{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T16:45:53Z","timestamp":1761324353538,"version":"build-2065373602"},"reference-count":27,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T00:00:00Z","timestamp":1611705600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["UIDB\/50021\/2020","UIDB\/00408\/2020 and UIDP\/00408\/2020"],"award-info":[{"award-number":["UIDB\/50021\/2020","UIDB\/00408\/2020 and UIDP\/00408\/2020"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Delay-tolerant networking (DTN) enables communication in disruptive scenarios where issues such as sparse and intermittent connectivity, long and variable delays, high latency, high error rates, or no end-to-end connectivity exist. Internet of Vehicles (IoV) is a network of the future in which integration between devices, vehicles, and users will be unlimited and universal, overcoming the heterogeneity of systems, services, applications, and devices. Delay-tolerant internet of vehicles (DT-IoV) is emerging and becoming a popular research topic due to the critical applications that can be realized, such as software or map update dissemination. For an IoV to work efficiently, a degree of cooperation between nodes is necessary to deliver messages to their destinations. However, nodes might misbehave and silently drop messages, also known as a black-hole attack, degrading network performance. Various solutions have been proposed to deal with black-hole nodes, but most are centralized or require each node to meet every other node. This paper proposes a decentralized reputation scheme called BiRep that identifies and punishes black-hole nodes in DT-IoV. BiRep is tested on the Prophet routing protocol. Simulation results show excellent performance in all scenarios, comparable or better to other reputation schemes, significantly increasing the delivery ratio of messages.<\/jats:p>","DOI":"10.3390\/s21030835","type":"journal-article","created":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T06:10:54Z","timestamp":1611727854000},"page":"835","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["BiRep: A Reputation Scheme to Mitigate the Effects of Black-Hole Nodes in Delay-Tolerant Internet of Vehicles"],"prefix":"10.3390","volume":"21","author":[{"given":"Catarina","family":"Nabais","sequence":"first","affiliation":[{"name":"INESC-ID, Instituto Superior T\u00e9cnico, Universidade de Lisboa, 1000-029 Lisboa, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0192-2504","authenticated-orcid":false,"given":"Paulo Rog\u00e9rio","family":"Pereira","sequence":"additional","affiliation":[{"name":"INESC-ID\/INOV, Instituto Superior T\u00e9cnico, Universidade de Lisboa, 1000-029 Lisboa, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6613-1666","authenticated-orcid":false,"given":"Naercio","family":"Magaia","sequence":"additional","affiliation":[{"name":"LASIGE, Departamento de Inform\u00e1tica, Faculdade de Ci\u00eancias da Universidade de Lisboa, 1749-016 Lisboa, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2021,1,27]]},"reference":[{"key":"ref_1","unstructured":"Warthman, F. (2015, September 14). The InterPlaNetary (IPN) Internet Project, Available online: http:\/\/ipnsig.org\/wp-content\/uploads\/2015\/09\/DTN_Tutorial_v3.2.pdf."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1109\/JAS.2021.1003862","article-title":"Computing Paradigms in Emerging Vehicular Environments: A Review","volume":"8","author":"Silva","year":"2021","journal-title":"IEEE\/CAA J. Autom. Sin."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1166","DOI":"10.1109\/SURV.2011.081611.00102","article-title":"From Delay-Tolerant Networks to Vehicular Delay-Tolerant Networks","volume":"14","author":"Pereira","year":"2012","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_4","unstructured":"Magaia, N., Pereira, P., Correia, M.P., Rawat, D.B., Rodrigues, J.J.P.C., and Stojmenovic, I. (2015). Security in delay-tolerant mobile cyber physical applications. Cyber Phys. Syst. Theory Pract., 373\u2013394."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Fall, K. (2003, January 25\u201329). A delay-tolerant network architecture for challenged Internets. Proceedings of the SIGCOMM\u201903 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Karlsruhe, Germany.","DOI":"10.1145\/863956.863960"},{"key":"ref_6","unstructured":"Veniam (2021, January 26). The Internet of Moving Things. Available online: https:\/\/veniam.com\/."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Dini, G., and Duca, A.L. (2010, January 22\u201325). A reputation-based approach to tolerate misbehaving carriers in delay tolerant networks. Proceedings of the 2010 IEEE Symposium on Computers and Communications (ISCC), Riccione, Italy.","DOI":"10.1109\/ISCC.2010.5546701"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Magaia, N., Pereira, P.R., and Correia, M.P. (2013, January 15\u201316). Nodes\u2019 Misbehavior in Vehicular Delay-Tolerant Networks. Proceedings of the Conference on Future Internet Communications (CFIC 2013), Coimbra, Portugal.","DOI":"10.1109\/CFIC.2013.6566325"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1810","DOI":"10.1109\/TVT.2018.2886572","article-title":"ReFIoV: A novel reputation framework for information-centric vehicular applications","volume":"68","author":"Magaia","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Chuah, M., Yang, P., and Han, J. (2007, January 6\u201310). A ferry-based intrusion detection scheme for sparsely connected ad hoc networks. Proceedings of the 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking Services, (MobiQuitous), Philadelphia, PA, USA.","DOI":"10.1109\/MOBIQ.2007.4451068"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Lindgren, A., Doria, A., Davies, E., and Grasic, S. (2012). Probabilistic routing protocol for intermittently connected networks. RFC 6693.","DOI":"10.17487\/rfc6693"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Burgess, J., Gallagher, B., Jensen, D., and Levine, B.N. (2006, January 23\u201329). MaxProp: Routing for vehicle-based disruption-tolerant network. Proceedings of the 25th IEEE Infocom Conference, Barcelona, Spain.","DOI":"10.1109\/INFOCOM.2006.228"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Ren, Y., Chuah, M., Yang, J., and Chen, Y. (2010, January 18\u201321). MUTON: Detecting malicious nodes in disrupt-tolerant networks. Proceedings of the 2010 IEEE Wireless Communication and Networking Conference, Sydney, Australia.","DOI":"10.1109\/WCNC.2010.5506574"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Guo, Y., Schildt, S., and Wolf, L. (2013, January 7\u201310). Detecting black-hole and greyhole attacks in vehicular delay tolerant networks. Proceedings of the 2013 Fifth International Conference on Communication Systems and Networks (COMSNETS), Bangalore, India.","DOI":"10.1109\/COMSNETS.2013.6465569"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Guo, Y., Schildt, S., P\u00f6gel, T., and Wolf, L.C. (2013, January 28\u201331). Detecting Malicious behavior in a Vehicular DTN for Public Transportation. Proceedings of the Global Information Infrastructure and Networking Symposium 2013 (GIIS\u201913), Trento, Italy.","DOI":"10.1109\/GIIS.2013.6684378"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Ren, Y., Chuah, M.C., Yang, J., and Chen, T. (2010, January 14\u201317). Detecting black-hole attacks in Disruption-Tolerant Networks through packet exchange recording. Proceedings of the 2010 IEEE International Symposium on \u201cA World of Wireless, Mobile and Multimedia Networks\u201d (WoWMoM), Montreal, QC, Canada.","DOI":"10.1109\/WOWMOM.2010.5534944"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1167","DOI":"10.1016\/j.adhoc.2012.03.003","article-title":"Towards a reputation-based routing protocol to contrast black-holes in a delay tolerant network","volume":"10","author":"Dini","year":"2012","journal-title":"Ad Hoc Netw."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"7929","DOI":"10.1109\/TIE.2015.2425357","article-title":"A Cooperative Watchdog System to Detect Misbehavior Nodes in Vehicular Delay-Tolerant Networks","volume":"62","author":"Dias","year":"2015","journal-title":"IEEE Trans. Ind. Electron."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1049\/iet-net.2017.0079","article-title":"Towards an incentive-compatible, reputation based framework for stimulating cooperation in opportunistic networks: A survey","volume":"6","author":"Mantas","year":"2017","journal-title":"IET Netw."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Rehman, G., Ghani, A., Muhammad, S., Singh, M., and Singh, D. (2020). Selfishness in Vehicular Delay-Tolerant Networks: A Review. Sensors, 20.","DOI":"10.3390\/s20103000"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"760","DOI":"10.1109\/TITS.2018.2818888","article-title":"A Survey on Recent Advances in Vehicular Network Security, Trust, and Privacy","volume":"20","author":"Lu","year":"2019","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"6647","DOI":"10.1109\/JIOT.2020.2975084","article-title":"TROVE: A Context-Awareness Trust Model for VANETs Using Reinforcement Learning","volume":"7","author":"Guo","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_23","unstructured":"The ONE (2021, January 26). The Opportunistic Network Environment Simulator. Available online: https:\/\/akeranen.github.io\/the-one\/."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"11154","DOI":"10.1109\/TVT.2018.2870113","article-title":"ePRIVO: An enhanced privacy-preserving opportunistic routing protocol for vehicular delay-tolerant networks","volume":"67","author":"Magaia","year":"2018","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_25","unstructured":"Spyropoulos, T., Psounis, K., and Raghavendra, C.S. (2004, January 4\u20137). Single-copy Routing in Intermittently Connected Mobile Networks. Proceedings of the First IEEE Conference on Sensor and Ad Hoc Communications and Networks (IEEE SECON 2004), Santa Clara, CA, USA."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Spyropoulos, T., Psounis, K., and Raghavendra, C.S. (2005, January 22\u201326). Spray and wait: An efficient routing scheme for intermittently connected mobile networks. Proceedings of the 2005 ACM SIGCOMM Workshop on Delay-Tolerant Networking, ACM, Philadelphia, PA, USA.","DOI":"10.1145\/1080139.1080143"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"2034","DOI":"10.1109\/TVT.2019.2957744","article-title":"Blockchain Enabled Trust-Based Location Privacy Protection Scheme in VANET","volume":"69","author":"Luo","year":"2020","journal-title":"IEEE Trans. Veh. Technol."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/3\/835\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T05:15:53Z","timestamp":1760159753000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/3\/835"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,27]]},"references-count":27,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2021,2]]}},"alternative-id":["s21030835"],"URL":"https:\/\/doi.org\/10.3390\/s21030835","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2021,1,27]]}}}