A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
DST-Based Detection of Non-cooperative Forwarding Behavior of MANET and WSN Nodes
[chapter]
2009
IFIP Advances in Information and Communication Technology
Selfish node behavior can diminish the reliability of a mobile ad hoc network (MANET) or a wireless sensor network (WSN). Efficient detection of such behavior is therefore essential. ...
One approach is to construct a reputation scheme, which has network nodes determine and share reputation values associated with each node; these values can next be used as input to a routing algorithm ...
Scheme (SORI) [10] , Observation-based Cooperation Enforcement in Ad Hoc Networks (OCEAN) [11] , Reputation-based Mechanism for Isolating Selfish Nodes in Ad Hoc Networks [12] , Locally Aware Reputation ...
doi:10.1007/978-3-642-03841-9_17
fatcat:rqud5x6kvngg7kvcu6wuwxmn3e
An Efficient Risk-Aware Distributed Control System to Minimize Routing Attacks on MANET
2015
Journal of advance research in computer science & enigneering
The topological nature of MANET(Mobile Ad-hoc Network) itself demands high security due to its mobility movement, but designing a risk aware routing path for MANET is a complex task because of its Dynamic ...
Its show how an intelligent adversary can mount a node capture attack using vulnerability evaluation to focus the attack on the nodes which contribute maximally to the compromise of network traffic. ...
Nadeem, Reputation management systems have been proposed as a cooperation enforcement solution in ad-hoc networks. ...
doi:10.53555/nncse.v2i3.457
fatcat:52dom5ogqjf4dn7nn72f2creum
RTDSR protocol for channel attacks prevention in mobile ad hoc ambient intelligence home networks
2018
Nigerian Journal of Technology
The protocol adopted the observation based cooperation enforcement in ad hoc networks (oceans) and collaborative reputation mechanism built on Dynamic Source Routing (DSR) protocol. ...
It also ensures that data path with high reputation are used for data routing and a monitoring watchdog was introduced to ensure that the next node forward the packet properly. ...
The proposed RTDSR protocol uses the idea of observation based cooperation enforcement in ad hoc network protocol and collaborative reputation mechanism built on dynamic source routing (DSR) protocol. ...
doi:10.4314/njt.v37i2.28
fatcat:6af6lbzurbfv7hzgh4zjrdjj2a
Secure Cooperation in Autonomous Mobile Ad-Hoc Networks Under Noise and Imperfect Monitoring: A Game-Theoretic Approach
2008
IEEE Transactions on Information Forensics and Security
In autonomous mobile ad-hoc networks, one major challenge is to stimulate cooperation among selfish nodes, especially when some nodes may be malicious. ...
Instead of trying to enforce all nodes to act fully cooperatively, our goal is to stimulate cooperation in a hostile environment as much as possible through playing conditional altruism. ...
, and usually it is impossible to find a strategy to enforce all nodes to play fully cooperatively in static ad-hoc networks. ...
doi:10.1109/tifs.2008.922453
fatcat:2go2zpj3jjg5xibu66q2xsnxvu
When reputation enforces evolutionary cooperation in unreliable MANETs
[article]
2014
arXiv
pre-print
In self-organized mobile ad hoc networks (MANETs), network functions rely on cooperation of self-interested nodes, where a challenge is to enforce their mutual cooperation. ...
In addition, the network throughput performance of our proposed strategy in structured MANETs is measured, which is in close agreement with that of the full cooperative strategy. ...
ACKNOWLEDGEMENTS The authors were grateful to Yue-Dong Xu, Zhong-Hua Yang and Bin Wu for their helpful discussions and valuable suggestions. ...
arXiv:1411.0198v1
fatcat:d35w54iyf5dxvbgu2tsqr3c3de
Enhancing cooperation in MANET using neighborhood compressive sensing model
2016
Egyptian Informatics Journal
This work is the extended version of Reduction in Resource Consumption to enhance cooperation in MANET using Compressive Sensing (Akhtar and Sahoo, 2015) [68]. ...
The use of compressive sensing gives the reduction in resource consumption because it reduces the amount of transmitting data in the network. ...
Usmani, HOD (CSE) of Cambridge Institute of Technology, Tatisilwai, Ranchi, who have always encouraged us in our research. ...
doi:10.1016/j.eij.2016.06.007
fatcat:xzrvzjnnvjewpaasbktkknfx7u
Encouraging Cooperative Interaction among Network Entities
[chapter]
2007
Cognitive Wireless Networks
and mobile ad-hoc networks that have neither central authorities nor infrastructure to allow cooperation-less functioning. ...
We then give an overview over such incentives devised to elicit cooperation from network nodes, such as reputation, payment, barter or enforcement systems and mechanism design and discuss challenges arising ...
Another hurdle to cooperation in the incentive mechanism itself such as a detection and reputation system in mobile ad-hoc networks is that when a node enforces compliance with an incentive system by, ...
doi:10.1007/978-1-4020-5979-7_5
fatcat:np6ufngp7zetvmsxakl67qz73m
Survey of Trust Models in Different Network Domains
2010
International Journal of Ad Hoc, Sensor and Ubiquitous Computing
A survey of trust and reputation systems in various domains is conducted, with more details given to models in ad-hoc and sensor networks as they are closely related to each other and to our research interests ...
This paper introduces the security and trust concepts in wireless sensor networks and explains the difference between them, stating that even though both terms are used interchangeably when defining a ...
an ad-hoc network. ...
doi:10.5121/ijasuc.2010.1301
fatcat:ohc7chbkfnhnvm4cftchq3b7be
Survey of trust models in different network domains
[article]
2010
arXiv
pre-print
A survey of trust and reputation systems in various domains is conducted, with more details given to models in ad-hoc and sensor networks as they are closely related to each other and to our research interests ...
This paper introduces the security and trust concepts in wireless sensor networks and explains the difference between them, stating that even though both terms are used interchangeably when defining a ...
an ad-hoc network. ...
arXiv:1010.0168v1
fatcat:ygatwov3efby3ovr7am5xfleam
Reputation- and Trust-Based Systems for Wireless Self-organizing Networks
[article]
2012
arXiv
pre-print
such as mobile ad hoc networks and wireless sensor networks. ...
Reputation-based frameworks, where nodes maintain reputation of other nodes and use it to evaluate their trustworthiness, are deployed to provide scalable, diverse and a generalized approach for countering ...
Collaborative Reputation Mechanism in Mobile Ad Hoc Networks COllaborative REputation mechanism to enforce node cooperation in mobile ad hoc networks (CORE) was proposed by Mirchiardi and Molva to enforce ...
arXiv:1110.0146v2
fatcat:q2mxf6mkf5hy5b3fgfymliekyq
Gaussian Trust Factor-based Grey Decision Making Technique (GTF-GDMT) for Node Cooperation Enforcement in MANETs
2021
International Journal of Intelligent Engineering and Systems
The successful routing in Mobile Ad hoc Networks (MANETs) completely depends on the cooperation established between the mobile nodes during data dissemination. ...
and packet drop independent to the number of mobile nodes and malicious nodes in the network. ...
Srinivasulu has performed the simulation conducted using ns-2.34 network simulator under the supervision of S. Ramakrishna. ...
doi:10.22266/ijies2021.1031.15
fatcat:2cmlglvedfex5fcfnxou4r3way
Reputation System Based Trust-Enabled Routing for Wireless Sensor Networks
[chapter]
2012
Wireless Sensor Networks - Technology and Protocols
Enforce Node Cooperation in Mobile Ad Hoc Networks) [5] . ...
(Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks) [5] . ...
doi:10.5772/50736
fatcat:cdyl4gvtwbh5nem2z5vgb3oy3q
A Review on Trust and Security by using Intrusion Detection System in Mobile Ad Hoc Network
2017
International Journal Of Engineering And Computer Science
In this network, nodes communicate wirelessly which makes securing a mobile ad -hoc network is very challenging. ...
Ad-hoc networking can also be applied wherever the place there's little or no conversation infrastructure or the existing infrastructure is highpriced or inconvenient to use. ...
Ship-to-ship
ad hoc mobile dispatch, law enforcement, et cetera.
C. ...
doi:10.18535/ijecs/v6i5.09
fatcat:yt6wlsfmnbg2vhz7iopvskuuvm
Sybil-Resistant Meta Strategies for the Forwarder's Dilemma
2014
2014 IEEE Eighth International Conference on Self-Adaptive and Self-Organizing Systems
Furthermore, in ad hoc networks identity is a fuzzy concept. It is easy to forge multiple identities and hide defective behavior. ...
Researchers have tried to incentivize or enforce the nodes for cooperation in various ways. ...
ACKNOWLEDGMENTS This work was supported by the Trans-sector Research Academy for complex Networks and Services (TRANS) project. ...
doi:10.1109/saso.2014.21
dblp:conf/saso/DurmusLOL14
fatcat:rmqscikkfjgnnh2is3wfhaqvja
An MPS-BNS Mixed Strategy Based on Game Theory for Wireless Mesh Networks
2013
The Scientific World Journal
To achieve a valid effect of wireless mesh networks against selfish nodes and selfish behaviors in the packets forwarding, an approach named mixed MPS-BNS strategy is proposed in this paper. ...
beginning with a low cooperation level. ...
Komathy and Narayanasamy [26] pointed out that there were four basic methods using game theory to defend sel�sh nodes in an ad hoc network. is paper is to discuss the �rst and third ones. ...
doi:10.1155/2013/936536
pmid:23401672
pmcid:PMC3562672
fatcat:ygfshw7xcref5jd5wro3ijmwiu
« Previous
Showing results 1 — 15 out of 7,747 results