2012
DOI: 10.1002/ett.2545
|View full text |Cite
|
Sign up to set email alerts
|

Detection mechanism for reputation‐based selfishness prevention in MANETs

Abstract: Mobile ad‐hoc networks require users to cooperate in the relaying of data. Reputation‐based selfishness prevention mechanisms are aimed at observing the behavior of nodes, and detecting and isolating selfish nodes that might drop packets. Mechanisms are therefore necessary to adequately and rapidly detect cooperative and selfish nodes. This work proposes a novel detection mechanism that outperforms the Bayesian techniques reported to date, and that can better cope with the unknown selfish behavior of nodes.Cop… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2012
2012
2015
2015

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…Consider a routing protocol utilizing ETX and PFI metrics under additive composition approach. As stated in Sections 4.1 and 4.2, the single metrics routing protocols are described by the algebraic tuples (3), (4), and (5).…”
Section: Additive Composition For Etx and Pfi Metricsmentioning
confidence: 99%
See 1 more Smart Citation
“…Consider a routing protocol utilizing ETX and PFI metrics under additive composition approach. As stated in Sections 4.1 and 4.2, the single metrics routing protocols are described by the algebraic tuples (3), (4), and (5).…”
Section: Additive Composition For Etx and Pfi Metricsmentioning
confidence: 99%
“…Focusing on network layer attacks , a “malicious” node may refuse to forward all or part of the received traffic towards the destination (issuing a black‐hole or gray‐hole (GH) attack, respectively). Because of the security threats form a long list , the research community introduced several security countermeasures (e.g., ). Most solutions available in literature try to secure network connectivity using traditional security techniques, such as encryption and key management, as exploited in for Universal Mobile Telecommunications System (UMTS) systems.…”
Section: Introductionmentioning
confidence: 99%
“…In the best case, this could result in lower effective vehicular density, and in the worst case, it could result in disturbances in the network behaviour. We intend to study the problem of selfish, or even malicious, nodes in vehicular networks .…”
Section: Discussionmentioning
confidence: 99%