A blockchain-based secure routing protocol for opportunistic networks
- 4 March 2021
- journal article
- research article
- Published by Springer Science and Business Media LLC in Journal of Ambient Intelligence and Humanized Computing
- Vol. 13 (4), 2191-2203
- https://doi.org/10.1007/s12652-021-02981-9
Abstract
No abstract availableKeywords
This publication has 21 references indexed in Scilit:
- Enhanced secure time synchronisation protocol for IEEE802.15.4e‐based industrial Internet of ThingsIET Information Security, 2017
- Cryptography-Based Misbehavior Detection and Trust Control Mechanism for Opportunistic Network SystemsIEEE Systems Journal, 2017
- History-Based Secure Routing Protocol to Detect Blackhole and Greyhole Attacks in Opportunistic NetworksRecent Advances in Communications and Networking Technology, 2017
- Trust-based Security Protocol against blackhole attacks in opportunistic networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2013
- A survey of trust in social networksACM Computing Surveys, 2013
- Opportunistic relay selection for cooperative networks with secrecy constraintsIET Communications, 2010
- Practical security in p2p-based social networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009
- The ONE simulator for DTN protocol evaluationPublished by European Alliance for Innovation n.o. ,2009
- A delay-tolerant network architecture for challenged internetsPublished by Association for Computing Machinery (ACM) ,2003
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978