2010
DOI: 10.1007/978-3-642-14478-3_53
|View full text |Cite
|
Sign up to set email alerts
|

A Trust-Based Detection Algorithm of Selfish Packet Dropping Nodes in a Peer-to-Peer Wireless Mesh Network

Abstract: Abstract. Wireless mesh networks (WMNs) are evolving as a key technology for next-generation wireless networks showing raid progress and numerous applications. These networks have the potential to provide robust and highthroughput data delivery to wireless users. In a WMN, high speed routers equipped with advanced antennas, communicate with each other in a multi-hop fashion over wireless channels and form a broadband backhaul. However, the throughput of a WMN may be severely degraded due to presence of some se… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
3
3
1

Relationship

4
3

Authors

Journals

citations
Cited by 8 publications
(10 citation statements)
references
References 10 publications
0
10
0
Order By: Relevance
“…Sen et al proposed various architecture of complex detection systems based on cooperating agents [52][53][54]. The audit trails in the basic security module (BSM) of a Solaris system was exploited by Endler in designing a hybrid detection system [55]. An ANN-based hybrid detection system for detecting both signature-based and anomaly-based attacks is proposed by Ghosh & Schwartzbard [20].…”
Section: Machine Learning In Hybrid Detectionmentioning
confidence: 99%
“…Sen et al proposed various architecture of complex detection systems based on cooperating agents [52][53][54]. The audit trails in the basic security module (BSM) of a Solaris system was exploited by Endler in designing a hybrid detection system [55]. An ANN-based hybrid detection system for detecting both signature-based and anomaly-based attacks is proposed by Ghosh & Schwartzbard [20].…”
Section: Machine Learning In Hybrid Detectionmentioning
confidence: 99%
“…In (Ozdemir, 2007), a secure and reliable data aggregation scheme -SELDA-is proposed that makes use of the concept of web of trust. Trust and reputation based schemes have been extensively used for designing security solutions for multi-hop wireless networks like mobile ad hoc networks (MANETs), wireless mesh networks (WMNs) and WSNs (Sen, 2010b;Sen, 2010c;Sen 2010d). In this scheme, sensor nodes exchange trust values in their neighborhood to form a web of trust that facilitates in determining secure and reliable paths to aggregators.…”
Section: Deng Et Al Proposed a Collection Of Mechanisms For Securingmentioning
confidence: 99%
“…Ozdemir has proposed a secure and reliable data aggregation scheme that makes use of web of trust among the nodes in a WSN [14]. The concepts of trust and reputation have been extensively used for designing security protocols for multi-hop wireless networks like mobile ad hoc networks (MANETs), wireless mesh networks (WMNs) and WSNs [15,16,17]. In the scheme proposed by Ozdemir, sensor nodes exchange trust values in their neighborhood to form a web of trust that facilitates in determining secure and reliable paths to the aggregator nodes.…”
Section: Cam Et Al Proposed An Energy-efficient Secure Patter-based D...mentioning
confidence: 99%