Selfishness in mobile ad-hoc networks: A literature review on detection techniques and prevention mechanisms
Constant connectivity is one of the most challenging requirements modern communication
networks promise to satisfy. 5G and Beyond applications and the proliferation of Internet of …
networks promise to satisfy. 5G and Beyond applications and the proliferation of Internet of …
CoCoWa: A collaborative contact-based watchdog for detecting selfish nodes
E Hernandez-Orallo, MDS Olmos… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
Mobile ad-hoc networks (MANETs) assume that mobile nodes voluntary cooperate in order
to work properly. This cooperation is a cost-intensive activity and some nodes can refuse to …
to work properly. This cooperation is a cost-intensive activity and some nodes can refuse to …
[PDF][PDF] International journal of advanced research in computer science and software engineering
AB Angadi, AB Angadi, KC Gull - International Journal, 2013 - academia.edu
Relational database management systems (RDMBSs) today are the predominant
technology for storing. In the past few years, the” one size fits all “-thinking concerning …
technology for storing. In the past few years, the” one size fits all “-thinking concerning …
Trust based intrusion detection technique to detect selfish nodes in mobile ad hoc networks
The applications and protocols conceived for mobile ad hoc networks rely on the
assumption of cooperation amongst the mobile nodes because of lacking infrastructure. All …
assumption of cooperation amongst the mobile nodes because of lacking infrastructure. All …
An energy efficient cluster head selection technique using network trust and swarm intelligence
R Juliana, P Uma Maheswari - Wireless Personal Communications, 2016 - Springer
Wireless sensor networks (WSN) have started appearing in our daily life including home,
office, industry and vehicles to name a few. The incremental usage of WSN for …
office, industry and vehicles to name a few. The incremental usage of WSN for …
An energy-saving forwarding mechanism based on clustering for opportunistic networks
In Opportunistic Networks (OppNets), mobility of and contact between nodes are explored to
create communication opportunities and exchange messages and information. A basic …
create communication opportunities and exchange messages and information. A basic …
Detection of selfish & malicious behavior using dtn-chord monitoring in mobile networks
SAM Benazir, V Umarani - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
In mobile network, data nodes are distributed among the clusters. Mobile ad-hoc networks
(MANETs) are an encouraging solution to establish communication for emergency response …
(MANETs) are an encouraging solution to establish communication for emergency response …
[PDF][PDF] An improved token-based umpiring technique for detecting and eliminating selfish nodes in mobile ad-hoc networks
Mobile Ad hoc network (MANET) performance, is dependent on the participation of network
nodes to forward packets efficiently due to its decentralized control architecture. A node may …
nodes to forward packets efficiently due to its decentralized control architecture. A node may …
[PDF][PDF] Comparison of on demand routing protocols
A routing protocol is used to facilitate communication in ad hoc network. The primary goal of
such a routing protocol is to provide an efficient and reliable path between a pair of nodes …
such a routing protocol is to provide an efficient and reliable path between a pair of nodes …
A detailed survey on selfish node detection techniques for mobile ad hoc networks
Due to the limited transmission capability of mobile nodes in mobile ad hoc networks
(MANETs), the intermediate nodes are used in multi-hop fashion for forwarding the packets …
(MANETs), the intermediate nodes are used in multi-hop fashion for forwarding the packets …