IEEE Wireless Communications and Networking Conference, 2005
DOI: 10.1109/wcnc.2005.1424848
|View full text |Cite
|
Sign up to set email alerts
|

TWOAK: preventing selfishness in mobile ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
120
0

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 137 publications
(121 citation statements)
references
References 7 publications
0
120
0
Order By: Relevance
“…The Author In [3] his paper TWOACK scheme to detect misbehaving links by acknowledging every data packet transmitted over each three consecutive nodes along the path from the source to the destination.…”
Section: Literature Surveymentioning
confidence: 99%
“…The Author In [3] his paper TWOACK scheme to detect misbehaving links by acknowledging every data packet transmitted over each three consecutive nodes along the path from the source to the destination.…”
Section: Literature Surveymentioning
confidence: 99%
“…Previously proposed methods for addressing the misbehavior problem can be classified into three categories: (a) credit-based systems, e.g., [8,9,16,34], (b) reputation-based systems, e.g., [6,7,13,14,21,22], and (c) acknowledgment-based systems, e.g., [1,2,20,23].…”
Section: Related Workmentioning
confidence: 99%
“…Acknowledgment-Based Systems: Acknowledgment-based systems [1,2,20,23] rely on the reception of acknowledgments to verify that a message was forwarded to the next hop. Liu et al [20] proposed the 2ACK scheme, where nodes explicitly send acknowledgments two hops upstream to verify cooperation.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations