2014
DOI: 10.1016/j.compeleceng.2013.05.005
|View full text |Cite
|
Sign up to set email alerts
|

A new dynamic hierarchical reputation evaluation scheme for hybrid wireless mesh networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 21 publications
0
8
0
Order By: Relevance
“…For the first part of the formula, every link in a path should compute a value of CBT, and the computing time of CBT in a whole path is n-1. For the second part, the regional energy-consumed condition is computed as equation (4) at every node in a path. The computation complexity of this process depends on formula (3).…”
Section: Computation Complexity Of Remamentioning
confidence: 99%
See 1 more Smart Citation
“…For the first part of the formula, every link in a path should compute a value of CBT, and the computing time of CBT in a whole path is n-1. For the second part, the regional energy-consumed condition is computed as equation (4) at every node in a path. The computation complexity of this process depends on formula (3).…”
Section: Computation Complexity Of Remamentioning
confidence: 99%
“…Hybrid WMN combines advantages of infrastructure WMN and client WMN, which has stronger network connectivity, higher reliability, and larger coverage. 4,5 Its structure is quite more flexible and closer to actual demand than infrastructure WMN or client WMN. 6 In hybrid WMN, mesh routers have high capacity and stability, while mesh clients have limited energy and high mobility.…”
Section: Introductionmentioning
confidence: 99%
“…where CD i captures the intra-flow interference and can be computed from (2). The cumulative congestion CG i operating on channel C i can be computed as (3), and it reflects the interference and traffic load.…”
Section: Related Workmentioning
confidence: 99%
“…Hybrid WMNs consist of relatively static mesh routers which form the backbone of the network and mobile clients. Mobile clients can act as a dynamic extension of the backbone network by implementing routing functionality, and improve the connectivity and coverage inside the WMNs [2], [3]. In this paper, we mainly focus our research on hybrid WMNs.…”
Section: Introductionmentioning
confidence: 99%
“… Black Mailing Attacks: A malicious node can black mail another node by propagating false information that the other node is malicious, which can disrupt the network's normal operation and consume network's precious resources [22].  Replay Attacks: a malicious node can resend old packets as if they are new ones they could be very destructive if these packets are old routing information, which will make all nodes are unreachable [23].  Selective Misbehavior Attacks: a misbehaving node can select when and to whom it misbehaves [21].…”
Section: Trust Metric Characteristicsmentioning
confidence: 99%