Global Information Infrastructure Symposium - GIIS 2013 2013
DOI: 10.1109/giis.2013.6684378
|View full text |Cite
|
Sign up to set email alerts
|

Detecting malicious behavior in a vehicular DTN for public transportation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(10 citation statements)
references
References 15 publications
0
10
0
Order By: Relevance
“…For instance, Pham and Fdida [16] suggested that DTNs could aid in the distribution of news within cities through the use of fixed nodes. For another instance, the detection of malicious behavior through the use of a Misbehavior Detection System (MDS) was proposed to improve network performance, and it had been discussed in vehicular DTNs of metropolitan areas by Guo et al [17]. There are some common traits between these described applications, such as node movement trajectory and regular moving.…”
Section: Mobile Nodes and Fixed Sink Stations In City Environmentsmentioning
confidence: 99%
“…For instance, Pham and Fdida [16] suggested that DTNs could aid in the distribution of news within cities through the use of fixed nodes. For another instance, the detection of malicious behavior through the use of a Misbehavior Detection System (MDS) was proposed to improve network performance, and it had been discussed in vehicular DTNs of metropolitan areas by Guo et al [17]. There are some common traits between these described applications, such as node movement trajectory and regular moving.…”
Section: Mobile Nodes and Fixed Sink Stations In City Environmentsmentioning
confidence: 99%
“…Delay Tolerant Networks (DTNs) are infrastructure-less networks, where no end-to-end route exists and disconnection of network occurs frequently [1]- [7]. DTNs are primarily developed for Interplanetary Networks (IPNs) [8], however, also applicable in emerging networks such as Vehicular Ad-hoc Networks (VANETs) [9], Underwater Wireless Sensor Networks (UWSNs) [10] and disaster applications [11]. For example, some of these specific applications of DTNs are KioskNet [12], DakNet [13], ZebraNet [14] and WiderNet [15].…”
Section: Introductionmentioning
confidence: 99%
“…They first submit their tickets and then reveal their contact history to one another. Similarly, Guo et al [24,25] proposed Misbehavior Detection System (MDS) that helps in finding malicious nodes in vehicular DTNs. They also used the concept of encounter tickets similar to [23].…”
Section: Related Workmentioning
confidence: 98%
“…They also used the concept of encounter tickets similar to [23]. The schemes [23][24][25] detect the presence of malicious nodes in the network. However, these schemes would not be able to detect the isolator from the network because isolator neither drops nor forwards other nodes messages.…”
Section: Related Workmentioning
confidence: 99%