Threat mitigation in tactical-level disruption tolerant networks
In disruption tolerant networks (DTNs), nodes exchange beacon messages to set up links via a process known as neighbor discovery. However as it is, beacon messages are susceptible to forgery and tampering that could be exploited to attack and participate in the network. This paper outlines a protoco...
Saved in:
Main Authors: | Goh, Weihan, Yeo, Chai Kiat |
---|---|
Other Authors: | School of Computer Engineering |
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/98432 http://hdl.handle.net/10220/13401 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
Network securities against compromised nodes in disruption tolerant mobile ad hoc networks
by: Ng, Keith Zhi Wei.
Published: (2009) -
Mitigating the impact of node mobility using mobile backbone for heterogeneous MANETs
by: Xia, Yang, et al.
Published: (2013) -
Detecting flooding attack and accommodating burst traffic in delay-tolerant networks
by: Pham, Thi Ngoc Diep, et al.
Published: (2019) -
Twitter over delay tolerant network
by: Goh, Zhi Yi.
Published: (2011) -
Towards inconspicuous security
by: Goh, Weihan
Published: (2013)