Selfishness on Multicasting in Delay Tolerant Networks," IEEE Transactions on Vehicular Technology, vol.60, no.5, pp.2224-2238, Jun.2011.
- Q. He, D. P. Wu and P. Khosla, "A secure incentive architecture for ad hoc networks," Wireless Communications & Mobile Computing, vol.6, no.3, pp.333-346, May.2006. https://doi.org/10.1002/wcm.399
- G. F. Marias, P. Georgiadis, D. Flitzanis and K. Mandalas, "Cooperation enforcement schemes for MANETs: a survey," Wireless Communications & Mobile Computing, vol.6, no.3, pp.319-332, May.2006. https://doi.org/10.1002/wcm.398
- Y. Yoo and D. P. Agrawal, "Why does it pay,to be selfish in a MANET?," IEEE Wireless Communications, vol.13, no.6, pp.87-97, Dec.2006. https://doi.org/10.1109/MWC.2006.275203
- S. Buchegger and J. Y. Le Boudec, "Self-policing mobile ad hoc networks by reputation systems," IEEE Communications Magazine, vol.43, no.7, pp.101-107, Jul.2005.
- H. C. Tsai, N. W. Lo and T. C. Wu, "A Threshold-Adaptive Reputation System on Mobile Ad Hoc Networks," IEICE Transactions on Information and Systems, vol.E92D, no.5, pp.777-786, May.2009.
- R. Sakai, K. Ohgishi and M. Kasahara, "Cryptosystems based on pairing," in Proc. of Symposium on Cryptography and Information Security, pp. 26-28, Jan.2000.
- X. Y. Li and X. L. Gui, "A Comprehensive and Adaptive Trust Model for Large-Scale P2P Networks," Journal of Computer Science and Technology, vol.24, no.5, pp.868-882, Sep.2009. https://doi.org/10.1007/s11390-009-9278-4
- A. Boukerch, L. Xu and K. El-Khatib, "Trust-based security for wireless ad hoc and sensor networks," Computer Communications, vol.30, no.18, pp.2413-2427, Sep.2007.
- M. Karaliopoulos, "Assessing the Vulnerability of DTN data relaying schemes to node selfishness," IEEE Communications Letters, vol.13, no.12, pp.923-925, Dec.2009. https://doi.org/10.1109/LCOMM.2009.12.091520
- Q. H. Li, S. C. Zhu, G. H. Cao and IEEE, "Routing in socially selfish delay tolerant networks," in Proc. of 2010 IEEE Infocom, pp.1-9, Mar.2010.
- Y. Li, P. Hui, D. P. Jin, L. Su and L. G. Zeng, "Evaluating the impact of social selfishness on the epidemic routing in delay tolerant networks," IEEE Communications Letters, vol.14, vol.11, pp.1026-1028, Nov.2010. https://doi.org/10.1109/LCOMM.2010.093010.100492
- K. Scott and S. Burleigh, "Bundle protocol specification," IETF RFC 5050, Nov.2007.
- The One Simulator. Available: http://www.netlab.tkk.fi/tutkimus/dtn/theone/
Cited by
- A secure, service priority‐based incentive scheme for delay tolerant networks vol.9, pp.1, 2016, https://doi.org/10.1002/sec.1372
- A Credit-Based Congestion-Aware Incentive Scheme for DTNs vol.7, pp.4, 2012, https://doi.org/10.3390/info7040071
- Attacks and countermeasures in the internet of vehicles vol.72, pp.5, 2012, https://doi.org/10.1007/s12243-016-0551-6