4.6 Article

Counteracting Selfish Nodes Using Reputation Based System in Mobile Ad Hoc Networks

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Enhanced MANET security using artificial immune system based danger theory to detect selfish nodes

Lincy E. Jim et al.

Summary: This paper presents an artificial immune system-based security method for Mobile Ad Hoc Networks (MANETs), which simulates the mechanism of the human immune system. The proposed method, called Artificial Immune System Based Algorithm (AISBA), selects selfish nodes in MANETs and includes two different trust models. The bio inspired approach achieves an average detection rate of 93.41% and outperforms the well known SAODV protocol in terms of packet delivery ratio and detection rate.

COMPUTERS & SECURITY (2022)

Article Telecommunications

Defending Against Smart Grayhole Attack Within MANETs: A Reputation-Based Ant Colony Optimization Approach for Secure Route Discovery in DSR Protocol

Kaoutar Ourouss et al.

Summary: This paper addresses the smart grayhole attack in Mobile Adhoc Networks by monitoring node behavior with a bio-inspired trust management model. The proposed model utilizes the beta reputation system and Ant Colony Optimization to evaluate node trustworthiness and isolate malicious nodes. Simulation results show that the reputation-based ACO DSR (RACODSR) outperforms the standard DSR protocol in terms of various performance metrics.

WIRELESS PERSONAL COMMUNICATIONS (2021)

Article Engineering, Electrical & Electronic

Analysis on cascading robustness of energy-balanced scale-free wireless sensor networks

Ye Wang et al.

Summary: This paper proposes a novel scale-free topology evolution model that improves network load balancing and develops a practical cascading model for WSNs. Experimental results demonstrate promising performance in both energy balancing and network robustness. Additionally, increasing the average path length of the network or deploying the sink node in close proximity to the network center can enhance WSNs' resilience against cascading failure.

AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS (2021)

Article Computer Science, Information Systems

Modeling and analyzing cascading failures for Internet of Things

Xiuwen Fu et al.

Summary: The study proposed a realistic cascading model based on the layered architecture of IoTs, and presented a load-oriented layout scheme for base stations to improve network survivability. Experiment results verified the validity of the model, showing a tolerance parameter space for capacity expansion of network components, the higher likelihood of triggering cascading failures by removing base stations, and the significant improvement in network survivability by deploying more base stations.

INFORMATION SCIENCES (2021)

Article Mathematics, Interdisciplinary Applications

An Efficient and Secure Session Key Management Scheme in Wireless Sensor Network

Gulzar Mehmood et al.

Summary: Wireless Sensor Networks face challenges of energy consumption and security, and the development of robust security is crucial. Cryptography techniques are favorable for security in WSN, but energy efficiency is key due to resource limitations. A secure hybrid session key management scheme has been proposed to minimize energy consumption and ensure optimal security by reducing public key cryptography steps.

COMPLEXITY (2021)

Article Computer Science, Artificial Intelligence

Environment-fusion multipath routing protocol for wireless sensor networks

Xiuwen Fu et al.

INFORMATION FUSION (2020)

Article Automation & Control Systems

Secure opinion sharing for reputation-based systems in mobile ad hoc networks

Abdur Rashid Sangi et al.

MEASUREMENT & CONTROL (2020)

Article Computer Science, Information Systems

An Energy-Efficient and Cooperative Fault-Tolerant Communication Approach for Wireless Body Area Network

Gulzar Mehmood et al.

IEEE ACCESS (2020)

Article Engineering, Electrical & Electronic

Selfish node detection based on hierarchical game theory in IoT

Solmaz Nobahary et al.

EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING (2019)

Article Computer Science, Hardware & Architecture

A novel trust management scheme based on Dempster-Shafer evidence theory for malicious nodes detection in wireless sensor networks

Wei Zhang et al.

JOURNAL OF SUPERCOMPUTING (2018)

Article Computer Science, Hardware & Architecture

Acknowledgment-based punishment and stimulation scheme for mobile ad hoc network

Mahdi Bounouni et al.

JOURNAL OF SUPERCOMPUTING (2018)

Article Engineering, Electrical & Electronic

Federated Internet of Things and Cloud Computing Pervasive Patient Health Monitoring System

Jemal H. Abawajy et al.

IEEE COMMUNICATIONS MAGAZINE (2017)

Article Computer Science, Information Systems

A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV

Fatih Sakiz et al.

AD HOC NETWORKS (2017)

Review Computer Science, Hardware & Architecture

Cooperation stimulation mechanisms for wireless multihop networks: A survey

Normalia Samian et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2015)

Article Computer Science, Information Systems

On the evaluation of reputation and trust-based schemes in mobile ad hoc networks

Sohail Abbas et al.

SECURITY AND COMMUNICATION NETWORKS (2015)

Article Telecommunications

Opportunistic Routing in Presence of Selfish Nodes for MANET

Sandeep A. Thorat et al.

WIRELESS PERSONAL COMMUNICATIONS (2015)

Article Computer Science, Information Systems

Stimulating truth-telling and cooperation among nodes in VANETs through payment and punishment scheme

Auxeeliya Jesudoss et al.

AD HOC NETWORKS (2015)

Article Engineering, Electrical & Electronic

Mobile Ad Hoc Networking: Milestones, Challenges, and New Research Directions

Marco Conti et al.

IEEE COMMUNICATIONS MAGAZINE (2014)

Article Computer Science, Information Systems

FESCIM: Fair, Efficient, and Secure Cooperation Incentive Mechanism for Multihop Cellular Networks

Mohamed M. E. A. Mahmoud et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2012)

Article Computer Science, Information Systems

Mitigating Packet Dropping Problem in Mobile Ad Hoc Networks: Proposals and Challenges

Soufiene Djahel et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2011)

Article Engineering, Electrical & Electronic

An Integrated Stimulation and Punishment Mechanism for Thwarting Packet Dropping Attack in Multihop Wireless Networks

Mohamed Elsalih Mahmoud et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2011)

Article Computer Science, Information Systems

Node cooperation in hybrid ad hoc networks

N Ben Salem et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2006)