{"title":"DTN中不同自节点检测技术的评价","authors":"Atul Sharma, Lakshay","doi":"10.1109/ICRITO.2018.8748620","DOIUrl":null,"url":null,"abstract":"DTN is a network which is designed for environment in which frequent delays are occurred and no direct path is available between source and destination. In DTN security of data transmission is a challenging task because data transmission between source and destination is totally dependent on intermediate nodes. Sometime these intermediate nodes may behave no cooperatively in network. There are number of attacks available such as selfish node attack, byzantine attack, black hole attack and denial of service attack. To overcome this kind of problem number of techniques were proposed by different researchers. In this paper an analysis on these techniques will be presented.","PeriodicalId":439047,"journal":{"name":"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Evaluation of Different Selfish Node Detection Techniques in DTN\",\"authors\":\"Atul Sharma, Lakshay\",\"doi\":\"10.1109/ICRITO.2018.8748620\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"DTN is a network which is designed for environment in which frequent delays are occurred and no direct path is available between source and destination. In DTN security of data transmission is a challenging task because data transmission between source and destination is totally dependent on intermediate nodes. Sometime these intermediate nodes may behave no cooperatively in network. There are number of attacks available such as selfish node attack, byzantine attack, black hole attack and denial of service attack. To overcome this kind of problem number of techniques were proposed by different researchers. In this paper an analysis on these techniques will be presented.\",\"PeriodicalId\":439047,\"journal\":{\"name\":\"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)\",\"volume\":\"2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICRITO.2018.8748620\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICRITO.2018.8748620","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Evaluation of Different Selfish Node Detection Techniques in DTN
DTN is a network which is designed for environment in which frequent delays are occurred and no direct path is available between source and destination. In DTN security of data transmission is a challenging task because data transmission between source and destination is totally dependent on intermediate nodes. Sometime these intermediate nodes may behave no cooperatively in network. There are number of attacks available such as selfish node attack, byzantine attack, black hole attack and denial of service attack. To overcome this kind of problem number of techniques were proposed by different researchers. In this paper an analysis on these techniques will be presented.