A Credit-based Method to Selfish Node Detection in Mobile Ad-hoc Network
暂无分享,去创建一个
[1] Stefan Stieglitz,et al. Challenges of MANET for Mobile Social Networks , 2011, ANT/MobiWIS.
[2] Sana Ullah,et al. A Green Approach for Selfish Misbehavior Detection in 802.11-Based Wireless Networks , 2015, Mobile Networks and Applications.
[3] Benxiong Huang,et al. COSR: A Reputation-Based Secure Route Protocol in MANET , 2010, EURASIP J. Wirel. Commun. Netw..
[4] Amaresh Kumar,et al. Detection of Selfish and Malicious Node in Mobile Ad-Hoc Network with NS-2 Using Chord Algorithm , 2017 .
[5] S. V. Kasmir Raja,et al. Stimulating truth-telling and cooperation among nodes in VANETs through payment and punishment scheme , 2015, Ad Hoc Networks.
[6] Haiying Shen,et al. Game-Theoretic Analysis of Cooperation Incentive Strategies in Mobile Ad Hoc Networks , 2012, IEEE Transactions on Mobile Computing.
[7] K. Komathy,et al. A Probabilistic Behavioral Model for Selfish Neighbors in a Wireless Ad Hoc Network , 2007 .
[8] Juan-Carlos Cano,et al. TEEM: Trust-based Energy-Efficient Distributed Monitoring for Mobile Ad-hoc Networks , 2017, 2017 Wireless Days.
[9] Sam Jabbehdari,et al. A Novel Distributed Clustering Algorithm for Mobile Ad-hoc Networks , 2008 .
[10] Muhammad Irfan,et al. Mobile Ad-Hoc Networks Applications and Its Challenges , 2016 .
[11] Youyun Xu,et al. Distributed relay selection over multi-source and multi-relay wireless cooperative networks with selfish nodes , 2010, Comput. Commun..
[12] Chandrima Chakrabarti,et al. An observer-based distributed scheme for selfish-node detection in a post-disaster communication environment using delay tolerant network , 2014, 2014 Applications and Innovations in Mobile Computing (AIMoC).
[13] Koushik Majumder,et al. Selfish Node Detection and Low Cost Data Transmission in MANET using Game Theory , 2015 .
[14] Zul Azri,et al. Modeling Stochastic Correlated Node Behavior for Survivability in Ad Hoc Networks , 2013 .
[15] Nadeem Javaid,et al. Fuzzy-Based Trust Model for Detection of Selfish Nodes in MANETs , 2016, 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA).
[16] Eitan Altman,et al. A Controlled Matching Game for WLANs , 2017, IEEE Journal on Selected Areas in Communications.
[17] Yin Zhang,et al. Incentive-aware routing in DTNs , 2008, 2008 IEEE International Conference on Network Protocols.
[18] Martin Schütte. Detecting Selfish and Malicious Nodes in MANETs , 2006 .
[19] Winston Khoon Guan Seah,et al. Cooperation stimulation mechanisms for wireless multihop networks: A survey , 2015, J. Netw. Comput. Appl..
[20] Tamer Abdelkader,et al. Detecting selfish nodes and motivating cooperation in Mobile Ad-hoc Networks , 2015, 2015 Tenth International Conference on Computer Engineering & Systems (ICCES).
[21] K. Komathy,et al. Best neighbor strategy to enforce cooperation among selfish nodes in wireless ad hoc network , 2007, Comput. Commun..
[22] J. Singhai,et al. Enhanced node cooperation technique for outwitting selfish nodes in an ad hoc network , 2015, IET Networks.
[23] R. Ahmad,et al. Epidemic Modeling for Correlated Node Behavior in Ad Hoc Networks , 2013 .
[24] Omar Abdel Wahab,et al. A cooperative watchdog model based on Dempster-Shafer for detecting misbehaving vehicles , 2014, Comput. Commun..
[25] Janakiraman Sengathir,et al. A futuristic trust coefficient-based semi-Markov prediction model for mitigating selfish nodes in MANETs , 2015, EURASIP J. Wirel. Commun. Netw..
[26] Burairah Hussin,et al. Correlated Node Behavior Model based on Semi Markov Process for MANETS , 2012, ArXiv.
[27] Ciprian Dobre,et al. SENSE: A collaborative selfish node detection and incentive mechanism for opportunistic networks , 2014, J. Netw. Comput. Appl..
[28] Chetan Nimje,et al. A review on node activity detection, selfish & malicious behavioral patterns using watchdog algorithm , 2017, 2017 International Conference on Inventive Systems and Control (ICISC).
[29] Abderrahmane Lakas,et al. Detection of intelligent malicious and selfish nodes in VANET using threshold adaptive control , 2016, 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA).
[30] Prabir Bhattacharya,et al. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. IEEE TRANSACTIONS ON DEPEDABLE AND SECURE COMPUTING 1 Mechanism Design-Based Secure Leader Elec , 2022 .
[31] Sheng Zhong,et al. Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[32] S. Shinde,et al. A Comparative Study of Selfish Node Detection Methods in Manet , 2015 .
[33] Kaushika Patel,et al. Effective Utilization of Bandwidth for Mobile Ad Hoc Network , 2016 .
[34] Rutvij H. Jhaveri,et al. Various schemes to detect selfishness in wireless ad-hoc networks: A survey , 2015, 2015 International Conference on Green Computing and Internet of Things (ICGCIoT).
[35] D. Arivazhagan,et al. Applications, Advantages and Challenges of Ad Hoc Networks , 2014 .