2018
DOI: 10.1007/978-981-13-0212-1_7
|View full text |Cite
|
Sign up to set email alerts
|

A Reputation-Based Mechanism to Detect Selfish Nodes in DTNs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(9 citation statements)
references
References 12 publications
0
7
0
Order By: Relevance
“…Many security approaches [4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20] employ the watchdog approach to unmask malicious nodes. However, although the use of the watchdog approach allows to detect malicious nodes, it has several limitations [4] and All security approaches using this technique inherit these limitations.…”
Section: Background and Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Many security approaches [4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20] employ the watchdog approach to unmask malicious nodes. However, although the use of the watchdog approach allows to detect malicious nodes, it has several limitations [4] and All security approaches using this technique inherit these limitations.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Reputation-based approaches [4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20] have been proposed to deal with the malicious and selfish behaviors of nodes. They aim to punish nodes refusing to cooperate.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Many security approaches [4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20] employ the watchdog approach to unmask malicious nodes. However, although the use of the watchdog approach allows to detect malicious nodes, it has several limitations [4] and All security approaches using this technique inherit these limitations.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Nodes are stimulated for taking part in the routing process. Sharma et al 40 proposed a reputation‐based scheme to detect selfish and malicious nodes and also stimulates such nodes for cooperation in delay tolerant networks. Cai et al 41 have presented an efficient incentive‐compatible routing protocol (ICRP) for DTNs.…”
Section: Related Workmentioning
confidence: 99%