Open Access Open Access  Restricted Access Subscription Access

A Survey on Various Security Issues in Delay Tolerant Networks

Priya Pathak, Akansha Shrivastava, Sandeep Gupta


Security is one of the major threats in Delay tolerant network (DTN). The DTN communication takes place when if it is in the range of communication. Hence due to this shortcoming there exists possibility of dropping the delivered messages by the selfish or malicious nodes, which result to attacks. Various security attacks such as; black hole, wormhole, grey hole etc. effect the network connectivity as well as increase the delay. Apart from these attacks various open issues are also present namely; key management, routing protocol security, multicast routing etc. These issues have severe effects on the routing protocols. To make secure, reliable communication it is necessary to overcome all these issues. Various schemes have been implemented but none provide a fair solution for these issues. In this paper we have studied these issues, various security threats, security requirements, and characteristics.

Cite this Article
Priya Pathak, Akansha Shrivastava, Sandeep Gupta. A Survey on various security issues in delay tolerant networks. Journal of Advances in Shell Programming. 2015; 2(2): 12–18p.



DTN, security, security threats, attacks

Full Text:



Delphin DS, Prabhu S. Enhanced Techniques to Strengthening DTN against Flood Attacks. Information Communication and Embedded Systems (ICICES), 2014 International Conference, IEEE, Chennai, 2014, 1–4p.

Zhongtian Jia, Muhammad Ali Raffay, Lixiang Li, et al. A Secure Message Delivery Scheme with Path Tracking for Delay Tolerant Networks. 1st IEEE International Conference on Communications in China (ICCC), IEEE, 2012, 161–166p.

Harminder Singh Bindra, Amrit Lal Sangal. Considerations and Open Issues in Delay Tolerant Network’S (DTNs) Security. Wirel Sensor Netw. 2010; 2(8): 645p.

Farrell S, Symington S, Weiss H, et al. Delay Tolerant Networking Security Overview, draft-irtf-dtnrg-sec-overview-03.txt, 2007.

Haojin Zhu. Security in Delay Tolerant Networks. Doctor of Philosophy Thesis, Electrical and Computer Engineering, Waterloo, Ontario, Canada, 2009.

Inadyuti Dutt. Issues in Delay Tolerant Networks: A Comparative Study. Int J Adv Res Comp Sci Softw Eng. June- 2015; 5(6): 534–542p.

Rongxing Lu, Xiaodong Lin, Xuemin (Sherman) Shen. SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks. In Proceedings of IEEE INFOCOM, IEEE, 2010, 632–640p.

Hong Bian, Haizheng Yu. An Efficient Control Method of Multi-copy Routing in DTN. Second International Conference on Networks Security, Wireless Communications and Trusted Computing, IEEE, 2010; 1: 153–156p.

Godwin Ansa, Haitham Criuckshank, Zhili Sun, et al. A DOS-Resilient Design for Delay Tolerant Networks. IEEE, 2011.

Eyuphan Bulut, Boleslaw K. Szymanski. On Secure Multi-copy based Routing in Compromised Delay Tolerant Networks. In Proceedings of the First International Workshop on Privacy, Security and Trust in Mobile and Wireless Systems, IEEE, 2011.

Mohamed Elsalih Mahmoud, Mrinmoy Barua, Xuemin (Sherman) Shen. SATS: Secure Data-Forwarding Scheme for Delay-Tolerant Wireless Networks. Global Telecommunications Conference, IEEE, Houston, TX, USA, 2011, 1–5p.

Zhaoyu Gao, Haojin Zhu, Suguo Du, et al. PMDS: A Probabilistic Misbehavior Detection Scheme in DTN. IEEE, ICC, Ottawa, ON, 2012, 4970–4974p.

Cheng Gong, Wang Bo, Zhao Faru. SIS: Secure Incentive Scheme for Delay Tolerant Networks. 11th International Symposium on Distributed Computing and Applications to Business, Engineering & Science, IEEE, Guilin, 2012, 310–313p.

Roy Cabaniss, Vimal Kumar, Sanjay Madria. Three Point Encryption (3PE)-Secure Communications in Delay Tolerant Networks. 31st International Symposium on Reliable Distributed Systems, IEEE, Irvine, CA, 2012, 479–480p.

Aysha Al Hinai, Haibo Zhang, Yawen Chen. Mitigating Blackhole Attacks in Delay Tolerant Networks. 13th International Conference on Parallel and Distributed Computing, Applications and Technologies. IEEE, Beijing, 2012, 329–334p.

Shirin Ayisha Maryam M, Velayutham R, Kanthavel R. Development of Efficient Security Routing For Delay Tolerant Sensor Networks (DTSNs). IEEE Conference on Information and Communication Technologies, IEEE, JeJu Island, 2013, 1278–1281p.

Devi K, Damodharan P. Detecting Misbehavior Routing and Attacks in Disruption Tolerant Network Using Itrm. International Conference on Current Trends in Engineering and Technology, ICCTET’13. IEEE, Coimbatore, 2013, 334–337p.

Guowei Wu, Jia Wang, Lin Yao, et al. A Secure Social-aware Incentive Scheme for Delay Tolerant Networks. 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, IEEE, Melbourne, VIC 2013, 813–820p.

Amang Sudarsono, Toru Nakanishi. An Implementation of Secure Data Exchange in Wireless Delay Tolerant Network Using Attribute-Based Encryption. Second International Symposium on Computing and Networking. IEEE, Shizuoka, 2014, 536–542p.

Preeti Nagrath, Sandhya Aneja, Purohit GN. Defending Flooding Attack in Delay Tolerant Network. International Conference on Information Networking (ICOIN), IEEE, Cambodia, 2015, 40–45p.

Ying Cai, Yanfang Fan, Ding Wen. An Incentive-Compatible Routing Protocol for Two-hop Delay Tolerant Networks. IEEE T Veh Technol. IEEE, 2015; 99: 1p.


  • There are currently no refbacks.

This site has been shifted to