Establishing Trust by Detecting Malicious Nodes in Delay Tolerant Network | IEEE Conference Publication | IEEE Xplore