7,747 Hits in 4.6 sec

DST-Based Detection of Non-cooperative Forwarding Behavior of MANET and WSN Nodes [chapter]

Jerzy Konorski, Rafal Orlikowski
2009 IFIP Advances in Information and Communication Technology  
Selfish node behavior can diminish the reliability of a mobile ad hoc network (MANET) or a wireless sensor network (WSN). Efficient detection of such behavior is therefore essential.  ...  One approach is to construct a reputation scheme, which has network nodes determine and share reputation values associated with each node; these values can next be used as input to a routing algorithm  ...  Scheme (SORI) [10] , Observation-based Cooperation Enforcement in Ad Hoc Networks (OCEAN) [11] , Reputation-based Mechanism for Isolating Selfish Nodes in Ad Hoc Networks [12] , Locally Aware Reputation  ... 
doi:10.1007/978-3-642-03841-9_17 fatcat:rqud5x6kvngg7kvcu6wuwxmn3e

An Efficient Risk-Aware Distributed Control System to Minimize Routing Attacks on MANET

Swati M. Dahekar, Yogesh Bhute
2015 Journal of advance research in computer science & enigneering  
The topological nature of MANET(Mobile Ad-hoc Network) itself demands high security due to its mobility movement, but designing a risk aware routing path for MANET is a complex task because of its Dynamic  ...  Its show how an intelligent adversary can mount a node capture attack using vulnerability evaluation to focus the attack on the nodes which contribute maximally to the compromise of network traffic.  ...  Nadeem, Reputation management systems have been proposed as a cooperation enforcement solution in ad-hoc networks.  ... 
doi:10.53555/nncse.v2i3.457 fatcat:52dom5ogqjf4dn7nn72f2creum

RTDSR protocol for channel attacks prevention in mobile ad hoc ambient intelligence home networks

S.A. Akinbor, E.A. Olajubu, I.K. Ogundoyin, G.A. Aderounmu
2018 Nigerian Journal of Technology  
The protocol adopted the observation based cooperation enforcement in ad hoc networks (oceans) and collaborative reputation mechanism built on Dynamic Source Routing (DSR) protocol.  ...  It also ensures that data path with high reputation are used for data routing and a monitoring watchdog was introduced to ensure that the next node forward the packet properly.  ...  The proposed RTDSR protocol uses the idea of observation based cooperation enforcement in ad hoc network protocol and collaborative reputation mechanism built on dynamic source routing (DSR) protocol.  ... 
doi:10.4314/njt.v37i2.28 fatcat:6af6lbzurbfv7hzgh4zjrdjj2a

Secure Cooperation in Autonomous Mobile Ad-Hoc Networks Under Noise and Imperfect Monitoring: A Game-Theoretic Approach

Wei Yu, K.J. Ray Liu
2008 IEEE Transactions on Information Forensics and Security  
In autonomous mobile ad-hoc networks, one major challenge is to stimulate cooperation among selfish nodes, especially when some nodes may be malicious.  ...  Instead of trying to enforce all nodes to act fully cooperatively, our goal is to stimulate cooperation in a hostile environment as much as possible through playing conditional altruism.  ...  , and usually it is impossible to find a strategy to enforce all nodes to play fully cooperatively in static ad-hoc networks.  ... 
doi:10.1109/tifs.2008.922453 fatcat:2go2zpj3jjg5xibu66q2xsnxvu

When reputation enforces evolutionary cooperation in unreliable MANETs [article]

Changbing Tang, Ang Li, Xiang Li
2014 arXiv   pre-print
In self-organized mobile ad hoc networks (MANETs), network functions rely on cooperation of self-interested nodes, where a challenge is to enforce their mutual cooperation.  ...  In addition, the network throughput performance of our proposed strategy in structured MANETs is measured, which is in close agreement with that of the full cooperative strategy.  ...  ACKNOWLEDGEMENTS The authors were grateful to Yue-Dong Xu, Zhong-Hua Yang and Bin Wu for their helpful discussions and valuable suggestions.  ... 
arXiv:1411.0198v1 fatcat:d35w54iyf5dxvbgu2tsqr3c3de

Enhancing cooperation in MANET using neighborhood compressive sensing model

Mohammad Amir Khusru Akhtar, Gadadhar Sahoo
2016 Egyptian Informatics Journal  
This work is the extended version of Reduction in Resource Consumption to enhance cooperation in MANET using Compressive Sensing (Akhtar and Sahoo, 2015) [68].  ...  The use of compressive sensing gives the reduction in resource consumption because it reduces the amount of transmitting data in the network.  ...  Usmani, HOD (CSE) of Cambridge Institute of Technology, Tatisilwai, Ranchi, who have always encouraged us in our research.  ... 
doi:10.1016/j.eij.2016.06.007 fatcat:xzrvzjnnvjewpaasbktkknfx7u

Encouraging Cooperative Interaction among Network Entities [chapter]

Sonja Buchegger, John Chuang
2007 Cognitive Wireless Networks  
and mobile ad-hoc networks that have neither central authorities nor infrastructure to allow cooperation-less functioning.  ...  We then give an overview over such incentives devised to elicit cooperation from network nodes, such as reputation, payment, barter or enforcement systems and mechanism design and discuss challenges arising  ...  Another hurdle to cooperation in the incentive mechanism itself such as a detection and reputation system in mobile ad-hoc networks is that when a node enforces compliance with an incentive system by,  ... 
doi:10.1007/978-1-4020-5979-7_5 fatcat:np6ufngp7zetvmsxakl67qz73m

Survey of Trust Models in Different Network Domains

Mohammad Momani, Subhash Challa
2010 International Journal of Ad Hoc, Sensor and Ubiquitous Computing  
A survey of trust and reputation systems in various domains is conducted, with more details given to models in ad-hoc and sensor networks as they are closely related to each other and to our research interests  ...  This paper introduces the security and trust concepts in wireless sensor networks and explains the difference between them, stating that even though both terms are used interchangeably when defining a  ...  an ad-hoc network.  ... 
doi:10.5121/ijasuc.2010.1301 fatcat:ohc7chbkfnhnvm4cftchq3b7be

Survey of trust models in different network domains [article]

Mohammad Momani, Subhash Challa
2010 arXiv   pre-print
A survey of trust and reputation systems in various domains is conducted, with more details given to models in ad-hoc and sensor networks as they are closely related to each other and to our research interests  ...  This paper introduces the security and trust concepts in wireless sensor networks and explains the difference between them, stating that even though both terms are used interchangeably when defining a  ...  an ad-hoc network.  ... 
arXiv:1010.0168v1 fatcat:ygatwov3efby3ovr7am5xfleam

Reputation- and Trust-Based Systems for Wireless Self-organizing Networks [article]

Jaydip Sen
2012 arXiv   pre-print
such as mobile ad hoc networks and wireless sensor networks.  ...  Reputation-based frameworks, where nodes maintain reputation of other nodes and use it to evaluate their trustworthiness, are deployed to provide scalable, diverse and a generalized approach for countering  ...  Collaborative Reputation Mechanism in Mobile Ad Hoc Networks COllaborative REputation mechanism to enforce node cooperation in mobile ad hoc networks (CORE) was proposed by Mirchiardi and Molva to enforce  ... 
arXiv:1110.0146v2 fatcat:q2mxf6mkf5hy5b3fgfymliekyq

Gaussian Trust Factor-based Grey Decision Making Technique (GTF-GDMT) for Node Cooperation Enforcement in MANETs

Srinivasulu Sirisala, SVU College of CM&CS, S Krishna, SVU College of CM&CS
2021 International Journal of Intelligent Engineering and Systems  
The successful routing in Mobile Ad hoc Networks (MANETs) completely depends on the cooperation established between the mobile nodes during data dissemination.  ...  and packet drop independent to the number of mobile nodes and malicious nodes in the network.  ...  Srinivasulu has performed the simulation conducted using ns-2.34 network simulator under the supervision of S. Ramakrishna.  ... 
doi:10.22266/ijies2021.1031.15 fatcat:2cmlglvedfex5fcfnxou4r3way

Reputation System Based Trust-Enabled Routing for Wireless Sensor Networks [chapter]

A. R.
2012 Wireless Sensor Networks - Technology and Protocols  
Enforce Node Cooperation in Mobile Ad Hoc Networks) [5] .  ...  (Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks) [5] .  ... 
doi:10.5772/50736 fatcat:cdyl4gvtwbh5nem2z5vgb3oy3q

A Review on Trust and Security by using Intrusion Detection System in Mobile Ad Hoc Network

Rammurti Gupta,
2017 International Journal Of Engineering And Computer Science  
In this network, nodes communicate wirelessly which makes securing a mobile ad -hoc network is very challenging.  ...  Ad-hoc networking can also be applied wherever the place there's little or no conversation infrastructure or the existing infrastructure is highpriced or inconvenient to use.  ...  Ship-to-ship ad hoc mobile dispatch, law enforcement, et cetera. C.  ... 
doi:10.18535/ijecs/v6i5.09 fatcat:yt6wlsfmnbg2vhz7iopvskuuvm

Sybil-Resistant Meta Strategies for the Forwarder's Dilemma

Yunus Durmus, Andreas Loukas, Ertan Onur, Koen Langendoen
2014 2014 IEEE Eighth International Conference on Self-Adaptive and Self-Organizing Systems  
Furthermore, in ad hoc networks identity is a fuzzy concept. It is easy to forge multiple identities and hide defective behavior.  ...  Researchers have tried to incentivize or enforce the nodes for cooperation in various ways.  ...  ACKNOWLEDGMENTS This work was supported by the Trans-sector Research Academy for complex Networks and Services (TRANS) project.  ... 
doi:10.1109/saso.2014.21 dblp:conf/saso/DurmusLOL14 fatcat:rmqscikkfjgnnh2is3wfhaqvja

An MPS-BNS Mixed Strategy Based on Game Theory for Wireless Mesh Networks

S. Q. Huang, G. C. Wang, H. H. Zhen, Z. Zhang
2013 The Scientific World Journal  
To achieve a valid effect of wireless mesh networks against selfish nodes and selfish behaviors in the packets forwarding, an approach named mixed MPS-BNS strategy is proposed in this paper.  ...  beginning with a low cooperation level.  ...  Komathy and Narayanasamy [26] pointed out that there were four basic methods using game theory to defend sel�sh nodes in an ad hoc network. is paper is to discuss the �rst and third ones.  ... 
doi:10.1155/2013/936536 pmid:23401672 pmcid:PMC3562672 fatcat:ygfshw7xcref5jd5wro3ijmwiu
« Previous Showing results 1 — 15 out of 7,747 results