Skip to main content
Article thumbnail
Location of Repository


By Ms. Aarthy D. K and Mr. C. Balakrishnan


Disruption Tolerant Networks (DTNs) exploit the intermittent connectivity between nodes to transfer data. It follows a storecarry-forward mechanism to transfer data. A node misbehave by dropping packets and acts selfish as they are unwilling to spend resources such as power and buffer on forwarding packets of other nodes. In such nodes routing misbehavior reduces the packet delivery ratio and wastes system resources such as power and bandwidth. Methods to mitigate routing misbehavior in mobile ah-hoc networks cannot be applied to DTN because of its intermittent connectivity. Existing systems are designed to identify selfish node or malicious node on DTNs. When it finds misbehaving or packet dropping node then it sends information to server. Server will then stop the data transfer and choose alternate route for communication. Proposed scheme requires each node to maintain a signed communication report (CR). These communication reports are encrypted to avoid forgery. The contact node maintains the communication report that is generated on contacting a node. It detects misbehaving node and is selected dynamically to avoid it being compromised. When a misbehaving node misreports, it is converted to legitimate node so as to avoid the wastage of system resources. Keywords-- Detection; disruption tolerant networks; mitigation; routing misbehavior; security. I

Year: 2014
OAI identifier: oai:CiteSeerX.psu:
Provided by: CiteSeerX
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • (external link)
  • (external link)
  • Suggested articles

    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.