TY - JOUR AU - AB - In this paper will discuss and examine message transmission from the attacker process within the scope of Delay Tolerance Networks (DTNs). DTNs are a new area of research that can be developed in networking. Delay-tolerant networks are those networks that may not have a complete path between networks end-to-end via direct links and may be under development for a long time. As part of the improvement, we will compare a survey of DTN routing protocols with a real region area, and then taking into account the possibilities of detecting the presence of areas of weakness that lead to penetration, which will occur in the nodes while on the move. In this study, we will use the ONE simulator to track messages within nodes Keywords: cyber security, DTN network, routing protocol, attacks 1. Introduction Personal devices have a communication by voice and data when using mobile phone or laptop in ad-hoc networks, since the mobile devices are virtually always turned on and have radio interfaces, processor, data storage and battery usage. These points will make local connectivity among devices. However, in this case ad-hoc networks usually cannot support this kind of connectivity by using TCP/IP connection because of movement of TI - Monitor Potential Attack Locations in a Specific Area within DTN Network JO - Computer and Information Science DO - 10.5539/cis.v14n2p42 DA - 2021-03-16 UR - https://www.deepdyve.com/lp/unpaywall/monitor-potential-attack-locations-in-a-specific-area-within-dtn-sJQ7drboaD DP - DeepDyve ER -