2006 10th International Conference on Computer Supported Cooperative Work in Design 2006
DOI: 10.1109/cscwd.2006.253072
|View full text |Cite
|
Sign up to set email alerts
|

Analysis and Countermeasure of Selfish Node Problem in Mobile Ad Hoc Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(8 citation statements)
references
References 1 publication
0
8
0
Order By: Relevance
“…An adversary can be planted at a strategic location in the vicinity of the targeted node or nodes that are communicating frequently. Black hole attacking node differs in behavior of 'selfish' node [12] in terms that it does not participate in network activities without considering resource consumption.…”
Section: Black Hole Attackmentioning
confidence: 99%
“…An adversary can be planted at a strategic location in the vicinity of the targeted node or nodes that are communicating frequently. Black hole attacking node differs in behavior of 'selfish' node [12] in terms that it does not participate in network activities without considering resource consumption.…”
Section: Black Hole Attackmentioning
confidence: 99%
“…SORI [13], CineMA [10], TWOACK [4], RIW [1], RIT [24], PCOM [29], CI-DSR [32], and Fellowship [5] are reputation-based schemes, too.…”
Section: Related Workmentioning
confidence: 99%
“…However, these models cannot properly described how dissemination process of information in the real world. For example, in many technological communication network, each node not only acts as source or target but also forwards information to others [14], [15] or selfish node which only save or ignore the information [16]. In information dissemination of social network e.g.…”
Section: Introductionmentioning
confidence: 99%