1.
F. Hamza and S. M. C. Vigila, “Cluster Head Selection Algorithm for MANETs Using Hybrid Particle Swarm Optimization-Genetic Algorithm,” Int. J. Comput. Netw. Appl., vol. 8, no. 2, pp. 119–129, 2021.
2.
F. Warthman, “Delay-and disruption-tolerant networks (DTNs),” Tutor. V 0 Interplanet. Internet Spec. Interest Group, pp. 5–9, 2012.
3.
P. Pathak, A. Shrivastava, and S. Gupta, “A Survey on Various Security Issues in Delay Tolerant Networks,” J. Adv. Shell Program., vol. 2, no. 2, pp. 12–18, 2015.
4.
P. K. BVSP, S. Sarma, and G. B. Prasad, “A Brief Survey on Security in Delay/Disruption Tolerant Networks,” Int. J. Pure Appl. Math., vol. 118, no. 14, pp. 157–162, 2018.
5.
S. Farrell, S. Symington, H. Weiss, and P. Lovell, “Delay-Tolerant Networking Security Overview,” Internet Engineering Task Force, Internet Draft draft-irtf-dtnrg-sec-overview-06, Mar. 2009. Accessed: Aug. 19, 2021. [Online]. Available: https://datatracker.ietf.org/doc/draft-irtf-dtnrg-sec-overview-03
6.
P. M. Jawandhiya, M. M. Ghonge, M. S. Ali, and J. S. Deshpande, “A survey of mobile ad hoc network attacks,” Int. J. Eng. Sci. Technol., vol. 2, no. 9, pp. 4063–4071, 2010.
7.
P. Goyal, S. Batra, and A. Singh, “A literature review of security attack in mobile ad-hoc networks,” Int. J. Comput. Appl., vol. 9, no. 12, pp. 11–15, 2010.
8.
R. Di Pietro, S. Guarino, N. V. Verde, and J. Domingo-Ferrer, “Security in wireless ad-hoc networks–a survey,” Comput. Commun., vol. 51, pp. 1–20, 2014.
9.
Q. Li, S. Zhu, and G. Cao, “Routing in socially selfish delay tolerant networks,” in 2010 Proceedings IEEE Infocom, 2010, pp. 1–9.
10.
A. Keränen, M. Pitkänen, M. Vuori, and J. Ott, “Effect of non-cooperative nodes in mobile DTNs,” in 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, 2011, pp. 1–7.
11.
S. E. Loudari, M. Benamar, and N. Benamar, “New classification of nodes cooperation in delay tolerant networks,” in International Symposium on Ubiquitous Networking, 2015, pp. 301–309.
12.
A. Vahdat and D. Becker, “Epidemic routing for partially connected ad hoc networks.” Technical Report CS-200006, Duke University, 2000.
13.
R. Wang, Z. Wang, W. Ma, S. Deng, and H. Huang, “Epidemic Routing Performance in DTN with Selfish Nodes,” IEEE Access, vol. PP, pp. 1–1, May 2019, doi: 10.1109/ACCESS.2019.2916685.
14.
T. Spyropoulos, K. Psounis, and C. S. Raghavendra, “Spray and wait: an efficient routing scheme for intermittently connected mobile networks,” in Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking, 2005, pp. 252–259.
15.
A. Lindgren, A. Doria, and O. Schelén, “Probabilistic routing in intermittently connected networks,” ACM SIGMOBILE Mob. Comput. Commun. Rev., vol. 7, no. 3, pp. 19–20, 2003.
16.
C. C. Sobin, “Analyzing the impact of selfishness on probabilistic routing algorithms in Delay Tolerant Networks,” in 2015 International Conference on Computing and Network Communications (CoCoNet), 2015, pp. 186–190.
17.
J. Burgess, B. Gallagher, D. D. Jensen, and B. N. Levine, “MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks.,” in Infocom, 2006, vol. 6.
18.
A. Waqas, “Interference Aware Cooperative Routing Algorithm for Wireless Ad Hoc Networks over Nakagami Fading and Lognormal Shadowing,” Int. J. Comput. Netw. Appl., vol. 3, no. 4, p. 78, Aug. 2016, doi: 10.22247/ijcna/2016/v3/i4/48568.
19.
L. Buttyán, L. Dóra, M. Félegyházi, and I. Vajda, “Barter trade improves message delivery in opportunistic networks,” Ad Hoc Netw., vol. 8, no. 1, pp. 1–14, 2010.
20.
L. Liu, “A survey on barter-based incentive mechanism in opportunistic networks,” in 2013 2nd International Symposium on Instrumentation and Measurement, Sensor Network and Automation (IMSNA), 2013, pp. 365–367.
21.
L. Wei, Z. Cao, and H. Zhu, “Mobigame: A user-centric reputation based incentive protocol for delay/disruption tolerant networks,” in 2011 IEEE Global Telecommunications Conference-GLOBECOM 2011, 2011, pp. 1–5.
22.
F. Gai, J. Zhang, P. Zhu, and X. Jiang, “Trust on the ratee: a trust management system for social internet of vehicles,” Wirel. Commun. Mob. Comput., vol. 2017, 2017.
23.
B. B. Chen and M. C. Chan, “Mobicent: a credit-based incentive system for disruption tolerant network,” in 2010 Proceedings IEEE INFOCOM, 2010, pp. 1–9.
24.
S. A. Ezzahidi, E. Sabir, S. Koulali, and E.-H. Bouyakhf, “Robust fully distributed file caching for delay-tolerant networks: A reward-based incentive mechanism,” Int. J. Distrib. Sens. Netw., vol. 13, no. 4, p. 1550147717700149, 2017.
25.
S. Jain and A. Verma, “Bubble rap incentive scheme for prevention of node selfishness in delay-tolerant networks,” in Smart innovations in communication and computational sciences, Springer, 2019, pp. 289–303.
26.
P. Nagrath, S. Aneja, and G. n. Purohit, “Taxonomy of reputation-based defending mechanisms against types of attacks in delay tolerant networks,” Int. J. Secur. Netw., vol. 16, no. 2, pp. 77–91, Jan. 2021, doi: 10.1504/IJSN.2021.116772.
27.
A. Sharma, N. Goyal, and K. Guleria, “Performance optimization in delay tolerant networks using backtracking algorithm for fully credits distribution to contrast selfish nodes,” J. Supercomput., vol. 77, no. 6, pp. 6036–6055, Jun. 2021, doi: 10.1007/s11227-020-03507-4.
28.
C. ?. ?ahin, S. Gundry, and M. U. Uyar, “Markov chain analysis of self-organizing mobile nodes,” J. Intell. Robot. Syst., vol. 67, no. 2, pp. 133–153, 2012.
29.
https://www.netlab.tkk.fi/tutkimus/dtn/theone/pub/the_one.pdf
30.
R. S. Mangrulkar and M. Atique, “Routing protocol for Delay Tolerant Network: A survey and comparison,” in 2010 International Conference on Communication Control and Computing Technologies, Oct. 2010, pp. 210–215. doi: 10.1109/ICCCCT.2010.5670553.