2007
DOI: 10.1109/tmc.2007.1036
|View full text |Cite
|
Sign up to set email alerts
|

An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
239
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 368 publications
(239 citation statements)
references
References 19 publications
0
239
0
Order By: Relevance
“…In [4] the author invented 2ACK scheme which works like TWOACK with differences i) The data packet receiving node sends 2ACK packets as acknowledgment for a fraction of received data packets, while, in the TWOACK scheme, TWOACK packets are sent for every data packet received. Acknowledging a fraction of received data packets gives the 2ACK scheme better performance with respect to routing overhead.…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…In [4] the author invented 2ACK scheme which works like TWOACK with differences i) The data packet receiving node sends 2ACK packets as acknowledgment for a fraction of received data packets, while, in the TWOACK scheme, TWOACK packets are sent for every data packet received. Acknowledging a fraction of received data packets gives the 2ACK scheme better performance with respect to routing overhead.…”
Section: Literature Surveymentioning
confidence: 99%
“…In [5] the author proposed Adaptive ACKnowledgment (AACK) scheme. The AACK is a network layer acknowledgment based scheme that may be considered as a combined system of an Enhanced-TWOACK (E-TWOACK), which detects misbehaving node instead of misbehaving link and an end-to end acknowledgment scheme, to reduce the routing overhead of TWOACK.…”
Section: Literature Surveymentioning
confidence: 99%
“…Previously proposed methods for addressing the misbehavior problem can be classified into three categories: (a) credit-based systems, e.g., [8,9,16,34], (b) reputation-based systems, e.g., [6,7,13,14,21,22], and (c) acknowledgment-based systems, e.g., [1,2,20,23].…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, in hostile environments, an adversary may compromise several nodes and configure them to misbehave. It has been shown that even a small fraction of misbehaving nodes refusing to relay packets, can lead to a significant drop in the overall network performance [6,7,20,21]. In this paper, we address the problem of developing resource-efficient methods for identifying nodes that refuse to collaborate in relaying packets.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation