Selfishness in mobile ad-hoc networks: A literature review on detection techniques and prevention mechanisms

DG Kampitaki, AA Economides - IEEE Access, 2023 - ieeexplore.ieee.org
Constant connectivity is one of the most challenging requirements modern communication
networks promise to satisfy. 5G and Beyond applications and the proliferation of Internet of …

CoCoWa: A collaborative contact-based watchdog for detecting selfish nodes

E Hernandez-Orallo, MDS Olmos… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
Mobile ad-hoc networks (MANETs) assume that mobile nodes voluntary cooperate in order
to work properly. This cooperation is a cost-intensive activity and some nodes can refuse to …

[PDF][PDF] International journal of advanced research in computer science and software engineering

AB Angadi, AB Angadi, KC Gull - International Journal, 2013 - academia.edu
Relational database management systems (RDMBSs) today are the predominant
technology for storing. In the past few years, the” one size fits all “-thinking concerning …

Trust based intrusion detection technique to detect selfish nodes in mobile ad hoc networks

S Kumar, K Dutta - Wireless Personal Communications, 2018 - Springer
The applications and protocols conceived for mobile ad hoc networks rely on the
assumption of cooperation amongst the mobile nodes because of lacking infrastructure. All …

An energy efficient cluster head selection technique using network trust and swarm intelligence

R Juliana, P Uma Maheswari - Wireless Personal Communications, 2016 - Springer
Wireless sensor networks (WSN) have started appearing in our daily life including home,
office, industry and vehicles to name a few. The incremental usage of WSN for …

An energy-saving forwarding mechanism based on clustering for opportunistic networks

G Santos, D Soares, C Carvalho, E Mota - Sensors, 2021 - mdpi.com
In Opportunistic Networks (OppNets), mobility of and contact between nodes are explored to
create communication opportunities and exchange messages and information. A basic …

Detection of selfish & malicious behavior using dtn-chord monitoring in mobile networks

SAM Benazir, V Umarani - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
In mobile network, data nodes are distributed among the clusters. Mobile ad-hoc networks
(MANETs) are an encouraging solution to establish communication for emergency response …

[PDF][PDF] An improved token-based umpiring technique for detecting and eliminating selfish nodes in mobile ad-hoc networks

K Susan, C Konyeha, AM John-Otumu… - Egyptian Computer …, 2020 - researchgate.net
Mobile Ad hoc network (MANET) performance, is dependent on the participation of network
nodes to forward packets efficiently due to its decentralized control architecture. A node may …

[PDF][PDF] Comparison of on demand routing protocols

B Bhushan, S Gupta, CK Nagpal - International Journal of Information …, 2013 - Citeseer
A routing protocol is used to facilitate communication in ad hoc network. The primary goal of
such a routing protocol is to provide an efficient and reliable path between a pair of nodes …

A detailed survey on selfish node detection techniques for mobile ad hoc networks

S Kumar, K Dutta, G Sharma - 2016 Fourth International …, 2016 - ieeexplore.ieee.org
Due to the limited transmission capability of mobile nodes in mobile ad hoc networks
(MANETs), the intermediate nodes are used in multi-hop fashion for forwarding the packets …