The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2018
DOI: 10.1007/s11227-018-2434-2
|View full text |Cite
|
Sign up to set email alerts
|

Acknowledgment-based punishment and stimulation scheme for mobile ad hoc network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
16
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 12 publications
(16 citation statements)
references
References 22 publications
0
16
0
Order By: Relevance
“…If a source node does not receive an acknowledgment message, it is taken as a misbehavior node [16,17]. In 2018, Mahdi Bounouni et al proposed an acknowledgment-based method to discover malicious and selfish nodes [18]. The proposed approach consists of four models for punishing malicious nodes and stimulating selfish nodes to cooperate with other nodes.…”
Section: -Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…If a source node does not receive an acknowledgment message, it is taken as a misbehavior node [16,17]. In 2018, Mahdi Bounouni et al proposed an acknowledgment-based method to discover malicious and selfish nodes [18]. The proposed approach consists of four models for punishing malicious nodes and stimulating selfish nodes to cooperate with other nodes.…”
Section: -Related Workmentioning
confidence: 99%
“…Credit based approaches trade data packets between nodes in the business network; the lack of encouragement and punishment of cooperation and selfish nodes is the disadvantage of these categories [13][14][15]. Acknowledgment messages are sent from destination nodes in acknowledgment based methods in the different approaches presented in this group due to the transmission of authentication packets, network traffic, and the average end to end delay to the result in increased data packets and network efficiency have decreased [16][17][18]. In the game theory methods, each node plays a role as players in the game, which are interacting with each other and design the game and its profits to send the data packets.…”
Section: -Introductionmentioning
confidence: 99%
“…Each of the three EAACK sections uses a digitally signed digital signature and retrieves the message. Bounouni et al proposed an approach consists of four models [26]. The monitoring model is responsible for controlling the sending of routing packets and data packets by using the acknowledgment packet.…”
Section: Related Workmentioning
confidence: 99%
“…In these methods, the throughput is low; it suffers from the collusion of the selfish and malicious nodes; it has high overhead (communicative, data packet, etc.) and end-to-end delay increases in the network due to the high traffic generated by the acknowledgment messages [23][24][25][26]. Another method to detect selfish nodes is game theory-based methods.…”
Section: Introductionmentioning
confidence: 99%
“…Otherwise, the communication is done based on the cooperation of intermediate nodes (Multi-hop communication). Then, to deliver correctly data packets, the cooperation of intermediate nodes is essential and critical [1][2][3], which is not easy to guarantee due to the specific's characteristics of MANET, such as the open wireless medium and dynamic topology. In a real world, nodes could adopt a malicious behavior, being unwilling to drop data packet destined to be forwarded in order to disrupt the well-functioning of network operations.…”
Section: Introductionmentioning
confidence: 99%