2019
DOI: 10.1016/j.future.2017.10.049
|View full text |Cite
|
Sign up to set email alerts
|

A social-based watchdog system to detect selfish nodes in opportunistic mobile networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
21
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 45 publications
(21 citation statements)
references
References 38 publications
0
21
0
Order By: Relevance
“…In this scheme monitoring nodes are used to properly monitor the behaviors of the nodes in the network and nodes are encouraged for cooperation. Jedari et al 38 proposed So‐Watch (Social Watchdog) system that uses a reputation scheme that identifies the number of selfish nodes and the level of selfishness. Kou et al 39 proposed a strict reward and punishment model to tackled the issue of selfishness.…”
Section: Related Workmentioning
confidence: 99%
“…In this scheme monitoring nodes are used to properly monitor the behaviors of the nodes in the network and nodes are encouraged for cooperation. Jedari et al 38 proposed So‐Watch (Social Watchdog) system that uses a reputation scheme that identifies the number of selfish nodes and the level of selfishness. Kou et al 39 proposed a strict reward and punishment model to tackled the issue of selfishness.…”
Section: Related Workmentioning
confidence: 99%
“…In Jedari et al, a reputation‐based scheme is proposed to handle selfish behavior by using watchdog nodes in opportunistic mobile networks. Specifically, a reputation system is designed, where the watchdog nodes update the reputation of other nodes based on the direct and indirect watchdog information for identifying selfish nodes in the network.…”
Section: Related Workmentioning
confidence: 99%
“…There are equal chances of nodes to leave the connected domain due to their dynamic behavior. The authority assignment for trust evaluation is also partially based on the model used for comparisons as given in Jedari et al (2019). As far as the utilization of network's node degree is concerned, the degree of nodes keeps on changing due to the continuously evolving pattern of the network.…”
Section: Introductionmentioning
confidence: 99%
“…Most of the network modeling and its analysis afterward is done over static networks (Jung et al, 2013, Thilakarathna et al, 2013, Thilakarathna et al, 2016, Zhou et al, 2018, which is unrealistic. Also, the degree of nodes in the network may reflect malicious behavior as stated in (Jedari et al, 2019;Rebecchi, 2014). Such a situation arises in social networks when some terminal node exhibits the property of structural holes in a network.…”
Section: Introductionmentioning
confidence: 99%