A social-based watchdog system to detect selfish nodes in opportunistic mobile networks
暂无分享,去创建一个
Sajal K. Das | Feng Xia | Amr Tolba | Behrouz Jedari | Honglong Chen | Zafer Al-Makhadmeh | Sajal K. Das | Amr M. Tolba | Feng Xia | Honglong Chen | Zafer Al-makhadmeh | Behrouz Jedari | S. Das
[1] M. McPherson,et al. Birds of a Feather: Homophily in Social Networks , 2001 .
[2] Xu Chen,et al. Exploiting Social Tie Structure for Cooperative Wireless Networking: A Social Group Utility Maximization Framework , 2016, IEEE/ACM Transactions on Networking.
[3] Pramod K. Varshney,et al. An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs , 2007, IEEE Transactions on Mobile Computing.
[4] Qinghua Li,et al. Mitigating Routing Misbehavior in Disruption Tolerant Networks , 2012, IEEE Transactions on Information Forensics and Security.
[5] Feng Xia,et al. Vehicular Social Networks: Enabling Smart Mobility , 2017, IEEE Communications Magazine.
[6] Thomas F. La Porta,et al. Cooperative data offloading in opportunistic mobile networks , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
[7] Aniket Kate,et al. Anonymity and security in delay tolerant networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[8] Feng Xia,et al. A Cooperative Watchdog System to Detect Misbehavior Nodes in Vehicular Delay-Tolerant Networks , 2015, IEEE Transactions on Industrial Electronics.
[9] Pan Hui,et al. Evaluating the Impact of Social Selfishness on the Epidemic Routing in Delay Tolerant Networks , 2010, IEEE Communications Letters.
[11] P. Jaccard,et al. Etude comparative de la distribution florale dans une portion des Alpes et des Jura , 1901 .
[12] Alex Pentland,et al. Sensing the "Health State" of a Community , 2012, IEEE Pervasive Computing.
[13] Md. Yusuf Sarwar Uddin,et al. Intercontact Routing for Energy Constrained Disaster Response Networks , 2013, IEEE Transactions on Mobile Computing.
[14] Wanlei Zhou,et al. Multidimensional Routing Protocol in Human-Associated Delay-Tolerant Networks , 2013, IEEE Transactions on Mobile Computing.
[15] Feng Xia,et al. A Signaling Game for Uncertain Data Delivery in Selfish Mobile Social Networks , 2016, IEEE Transactions on Computational Social Systems.
[16] Chai Kiat Yeo,et al. Detecting colluding blackhole and greyhole attack in Delay Tolerant Networks , 2016, 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC).
[17] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[18] Jörg Ott,et al. Effect of non-cooperative nodes in mobile DTNs , 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[19] Jörg Ott,et al. The ONE simulator for DTN protocol evaluation , 2009, SIMUTools 2009.
[20] Lars C. Wolf,et al. Detecting blackhole and greyhole attacks in vehicular Delay Tolerant Networks , 2013, 2013 Fifth International Conference on Communication Systems and Networks (COMSNETS).
[21] Jie Wu,et al. Thwarting Blackhole Attacks in Disruption-Tolerant Networks using Encounter Tickets , 2009, IEEE INFOCOM 2009.
[22] Alex Pentland,et al. Reality mining: sensing complex social systems , 2006, Personal and Ubiquitous Computing.
[23] Zhenfu Cao,et al. A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks , 2014 .
[24] Nesrine Chakchouk,et al. A Survey on Opportunistic Routing in Wireless Communication Networks , 2015, IEEE Communications Surveys & Tutorials.
[25] Qinghua Li,et al. A routing protocol for socially selfish delay tolerant networks , 2012, Ad Hoc Networks.
[26] Ciprian Dobre,et al. SENSE: A collaborative selfish node detection and incentive mechanism for opportunistic networks , 2014, J. Netw. Comput. Appl..
[27] Mads Haahr,et al. Social network analysis for routing in disconnected delay-tolerant MANETs , 2007, MobiHoc '07.
[28] Ying Cai,et al. An Incentive-Compatible Routing Protocol for Two-Hop Delay-Tolerant Networks , 2016, IEEE Transactions on Vehicular Technology.
[29] Kevin R. Fall,et al. A delay-tolerant network architecture for challenged internets , 2003, SIGCOMM '03.
[30] Feng Xia,et al. A game-theoretic incentive scheme for social-aware routing in selfish mobile social networks , 2017, Future Gener. Comput. Syst..
[31] Ioannis Stavrakakis,et al. Social Similarity Favors Cooperation: The Distributed Content Replication Case , 2013, IEEE Transactions on Parallel and Distributed Systems.
[32] Juan-Carlos Cano,et al. Evaluation of collaborative selfish node detection in MANETS and DTNs , 2012, MSWiM '12.
[33] Pan Hui,et al. An Empirical Study of Human Altruistic Behaviors in Opportunistic Networks , 2015, HOTPOST '15.
[34] Thrasyvoulos Spyropoulos,et al. Understanding the effects of social selfishness on the performance of heterogeneous opportunistic networks , 2014, Comput. Commun..
[35] Lieguang Zeng,et al. The Impact of Node Selfishness on Multicasting in Delay Tolerant Networks , 2011, IEEE Transactions on Vehicular Technology.
[36] Juan-Carlos Cano,et al. CoCoWa: A Collaborative Contact-Based Watchdog for Detecting Selfish Nodes , 2015, IEEE Transactions on Mobile Computing.
[37] Feng Xia,et al. PIS: A Multi-Dimensional Routing Protocol for Socially-Aware Networking , 2016, IEEE Transactions on Mobile Computing.
[38] Wenmao Liu,et al. Defending sybil attacks in mobile social networks , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[39] Cauligi S. Raghavendra,et al. Spray and wait: an efficient routing scheme for intermittently connected mobile networks , 2005, WDTN '05.
[40] A. Vasilakos,et al. Socially Aware Networking: A Survey , 2013, IEEE Systems Journal.