Simulating opportunistic networks: Survey and future directions

J Dede, A Förster, E Hernández-Orallo… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Simulation is one of the most powerful tools we have for evaluating the performance of
opportunistic networks (OppNets). In this paper, we focus on available tools and models …

Evaluating how smartphone contact tracing technology can reduce the spread of infectious diseases: The case of COVID-19

E Hernández-Orallo, P Manzoni, CT Calafate… - Ieee …, 2020 - ieeexplore.ieee.org
Detecting and controlling the diffusion of infectious diseases such as COVID-19 is crucial to
managing epidemics. One common measure taken to contain or reduce diffusion is to detect …

Selfishness in mobile ad-hoc networks: A literature review on detection techniques and prevention mechanisms

DG Kampitaki, AA Economides - IEEE Access, 2023 - ieeexplore.ieee.org
Constant connectivity is one of the most challenging requirements modern communication
networks promise to satisfy. 5G and Beyond applications and the proliferation of Internet of …

[HTML][HTML] Blockchain-based lightweight trust management in mobile ad-hoc networks

MT Lwin, J Yim, YB Ko - Sensors, 2020 - mdpi.com
As a trending and interesting research topic, in recent years, researchers have been
adopting the blockchain in the wireless ad-hoc environment. Owing to its strong …

Evaluating the effectiveness of COVID-19 Bluetooth-Based smartphone contact tracing applications

E Hernández-Orallo, CT Calafate, JC Cano… - Applied Sciences, 2020 - mdpi.com
One of the strategies to control the spread of infectious diseases is based on the use of
specialized applications for smartphones. These apps offer the possibility, once individuals …

WRHT: a hybrid technique for detection of wormhole attack in wireless sensor networks

R Singh, J Singh, R Singh - Mobile Information Systems, 2016 - Wiley Online Library
Wormhole attack is a challenging security threat to wireless sensor networks which results in
disrupting most of the routing protocols as this attack can be triggered in different modes. In …

Performance optimization in delay tolerant networks using backtracking algorithm for fully credits distribution to contrast selfish nodes

A Sharma, N Goyal, K Guleria - The Journal of Supercomputing, 2021 - Springer
Abstract Delay Tolerant Network (DTN) can be characterized as a heterogeneous network of
nodes in which nodes mobility is high and resources are limited to transmit messages. In …

Collaborative-trust approach toward malicious node detection in vehicular ad hoc networks

S Sultan, Q Javaid, AJ Malik, F Al-Turjman… - Environment …, 2022 - Springer
Malicious node detection in vehicular ad hoc network (VANET) has always been a research
hot spot. An efficient misbehavior detection scheme is needed to avoid and reduce the factor …

A comprehensive taxonomy of schemes to detect and mitigate blackhole attack and its variants in MANETs

N Khanna, M Sachdeva - Computer Science Review, 2019 - Elsevier
Abstract Mobile Ad hoc Network due to its intrinsic properties of mobility, infrastructure-less
working and vulnerability of underlined standard routing protocols is exposed to various …

A social-based watchdog system to detect selfish nodes in opportunistic mobile networks

B Jedari, F **a, H Chen, SK Das, A Tolba… - Future Generation …, 2019 - Elsevier
Detecting selfish nodes in opportunistic mobile networks can reduce the loss of network
resources, thus improve the data delivery performance. Most of existing detection schemes …