2013 International Conference on Current Trends in Engineering and Technology (ICCTET) 2013
DOI: 10.1109/icctet.2013.6676000
|View full text |Cite
|
Sign up to set email alerts
|

Fully selfish node detection, deletion and secure replica allocation over MANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…The detection rate is also confirmed to be superior than the compared evidence and cooperation enforcing approaches. A Secure Reputation Assisting Fully Selfish Node detection (SRA-FSND) is propounded for evaluating the influence of partial and fully selfish nodes [18]. This SRA-FSND scheme proves to focus on the Secure Hill Cipher Technique (SHCT) for ensuring effective memory space utilization in the network.…”
Section: Related Workmentioning
confidence: 99%
“…The detection rate is also confirmed to be superior than the compared evidence and cooperation enforcing approaches. A Secure Reputation Assisting Fully Selfish Node detection (SRA-FSND) is propounded for evaluating the influence of partial and fully selfish nodes [18]. This SRA-FSND scheme proves to focus on the Secure Hill Cipher Technique (SHCT) for ensuring effective memory space utilization in the network.…”
Section: Related Workmentioning
confidence: 99%
“…Muthumalathi and Raseen [17] present to limit execution degradation. In the event that the nodes in MANET consists of adequate memory space for holding imitations and also some of the nodes act as the simple form and also chosen to collaborate with each other.…”
Section: Related Workmentioning
confidence: 99%
“…e authors proposed an efficient replica allocation to detect partial selfishness in the network, and the novel can help the replica allocation technique deal with partial selfishness [17,[73][74][75][76].…”
Section: Hybrid and Specification Mechanismmentioning
confidence: 99%
“…During updating the matrices, nodes can modify behavior that observers apply based on the behavior of the nodes in the matrix of its overall reputation. e reputation matrix of the entire grid is then published by observers in the relevant monitoring area so that local nodes ICARUS [72] Replica-methods [17,[73][74][75][76] Two-phases methods [77] QOS-OLSR [78] Automatedmethods [79] RCM [80] SDM [81] Green-approach [82] Smart-method [83] CoCowa [84] TEEM [18] Conjectural based Framework [85] reputationbased epidemic [86] Token-Based [34] RRR [87] can use it for reliable selection. Suppose the node's reputation value is less than the threshold reputation.…”
Section: Hybrid and Specification Mechanismmentioning
confidence: 99%