2011
DOI: 10.1016/j.comcom.2010.04.040
|View full text |Cite
|
Sign up to set email alerts
|

A hierarchical architecture for detecting selfish behaviour in community wireless mesh networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2012
2012
2014
2014

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(9 citation statements)
references
References 13 publications
0
7
0
Order By: Relevance
“…As a security sub-problem in wireless mesh networks, the reputation evaluation mechanism has been widely studied in recent years [15][16][17][18][19]. Compared with the static reputation model, the dynamic reputation model, which is evaluated based on the node's experience, may be more suitable for the security requirement in wireless mesh networks because of the complex environment and the diversified and unpredictable security problems found in wireless mesh networks.…”
Section: Introductionmentioning
confidence: 99%
“…As a security sub-problem in wireless mesh networks, the reputation evaluation mechanism has been widely studied in recent years [15][16][17][18][19]. Compared with the static reputation model, the dynamic reputation model, which is evaluated based on the node's experience, may be more suitable for the security requirement in wireless mesh networks because of the complex environment and the diversified and unpredictable security problems found in wireless mesh networks.…”
Section: Introductionmentioning
confidence: 99%
“…This mechanism leads to large memory consumption. Sungwon Yi et al [15] introduced a two-level cache Content Addressable Memory (CAM) to dynamically detect and quarantine the unresponsive TCP flows [18]. But it leads to large memory comsumption.…”
Section: Related Workmentioning
confidence: 99%
“…As an alternative, to achieve high detection rates while conserving resources on resource-constrained WMN nodes, cooperative IDS solutions [12,13] have been proposed. In cooperative IDS solutions (e.g., hierarchical [12,[30][31][32], groupbased [33][34][35], zone-based [36], or neighbor-assisted [37,38]) every node is assigned a few IDS functions to detect attacks based on local observation.…”
Section: State Of the Artmentioning
confidence: 99%
“…In cooperative IDS solutions (e.g., hierarchical [12,[30][31][32], groupbased [33][34][35], zone-based [36], or neighbor-assisted [37,38]) every node is assigned a few IDS functions to detect attacks based on local observation. A cooperative IDS engine is then employed for detecting more attacks, based on neighbor information [13,38].…”
Section: State Of the Artmentioning
confidence: 99%
See 1 more Smart Citation