{"id":"https://openalex.org/W2762085156","doi":"https://doi.org/10.1504/ijics.2017.10008446","title":"A trust-based approach for securing data communication in delay tolerant networks","display_name":"A trust-based approach for securing data communication in delay tolerant networks","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2762085156","doi":"https://doi.org/10.1504/ijics.2017.10008446","mag":"2762085156"},"language":"en","primary_location":{"id":"doi:10.1504/ijics.2017.10008446","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijics.2017.10008446","pdf_url":null,"source":{"id":"https://openalex.org/S85012289","display_name":"International Journal of Information and Computer Security","issn_l":"1744-1765","issn":["1744-1765","1744-1773"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information and Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020634170","display_name":"Abdelhakim Bendib","orcid":null},"institutions":[{"id":"https://openalex.org/I187560010","display_name":"University of B\u00e9ja\u00efa","ror":"https://ror.org/03yb2hp88","country_code":"DZ","type":"education","lineage":["https://openalex.org/I187560010"]}],"countries":["DZ"],"is_corresponding":true,"raw_author_name":"Abdelhakim Bendib","raw_affiliation_strings":["Laboratoire d'Informatique M\u00e9dicale, Facult\u00e9 des Sciences Exactes, Universit\u00e9 de Bejaia, 06000 Bejaia, Alg\u00e9rie"],"affiliations":[{"raw_affiliation_string":"Laboratoire d'Informatique M\u00e9dicale, Facult\u00e9 des Sciences Exactes, Universit\u00e9 de Bejaia, 06000 Bejaia, Alg\u00e9rie","institution_ids":["https://openalex.org/I187560010"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090157446","display_name":"Mawloud Omar","orcid":"https://orcid.org/0000-0002-4670-8982"},"institutions":[{"id":"https://openalex.org/I187560010","display_name":"University of B\u00e9ja\u00efa","ror":"https://ror.org/03yb2hp88","country_code":"DZ","type":"education","lineage":["https://openalex.org/I187560010"]}],"countries":["DZ"],"is_corresponding":false,"raw_author_name":"Mawloud Omar","raw_affiliation_strings":["Laboratoire d'Informatique M\u00e9dicale, Facult\u00e9 des Sciences Exactes, Universit\u00e9 de Bejaia, 06000 Bejaia, Alg\u00e9rie"],"affiliations":[{"raw_affiliation_string":"Laboratoire d'Informatique M\u00e9dicale, Facult\u00e9 des Sciences Exactes, Universit\u00e9 de Bejaia, 06000 Bejaia, Alg\u00e9rie","institution_ids":["https://openalex.org/I187560010"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082128418","display_name":"Djoudi Touazi","orcid":null},"institutions":[{"id":"https://openalex.org/I187560010","display_name":"University of B\u00e9ja\u00efa","ror":"https://ror.org/03yb2hp88","country_code":"DZ","type":"education","lineage":["https://openalex.org/I187560010"]}],"countries":["DZ"],"is_corresponding":false,"raw_author_name":"Djoudi Touazi","raw_affiliation_strings":["Laboratoire d'Informatique M\u00e9dicale, Facult\u00e9 des Sciences Exactes, Universit\u00e9 de Bejaia, 06000 Bejaia, Alg\u00e9rie"],"affiliations":[{"raw_affiliation_string":"Laboratoire d'Informatique M\u00e9dicale, Facult\u00e9 des Sciences Exactes, Universit\u00e9 de Bejaia, 06000 Bejaia, Alg\u00e9rie","institution_ids":["https://openalex.org/I187560010"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108085596","display_name":"Abdelmadjid Bouabdallah","orcid":null},"institutions":[{"id":"https://openalex.org/I39804081","display_name":"Sorbonne Universit\u00e9","ror":"https://ror.org/02en5vm52","country_code":"FR","type":"education","lineage":["https://openalex.org/I39804081"]},{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I102516824","display_name":"Universit\u00e9 de Technologie de Compi\u00e8gne","ror":"https://ror.org/04y5kwa70","country_code":"FR","type":"education","lineage":["https://openalex.org/I102516824"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Abdelmadjid Bouabdallah","raw_affiliation_strings":["Sorbonne Universit\u00e9s, Universit\u00e9 de technologie de Compiegne, CNRS, Heudiasyc UMR 7253, CS 60 319, 60 203 Compiegne cedex, France"],"affiliations":[{"raw_affiliation_string":"Sorbonne Universit\u00e9s, Universit\u00e9 de technologie de Compiegne, CNRS, Heudiasyc UMR 7253, CS 60 319, 60 203 Compiegne cedex, France","institution_ids":["https://openalex.org/I102516824","https://openalex.org/I39804081","https://openalex.org/I1294671590"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5020634170"],"corresponding_institution_ids":["https://openalex.org/I187560010"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.16611493,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"9","issue":"4","first_page":"324","last_page":"324"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8585437536239624},{"id":"https://openalex.org/keywords/delay-tolerant-networking","display_name":"Delay-tolerant networking","score":0.7416091561317444},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6241089701652527},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.6062744855880737},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5757063627243042},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.5631252527236938},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5453989505767822},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.5233023762702942},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.35827720165252686},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2586078643798828},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.14622411131858826}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8585437536239624},{"id":"https://openalex.org/C53264328","wikidata":"https://www.wikidata.org/wiki/Q55320","display_name":"Delay-tolerant networking","level":5,"score":0.7416091561317444},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6241089701652527},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.6062744855880737},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5757063627243042},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.5631252527236938},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5453989505767822},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.5233023762702942},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.35827720165252686},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2586078643798828},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.14622411131858826},{"id":"https://openalex.org/C204739117","wikidata":"https://www.wikidata.org/wiki/Q1368373","display_name":"Optimized Link State Routing Protocol","level":4,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1504/ijics.2017.10008446","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijics.2017.10008446","pdf_url":null,"source":{"id":"https://openalex.org/S85012289","display_name":"International Journal of Information and Computer Security","issn_l":"1744-1765","issn":["1744-1765","1744-1773"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information and Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6100000143051147}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2032233321","https://openalex.org/W3121970507","https://openalex.org/W2110028391","https://openalex.org/W54497855","https://openalex.org/W217960748","https://openalex.org/W3125814499","https://openalex.org/W2090827041","https://openalex.org/W2094012830","https://openalex.org/W187246281","https://openalex.org/W2079194830"],"abstract_inverted_index":{"The":[0],"proliferation":[1],"of":[2,14,62],"network":[3,8,90],"technologies":[4],"drives":[5],"many":[6],"different":[7],"architectures":[9],"to":[10,18,53,69,87],"provide":[11],"huge":[12],"variety":[13],"services":[15],"and":[16,82,111,117,129],"contents":[17],"end":[19],"clients.":[20],"This":[21],"task":[22],"becomes":[23],"more":[24],"difficult":[25],"when":[26],"we":[27,48],"are":[28],"in":[29,57,59,79],"networks":[30,37],"with":[31],"intermittent":[32,85],"connections,":[33],"called":[34],"delay":[35],"tolerant":[36],"(DTN)":[38],"where":[39],"security":[40],"is":[41,67,95,102],"an":[42,84,88],"important":[43],"issue.":[44],"In":[45],"this":[46],"paper,":[47],"propose":[49],"a":[50,70,98],"trust-based":[51],"approach":[52,94],"secure":[54],"data":[55],"transfer":[56],"DTN":[58,71],"the":[60,118],"presence":[61],"malicious":[63,132],"transporters.":[64,112],"Our":[65,93],"proposal":[66],"intended":[68],"architecture":[72],"which":[73,101],"includes":[74],"several":[75],"sub-networks":[76],"geographically":[77],"dispersed":[78],"isolated":[80],"regions":[81],"having":[83],"access":[86],"infrastructure-based":[89],"(like":[91],"internet).":[92],"based":[96,104],"on":[97,105],"particular":[99],"web-of-trust,":[100],"formed":[103],"existing":[106],"social":[107],"relationship":[108],"among":[109],"clients":[110],"We":[113],"conducted":[114],"intensive":[115],"simulations":[116],"obtained":[119],"results":[120],"show":[121],"that":[122],"it":[123],"offers":[124],"high":[125],"packet":[126],"delivery":[127],"rate":[128],"resists":[130],"against":[131],"transporter's":[133],"behaviour.":[134]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
