{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T07:58:44Z","timestamp":1694678324721},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2012,12,15]],"date-time":"2012-12-15T00:00:00Z","timestamp":1355529600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2013,11]]},"DOI":"10.1007\/s11277-012-0960-4","type":"journal-article","created":{"date-parts":[[2012,12,14]],"date-time":"2012-12-14T17:56:42Z","timestamp":1355507802000},"page":"149-168","source":"Crossref","is-referenced-by-count":10,"title":["Secure Multi-copy Routing in Compromised Delay Tolerant Networks"],"prefix":"10.1007","volume":"73","author":[{"given":"Eyuphan","family":"Bulut","sequence":"first","affiliation":[]},{"given":"Boeslaw K.","family":"Szymanski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,12,15]]},"reference":[{"key":"960_CR1","doi-asserted-by":"crossref","unstructured":"Juang, P., Oki, H., Wang, Y., Martonosi, M., Peh, L. S., & Rubenstein, D. (2002). Energy-efficient computing for wildlife tracking: Design tradeoffs and early experiences with zebranet. In Proceedings of the ACM ASPLOS.","DOI":"10.1145\/605397.605408"},{"key":"960_CR2","unstructured":"Disruption tolerant networking. http:\/\/www.darpa.mil\/ato\/solicit\/DTN\/ ."},{"key":"960_CR3","doi-asserted-by":"crossref","unstructured":"Ott, J., & Kutscher, D. (2005). A disconnection-tolerant transport for drive-thru internet environments. In Proceedings of the IEEE INFOCOM.","DOI":"10.1109\/INFCOM.2005.1498464"},{"key":"960_CR4","doi-asserted-by":"crossref","unstructured":"Burgess, J., Gallagher, B., Jensen, D., & Levine, B. N. (2006). Maxprop: Routing for vehicle-based disruption-tolerant networking. In Proceedings of the INFOCOM, pp. 1\u201311.","DOI":"10.1109\/INFOCOM.2006.228"},{"key":"960_CR5","doi-asserted-by":"crossref","unstructured":"Bulut, E., Geyik, S., & Szymanski, B. (2010). Efficient routing in delay tolerant networks with correlated node mobility. In Proceedings of the 7th IEEE international conference on mobile ad-hoc and sensor systems (MASS).","DOI":"10.1109\/MASS.2010.5663962"},{"key":"960_CR6","doi-asserted-by":"crossref","unstructured":"Daly, E., & Haahr, M. (2007). Social network analysis for routing in disconnected delay-tolerant manets. In Proceedings of the ACM MobiHoc.","DOI":"10.1145\/1288107.1288113"},{"key":"960_CR7","unstructured":"Bulut, E., & Szymanski, B. K. (2012). Exploiting friendship relations for efficient routing in mobile social networks. In Ivan Stojmenovic (Ed.), IEEE transactions on parallel and distributed systems (Vol. 23(12), pp. 2254\u20132265). New York: IEEE."},{"key":"960_CR8","doi-asserted-by":"crossref","unstructured":"Lindgren, A., Doria, A., & Schelen, O. (2003). Probabilistic routing in intermittently connected networks. SIGMOBILE Mobile Computing and Communication Review, 7(3), 19\u201320.","DOI":"10.1145\/961268.961272"},{"key":"960_CR9","unstructured":"Vahdat, A., & Becker, D. (2000). Epidemic routing for partially connected ad hoc networks. Duke University, Tech. Rep. CS-200006."},{"key":"960_CR10","doi-asserted-by":"crossref","unstructured":"Spyropoulos, T., Psounis, K., & Raghavendra, C. S. (2008). Efficient routing in intermittently connected mobile networks: The multiple-copy case. IEEE\/ACM Transactions on Networking, 16(1), 77\u201390.","DOI":"10.1109\/TNET.2007.897964"},{"key":"960_CR11","doi-asserted-by":"crossref","unstructured":"Wang, Y., Jain, S., Martonosi, M., & Fall, K. (2005). Erasure coding based routing for opportunistic networks. In Proceedings of the ACM SIGCOMM workshop on delay tolerant networking (WDTN).","DOI":"10.1145\/1080139.1080140"},{"key":"960_CR12","doi-asserted-by":"crossref","unstructured":"Bulut, E., Wang, Z., & Szymanski, B. (2010). Cost efficient erasure coding based routing in delay tolerant networks. In Proceedings of the ICC, South Africa.","DOI":"10.1109\/ICC.2010.5502382"},{"key":"960_CR13","doi-asserted-by":"crossref","unstructured":"Lin, Y., Li, B., & Liang, B. (2008). Efficient network coded data transmissions in disruption tolerant networks. In Proceedings of the IEEE INFOCOM.","DOI":"10.1109\/INFOCOM.2008.210"},{"key":"960_CR14","doi-asserted-by":"crossref","unstructured":"Burgess, J., Bissias, G. D., Comer, M. D., & Levine, B. N. (2007). Surviving attacks on disruption-tolerant networks without authentication. In Proceedings of the Mobihoc \u201907, pp. 61\u201370.","DOI":"10.1145\/1288107.1288116"},{"key":"960_CR15","doi-asserted-by":"crossref","unstructured":"Choo, F. C., Chan, M. C., & Chang, E. (2010). Robustness of DTN against routing attacks. In Proceedings of the second international conference on communication systems and networks (COMSNETS), pp. 1\u201310.","DOI":"10.1109\/COMSNETS.2010.5432014"},{"key":"960_CR16","doi-asserted-by":"crossref","unstructured":"Li, F., & Wu, J. (2009). Thwarting blackhole attacks in disruption\u2013tolerant networks using encounter tickets. In Proceedings of the INFOCOM, pp. 2428\u20132436.","DOI":"10.1109\/INFCOM.2009.5062170"},{"key":"960_CR17","doi-asserted-by":"crossref","unstructured":"Nelson, S. C., Bakht, M., & Kravets, R. (2009). Encounter-based routing in DTNs. In Proceedings of the IEEE Infocom, Rio De Janeiro, Brazil, pp. 846\u2013854.","DOI":"10.1109\/INFCOM.2009.5061994"},{"key":"960_CR18","doi-asserted-by":"crossref","unstructured":"Ren, Y., Chuah, M. C., Yang, J., & Chen, Y. (2010). Muton: Detecting malicious nodes in disruption-tolerant networks. In Proceedings of the WCNC.","DOI":"10.1109\/WCNC.2010.5506574"},{"key":"960_CR19","doi-asserted-by":"crossref","unstructured":"Ren, Y., Chuah, M. C., Yang, J., & Chen, Y. (2010). Detecting blackhole attacks in disruption-tolerant networks through packet exchange recording. In Proceedings of the 1st workshop on D-SPAN (colocated with WoWMoM).","DOI":"10.1109\/WOWMOM.2010.5534944"},{"key":"960_CR20","doi-asserted-by":"crossref","unstructured":"Li, Q., & Cao, G. (2012). Mitigating routing misbehavior in disruption tolerant networks. In IEEE transactions on information forensics and security (to appear).","DOI":"10.1109\/TIFS.2011.2173195"},{"key":"960_CR21","doi-asserted-by":"crossref","unstructured":"Dini, G., & Duca, A. L. (2010). A reputation-based approach to tolerate misbehaving carriers in delay tolerant networks. In Proceedings of the 15th IEEE symposium on computers and communications, Italy.","DOI":"10.1109\/ISCC.2010.5546701"},{"key":"960_CR22","doi-asserted-by":"crossref","unstructured":"Li, N., & Das, S. K. (2010). RADON: Reputation-assisted data forwarding in opportunistic networks. In Proceedings of the MobiOpp, pp. 8\u201314.","DOI":"10.1145\/1755743.1755746"},{"key":"960_CR23","doi-asserted-by":"crossref","unstructured":"Chen, I. R., Bao, F., Chang, M. J., & Cho, J. H. (2010). Trust management for encounter-based routing in delay tolerant networks. In IEEE global communications conference, Miami, USA.","DOI":"10.1109\/GLOCOM.2010.5683235"},{"key":"960_CR24","doi-asserted-by":"crossref","unstructured":"Adali, S., Escriva, R., Hayvanovych, M., Magdon-Ismail, M., Szymanski, B., Wallace, W., et al. (2010). Measuring behavioral trust in social networks.In IEEE innternational conference on intelligence and security informatics (ISI 2010), pp. 150\u2013152, Vancouver, BC, May 23\u201326, 2010.","DOI":"10.1109\/ISI.2010.5484757"},{"key":"960_CR25","doi-asserted-by":"crossref","unstructured":"Bulut, E., Wang, Z., & Szymanski, B. (2010). Cost effective multi-period spraying for routing in delay tolerant networks. In IEEE\/ACM transactions on networking, Vol. 18.","DOI":"10.1109\/TNET.2010.2043744"},{"key":"960_CR26","doi-asserted-by":"crossref","unstructured":"Spyropoulos, T., Psounis, K., & Raghavendra, C. S. (2006). Performance analysis of mobility-assisted routing. In MobiHoc.","DOI":"10.1145\/1132905.1132912"},{"key":"960_CR27","doi-asserted-by":"crossref","unstructured":"Srinivasa, S., & Krishnamurthy, S. (2009). CREST: An opportunistic forwarding protocol based on conditional residual time. In Proceedings of the SECON.","DOI":"10.1109\/SAHCN.2009.5168922"},{"key":"960_CR28","unstructured":"A European Union funded project in situated and autonomic communications. www.haggleproject.org ."},{"key":"960_CR29","unstructured":"Leguay, J., Lindgren, A., Scott, J., Friedman, T., Crowcroft, J., & Hui, P. (2006). CRAWDAD data set upmc\/content (v. 2006-11-17). Downloaded from http:\/\/crawdad.cs.dartmouth.edu\/upmc\/content ."},{"key":"960_CR30","doi-asserted-by":"crossref","unstructured":"Tournoux, P. U., Leguay, J., Benbadis, F., Conan, V., Amorim, M., & Whitbeck, J. (2009). The accordion phenomenon: Analysis, characterization, and impact on DTN pouting. In Proceedings of the INFOCOM.","DOI":"10.1109\/INFCOM.2009.5062024"},{"key":"960_CR31","doi-asserted-by":"crossref","unstructured":"Chaintreau, A., Hui, P., Crowcroft, J., Diot, C., Gass, R., & Scott, J. (2006). Impact of human mobility on the design of opportunistic forwarding algorithms. In Proceedings of the INFOCOM.","DOI":"10.1109\/INFOCOM.2006.172"},{"key":"960_CR32","doi-asserted-by":"crossref","unstructured":"Zhang, X., Kurose, J. F., Levine, B., Towsley, D., & Zhang, H. (2007). Study of a bus-based disruption tolerant network: Mobility modeling and impact on routing. In Proceedings of the ACM MobiCom.","DOI":"10.1145\/1287853.1287876"},{"key":"960_CR33","doi-asserted-by":"crossref","unstructured":"Pujol, J. M., Toledo, A. L., & Rodriguez, P. (2009). Fair routing in delay tolerant networks. In Proceedings of the IEEE INFOCOM.","DOI":"10.1109\/INFCOM.2009.5061993"},{"key":"960_CR34","doi-asserted-by":"crossref","unstructured":"Bulut, E., & Szymanski, B. (2011). On secure multi-copy based routing in delay tolerant networks. In Proceedings of the first international workshop on privacy, security and trust in mobile and wireless systems (MobiPST 2011), in conjunction with ICCN.","DOI":"10.1109\/ICCCN.2011.6005812"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-012-0960-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-012-0960-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-012-0960-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,7]],"date-time":"2019-07-07T02:55:52Z","timestamp":1562468152000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-012-0960-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12,15]]},"references-count":34,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,11]]}},"alternative-id":["960"],"URL":"https:\/\/doi.org\/10.1007\/s11277-012-0960-4","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,12,15]]}}}