2018
DOI: 10.2478/acss-2018-0015
|View full text |Cite
|
Sign up to set email alerts
|

A Credit-based Method to Selfish Node Detection in Mobile Ad-hoc Network

Abstract: Ad-hoc networks are a set of mobile nodes that are connected via a wireless channel. Some of the nodes in this network behave selfishly and do not send data to other nodes so that in order to increase network performance these nodes must be identified. A credit-based algorithm is proposed to detect the selfish nodes. Three watchdog nodes are selected to monitor suspicious nodes in each cluster. The cluster head nodes detect the existence of selfish nodes by controlling general features of network, such as dela… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
18
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(20 citation statements)
references
References 29 publications
1
18
0
Order By: Relevance
“…The presented approach combines a packet formulation model and its trading approach. Similar work has been found in the studies of [22] [23], where credit-based intrusion detection modeling formulation is mostly considered.…”
Section: Related Worksupporting
confidence: 63%
“…The presented approach combines a packet formulation model and its trading approach. Similar work has been found in the studies of [22] [23], where credit-based intrusion detection modeling formulation is mostly considered.…”
Section: Related Worksupporting
confidence: 63%
“…It also lacks energy efficiency, but the throughput performance is found entirely satisfactory. The authors in [20]- [22] also directed their research in a similar direction. The credit-based incentive mechanism refers to a policy where the node gets encouragement to route the data packets at a specific cost attribute.…”
Section: Global Reputation Systemmentioning
confidence: 96%
“…The approach is proposed to detect the selfish nodes in the network using Nuglets [16]. It is the combination of a packet purse model (PPM) and a packet trade model (PTM) by the credit-based approaches [17,18]. A credit-based approach called SPRIT (s simple, cheat-proof, credit-based system) is presented to stimulate the nodes to cooperate with other nodes [19].…”
Section: Related Workmentioning
confidence: 99%
“…The other group of strategies discover the selfish and malicious nodes in the credit-based methods in which the nodes should pay the cost to send the data packets and/or the nodes trade the data packet and sell it at a higher price when they have purchased a packet. Collision attack, lack of punishment, and incentives are the disadvantages of these methods [16][17][18][19][20][21][22] ( Table 1). The acknowledgment-based methods guarantee to send a packet of a node by using an acknowledgment message.…”
Section: Introductionmentioning
confidence: 99%