04.01.2014 Views

Selfish and Malicious Behavior in Delay-Tolerant Networks

Selfish and Malicious Behavior in Delay-Tolerant Networks

Selfish and Malicious Behavior in Delay-Tolerant Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

[10] Eric Brewer, et. al., “The Case for Technology <strong>in</strong> Develop<strong>in</strong>g Regions,” IEEE Computer, vol. 38, no. 6,<br />

pp. 25-38, Jun. 2005<br />

[11] A. L<strong>in</strong>dgren, A. Doria <strong>and</strong> O. Schelen, “Probabilistic rout<strong>in</strong>g <strong>in</strong> <strong>in</strong>termittently connected networks,” In<br />

Proc. First International Workshop on Service Assurance with Partial <strong>and</strong> Intermittent Resources<br />

(SAPIR), 2004.<br />

[12] J. Burgess, B. Gallagher, D. Jensen <strong>and</strong> B. Lev<strong>in</strong>e, “MaxProp: Rout<strong>in</strong>g for Vehicle-Based Disruption-<br />

<strong>Tolerant</strong> <strong>Networks</strong>,” In Proc. IEEE INFOCOM, Apr. 2006.<br />

[13] A. Balasubramanian, B. Neil Lev<strong>in</strong>e <strong>and</strong> A. Venkataramani, “DTN rout<strong>in</strong>g as a resource allocation<br />

problem,” In Proc. ACM SIGCOMM, Aug. 2007.<br />

[14] T. Spyropoulos, K. Psounis, <strong>and</strong> C. S. Raghavendra, “Spray <strong>and</strong> Wait: An Efficient Rout<strong>in</strong>g Scheme for<br />

Intermittently Connected Mobile <strong>Networks</strong>,” In Proc. ACM SIGCOMM Workshop on <strong>Delay</strong>-<strong>Tolerant</strong><br />

Network<strong>in</strong>g (WDTN), 2005.<br />

[15] A. Panagakis, A. Vaios <strong>and</strong> I. Stavrakakis, “On the Effects of Cooperation <strong>in</strong> DTNs,” In Proc. 2nd<br />

International Conference on Communication Systems Software <strong>and</strong> Middleware (COMSWARE), pp.1-6,<br />

Jan. 2007.<br />

[16] A. Keranen, M. Pitkanen, M. Vuori <strong>and</strong> J. Ott, “Effect of non-cooperative nodes <strong>in</strong> mobile DTNs,” In<br />

Proc. 2011 IEEE International Symposium on a World of Wireless, Mobile <strong>and</strong> Multimedia <strong>Networks</strong><br />

(WoWMoM), pp.1-7, Jun. 2011.<br />

[17] A. Avizienis, J.-C. Laprie, B. R<strong>and</strong>ell, <strong>and</strong> C. L<strong>and</strong>wehr, “Basic Concepts <strong>and</strong> Taxonomy of Dependable<br />

<strong>and</strong> Secure Comput<strong>in</strong>g,” IEEE Transactions on Dependable <strong>and</strong> Secure Comput<strong>in</strong>g, vol 1, no. 1, pp. 11-<br />

33, Jan.-Mar. 2004.<br />

[18] A. J. Menezes, p. C. van Oorschot <strong>and</strong> S. A. Vanstone, “H<strong>and</strong>book of Applied Cryptography”. CRC<br />

Press, 1997.<br />

[19] S. Ja<strong>in</strong>, K. Fall <strong>and</strong> R. Patra, “Rout<strong>in</strong>g <strong>in</strong> a delay-tolerant network,” In Proc. ACM SIGCOMM, 2004.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!