期刊名称:International Journal of Innovative Research in Computer and Communication Engineering
印刷版ISSN:2320-9798
电子版ISSN:2320-9801
出版年度:2017
卷号:5
期号:4
页码:8955
DOI:10.15680/IJIRCCE.2017.05040341
出版社:S&S Publications
摘要:In Delay Tolerant Networks (DTNs), the information is transferred from its source to destinationwithout end-to-end connectivity of the network. Delay Tolerant Networking (DTN) is an approach to computernetwork architecture that seeks to address the technical issues in heterogeneous networks that may lack continuousnetwork connectivity. Delay-Tolerant Networks (DTNs) consists of nodes that cooperate to forward messages despiteconnectivity issues. It also has a limitation in network resources. The DTN permits communication only if it is in thecommunication range. Because of this constraint there is a chance of dropping or dipping the received packets by theselfish or malicious nodes. Finally this leads to attacks. Malicious nodes within a Delay Tolerant Network (DTN) mayattempt to delay or drop data in transit to its destination. Such attacks include dropping data, saturating the networkwith extra messages, humiliating routing tables, and imitating network acknowledgments. Malicious nodes consumenetwork resources, plummeting its concert and accessibility; therefore they constitute an important issue that should beconsidered. Many approaches are proposed to solve the problems which are occurred in DTN. In this paper, we areproviding a survey on Delay Tolerant Network to detect malicious node.