2019
DOI: 10.3837/tiis.2019.12.023
|View full text |Cite
|
Sign up to set email alerts
|

Thwarting Sybil Attackers in Reputation-based Scheme in Mobile Ad hoc Networks

Abstract: Routing in mobile ad hoc networks is performed in a distributed fashion where each node acts as host and router, such that it forwards incoming packets for others without relying on a dedicated router. Nodes are mostly resource constraint and the users are usually inclined to conserve their resources and exhibit selfish behaviour by not contributing in the routing process. The trust and reputation models have been proposed to motivate selfish nodes for cooperation in the packet forwarding process. Nodes having… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 41 publications
0
2
0
Order By: Relevance
“…Reputation and trust mechanism is a kind of soft security method [ 23 , 24 ]. Soft security usually refers to the use of social or group methods to restrict and control individual behavior, while hard security mainly refers to traditional security methods such as authentication mechanism and authorization mechanism.…”
Section: Reputation and Trust Mechanismmentioning
confidence: 99%
“…Reputation and trust mechanism is a kind of soft security method [ 23 , 24 ]. Soft security usually refers to the use of social or group methods to restrict and control individual behavior, while hard security mainly refers to traditional security methods such as authentication mechanism and authorization mechanism.…”
Section: Reputation and Trust Mechanismmentioning
confidence: 99%
“…Reputation and trust-based solutions: in the literature, reputation and trust based schemes, such as [22,23,44], have been proposed for selfish node detection. One of the main concerns regarding using these solutions is the unnecessary incurred overhead, as pointed by [25].…”
Section: Suggested Improvementsmentioning
confidence: 99%