{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,26]],"date-time":"2026-01-26T19:58:35Z","timestamp":1769457515371,"version":"3.49.0"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,6,27]],"date-time":"2019-06-27T00:00:00Z","timestamp":1561593600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,6,27]],"date-time":"2019-06-27T00:00:00Z","timestamp":1561593600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2020,1]]},"DOI":"10.1007\/s00607-019-00735-2","type":"journal-article","created":{"date-parts":[[2019,6,27]],"date-time":"2019-06-27T14:02:57Z","timestamp":1561644177000},"page":"201-219","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Energy based incentive scheme for secure opportunistic routing in vehicular delay tolerant networks"],"prefix":"10.1007","volume":"102","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8359-307X","authenticated-orcid":false,"given":"Lalit","family":"Kulkarni","sequence":"first","affiliation":[]},{"given":"Jagdish","family":"Bakal","sequence":"additional","affiliation":[]},{"given":"Urmila","family":"Shrawankar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,27]]},"reference":[{"key":"735_CR1","doi-asserted-by":"crossref","unstructured":"Fall K (2003) A delay-tolerant network architecture for challenged internets. In: Proceedings of SIGCOMM 2003, ACM, New York, NY, USA, pp 27\u201334","DOI":"10.1145\/863955.863960"},{"issue":"9","key":"735_CR2","doi-asserted-by":"publisher","first-page":"7684","DOI":"10.1109\/TVT.2015.2480761","volume":"65","author":"L Zhang","year":"2016","unstructured":"Zhang L, Song J, Pan J (2016) A privacy-preserving and secure framework for opportunistic routing in DTNs. IEEE Trans Veh Technol 65(9):7684\u20137697","journal-title":"IEEE Trans Veh Technol"},{"issue":"2","key":"735_CR3","doi-asserted-by":"publisher","first-page":"664","DOI":"10.1109\/TIFS.2011.2173195","volume":"7","author":"Q Li","year":"2012","unstructured":"Li Q, Cao G (2012) Mitigating routing misbehavior in disruption tolerant networks. IEEE Trans Inf Forensics Secur 7(2):664\u2013675","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"735_CR4","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/978-981-10-3935-5_9","volume-title":"Computing and network sustainability","author":"L Kulkarni","year":"2017","unstructured":"Kulkarni L, Ukey N, Bakal J, Chavan N (2017) A survey on energy-efficient techniques to reduce energy consumption in delay tolerant networks. In: Vishwakarma HR, Shyam Akashe (eds) Computing and network sustainability, vol 12. Springer, Singapore, pp 83\u201391","edition":"12"},{"issue":"6","key":"735_CR5","doi-asserted-by":"publisher","first-page":"1554","DOI":"10.1109\/TAC.2015.2396641","volume":"60","author":"S Eshghi","year":"2015","unstructured":"Eshghi S, Khouzani MHR, Sarkar S, Shroff NB, Venkatesh SS (2015) Optimal energy-aware epidemic routing in DTNs. IEEE Trans Autom Control 60(6):1554\u20131569","journal-title":"IEEE Trans Autom Control"},{"issue":"1","key":"735_CR6","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/TPDS.2013.36","volume":"25","author":"H Zhu","year":"2014","unstructured":"Zhu H, Du S, Gao Z, Dong M, Cao Z (2014) A probabilistic misbehavior detection scheme toward efficient trust establishment in delay-tolerant networks. IEEE Trans Parallel Distrib Syst 25(1):22\u201332","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"735_CR7","unstructured":"Kulkarni L, Mukhopadhyay D, Bakal J (2016) Analyzing security schemes in delay tolerant networks. In: Proceedings of the international conference on data engineering and communication technology. Springer, Singapore, vol 1, issue 468, pp 613\u2013620"},{"key":"735_CR8","doi-asserted-by":"crossref","unstructured":"Shikfa A (2011) Security challenges in opportunistic communication. In: IEEE GCC conference and exhibition (GCC), Dubai, pp 425\u2013428","DOI":"10.1109\/IEEEGCC.2011.5752570"},{"issue":"1","key":"735_CR9","first-page":"173","volume":"24","author":"S Saha","year":"2018","unstructured":"Saha S, Nandi S, Verma R (2018) Design of efficient lightweight strategies to combat DoS attack in delay tolerant network routing. J Mob Commun Comput Inf Wirel Netw 24(1):173\u2013194","journal-title":"J Mob Commun Comput Inf Wirel Netw"},{"issue":"8","key":"735_CR10","doi-asserted-by":"publisher","first-page":"6377","DOI":"10.1109\/TVT.2015.2477164","volume":"65","author":"H Chen","year":"2016","unstructured":"Chen H, Lou W, Wang Z, Wang Q (2016) A secure credit-based incentive mechanism for message forwarding in noncooperative DTNs. IEEE Trans Veh Technol 65(8):6377\u20136388","journal-title":"IEEE Trans Veh Technol"},{"issue":"6","key":"735_CR11","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1016\/j.jpdc.2013.02.001","volume":"73","author":"Yu Bo","year":"2013","unstructured":"Bo Yu, Cheng-Zhong X, Xiao B (2013) Detecting sybil attacks in VANETs. J Parallel Distrib Comput 73(6):746\u2013756","journal-title":"J Parallel Distrib Comput"},{"issue":"5","key":"735_CR12","doi-asserted-by":"publisher","first-page":"1116","DOI":"10.1109\/TMC.2015.2456895","volume":"15","author":"TND Pham","year":"2016","unstructured":"Pham TND, Yeo CK (2016) Detecting colluding blackhole and greyhole attacks in delay tolerant networks. IEEE Trans Mob Comput 15(5):1116\u20131129","journal-title":"IEEE Trans Mob Comput"},{"issue":"5","key":"735_CR13","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MWC.2010.5601956","volume":"17","author":"Y Ren","year":"2010","unstructured":"Ren Y, Chuah MC, Yang J, Chen Y (2010) Detecting wormhole attacks in delay-tolerant networks [Security and privacy in emerging wireless networks]. IEEE Wirel Commun 17(5):36\u201342","journal-title":"IEEE Wirel Commun"},{"key":"735_CR14","unstructured":"Ker A, Ott J, Teemu K (2009) The ONE simulator for DTN protocol evaluation. In: Proceedings of the 2nd international conference on simulation tools and techniques ICST, Rome, Italy, ISBN 978-963-9799-45-5"},{"key":"735_CR15","doi-asserted-by":"crossref","unstructured":"Bulut E, Szymanski BK (2011) On secure multi-copy based routing in compromised delay tolerant networks. In: Proceedings of 20th international conference on computer communications and networks (ICCCN), Maui, HI, pp 1\u20137","DOI":"10.1109\/ICCCN.2011.6005812"},{"key":"735_CR16","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1016\/j.cose.2018.04.015","volume":"77","author":"W Khalid","year":"2018","unstructured":"Khalid W, Ullah Z, Ahmed N, Cao Y, Khalid M, Arshad M, Cruickshank H (2018) A taxonomy on misbehaving nodes in delay tolerant networks. J Comput Secur 77:442\u2013471","journal-title":"J Comput Secur"},{"issue":"5","key":"735_CR17","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1109\/TDSC.2010.25","volume":"8","author":"M Conti","year":"2011","unstructured":"Conti M, Di Pietro R, Mancini L, Mei A (2011) Distributed detection of clone attacks in wireless sensor networks. IEEE Trans Dependable Secure Comput 8(5):685\u2013698","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"5","key":"735_CR18","doi-asserted-by":"publisher","first-page":"1200","DOI":"10.1109\/TPDS.2013.116","volume":"25","author":"I Chen","year":"2014","unstructured":"Chen I, Bao F, Chang M, Cho J (2014) Dynamic trust management for delay tolerant networks and its application to secure routing. IEEE Trans Parallel Distrib Syst 25(5):1200\u20131210","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"735_CR19","doi-asserted-by":"crossref","unstructured":"Tamez EB, Woungang I, Lilien L, Denko MK (2009) Trust management in opportunistic networks: a semantic web approach. In: IEEE conference on world congress on privacy, security, trust and the management of e-business, Saint John, NB, pp 235\u2013238","DOI":"10.1109\/CONGRESS.2009.17"},{"issue":"3","key":"735_CR20","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1109\/TDSC.2011.64","volume":"9","author":"E Ayday","year":"2012","unstructured":"Ayday E, Fekri F (2012) Iterative trust and reputation management using belief propagation. IEEE Trans Depend Secure Comput 9(3):375\u2013386","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"735_CR21","doi-asserted-by":"crossref","unstructured":"Trifunovic S, Legendre F, Anastasiades C (2010) Social trust in opportunistic networks. In: INFOCOM IEEE conference on computer communications workshops, San Diego, CA, pp 1\u20136","DOI":"10.1109\/INFCOMW.2010.5466696"},{"issue":"2","key":"735_CR22","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1109\/JSAC.2018.2804098","volume":"36","author":"P Asuquo","year":"2018","unstructured":"Asuquo P, Cruickshank H, Ogah CPA, Lei A, Sun Z (2018) A distributed trust management scheme for data forwarding in satellite DTN emergency communications. IEEE J Sel Areas Commun 36(2):246\u2013256","journal-title":"IEEE J Sel Areas Commun"},{"issue":"2","key":"735_CR23","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1109\/TVT.2010.2093587","volume":"60","author":"T Chen","year":"2011","unstructured":"Chen T, Zhu L, Wu F, Zhong S (2011) Stimulating cooperation in vehicular ad hoc networks: a coalitional game theoretical approach. IEEE Trans Veh Technol 60(2):566\u2013579","journal-title":"IEEE Trans Veh Technol"},{"issue":"8","key":"735_CR24","doi-asserted-by":"publisher","first-page":"4628","DOI":"10.1109\/TVT.2009.2020105","volume":"58","author":"H Zhu","year":"2009","unstructured":"Zhu H, Lin X, Lu R, Fan Y, Shen X (2009) SMART: a secure multilayer credit-based incentive scheme for delay-tolerant networks. IEEE Trans Veh Technol 58(8):4628\u20134639","journal-title":"IEEE Trans Veh Technol"},{"issue":"4","key":"735_CR25","doi-asserted-by":"publisher","first-page":"1483","DOI":"10.1109\/TWC.2010.04.090557","volume":"9","author":"R Lu","year":"2010","unstructured":"Lu R, Lin X, Zhu H, Shen X, Preiss B (2010) Pi: a practical incentive protocol for delay tolerant networks. IEEE Trans Wirel Commun 9(4):1483\u20131493","journal-title":"IEEE Trans Wirel Commun"},{"issue":"6","key":"735_CR26","doi-asserted-by":"publisher","first-page":"1299","DOI":"10.1109\/TIFS.2015.2407326","volume":"10","author":"J Zhou","year":"2015","unstructured":"Zhou J, Dong X, Cao Z, Vasilakos AV (2015) Secure and privacy preserving protocol for cloud-based vehicular DTNs. IEEE Trans Inf Forensics Secur 10(6):1299\u20131314","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"9","key":"735_CR27","doi-asserted-by":"publisher","first-page":"669","DOI":"10.1109\/JSAC.2013.SUP.0513058","volume":"31","author":"H Zhou","year":"2013","unstructured":"Zhou H, Chen J, Fan J, Du Y, Das SK (2013) ConSub: incentive-based content subscribing in selfish opportunistic mobile networks. IEEE J Sel Areas Commun 31(9):669\u2013679","journal-title":"IEEE J Sel Areas Commun"},{"issue":"1","key":"735_CR28","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1109\/TVT.2015.2454291","volume":"65","author":"Y Cai","year":"2016","unstructured":"Cai Y, Fan Y, Wen D (2016) An incentive-compatible routing protocol for two-hop delay-tolerant networks. IEEE Trans Veh Technol 65(1):266\u2013277","journal-title":"IEEE Trans Veh Technol"},{"issue":"3","key":"735_CR29","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1109\/TDSC.2012.84","volume":"10","author":"Q Li","year":"2013","unstructured":"Li Q, Gao W, Zhu S, Cao G (2013) To lie or to comply: defending against flood attacks in disruption tolerant networks. IEEE Trans Depend Secure Comput 10(3):168\u2013182","journal-title":"IEEE Trans Depend Secure Comput"},{"issue":"1","key":"735_CR30","doi-asserted-by":"publisher","first-page":"795","DOI":"10.1109\/TVT.2017.2748345","volume":"67","author":"TND Pham","year":"2017","unstructured":"Pham TND, Yeo CK, Yanai N, Fujiwara T (2017) Detecting flooding attack and accommodating burst traffic in delay-tolerant networks. IEEE Trans Veh Technol 67(1):795\u2013808","journal-title":"IEEE Trans Veh Technol"},{"key":"735_CR31","unstructured":"Wei L, Cao Z, Zhu H (2011) MobiGame: a user-centric reputation based incentive protocol for delay\/disruption tolerant networks. In: 2011 IEEE global telecommunications conference\u2014GLOBECOM 2011, Kathmandu, pp 1\u20135"},{"key":"735_CR32","unstructured":"Ma Y, Jamalipour A (2010) Opportunistic node authentication in intermittently connected mobile ad hoc networks. In: 16th Asia-Pacific conference on communications (APCC), Auckland, pp. 453\u2013457"},{"issue":"6","key":"735_CR33","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1109\/TDSC.2014.2382601","volume":"12","author":"X Lv","year":"2015","unstructured":"Lv X, Mu Y, Li H (2015) Loss-tolerant bundle fragment authentication for space-based DTNs. IEEE Trans Depend Secure Comput 12(6):615\u2013625","journal-title":"IEEE Trans Depend Secure Comput"},{"issue":"1","key":"735_CR34","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1049\/iet-ifs.2015.0438","volume":"11","author":"MNM Bhutta","year":"2017","unstructured":"Bhutta MNM, Cruickshank H, Sun Z (2017) Public-key infrastructure validation and revocation mechanism suitable for delay\/disruption tolerant networks. IET Inf Secur 11(1):16\u201322","journal-title":"IET Inf Secur"},{"issue":"11","key":"735_CR35","doi-asserted-by":"publisher","first-page":"5257","DOI":"10.1109\/TVT.2014.2381220","volume":"64","author":"Z Li","year":"2015","unstructured":"Li Z, Liu Y, Zhu H, Sun L (2015) Coff: contact-duration-aware cellular traffic offloading over delay tolerant networks. IEEE Trans Veh Technol 64(11):5257\u20135268","journal-title":"IEEE Trans Veh Technol"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-019-00735-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00607-019-00735-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-019-00735-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,25]],"date-time":"2020-06-25T23:23:38Z","timestamp":1593127418000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00607-019-00735-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,27]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,1]]}},"alternative-id":["735"],"URL":"https:\/\/doi.org\/10.1007\/s00607-019-00735-2","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,6,27]]},"assertion":[{"value":"18 February 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 June 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 June 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}