The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2018 International Symposium on Programming and Systems (ISPS) 2018
DOI: 10.1109/isps.2018.8379006
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive credit-based stimulation scheme for dealing with smart selfish nodes in mobile ad hoc network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…Over the decades, a diversified number of selfish and malicious node detection mechanism was propounded in the literature based on the merits of watchdog, acknowledgement, incentives, reputation coefficients, game theory and Multi-Attribute Decision Making (MADM). 15 In the recent years, game theory and MADM-based malicious and selfish node detection mechanisms are identified to be highly predominant for maintaining the degree of cooperation among mobile nodes and preventing network degradation. 16 The contributions of MADM techniques such as Multi-Objective Optimization by Ratio Analysis (MOORA), Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS), Simple Additive Weighting (SAW), Preference Ranking Organization Method for Enrichment Evaluation (PROMETHEE), and Complex Proportional Assessment Method (COPRAS) motivate the possibility of formulating a COPRAS-based selfish and malicious node detection and isolation.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Over the decades, a diversified number of selfish and malicious node detection mechanism was propounded in the literature based on the merits of watchdog, acknowledgement, incentives, reputation coefficients, game theory and Multi-Attribute Decision Making (MADM). 15 In the recent years, game theory and MADM-based malicious and selfish node detection mechanisms are identified to be highly predominant for maintaining the degree of cooperation among mobile nodes and preventing network degradation. 16 The contributions of MADM techniques such as Multi-Objective Optimization by Ratio Analysis (MOORA), Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS), Simple Additive Weighting (SAW), Preference Ranking Organization Method for Enrichment Evaluation (PROMETHEE), and Complex Proportional Assessment Method (COPRAS) motivate the possibility of formulating a COPRAS-based selfish and malicious node detection and isolation.…”
Section: Introductionmentioning
confidence: 99%
“…Over the decades, a diversified number of selfish and malicious node detection mechanism was propounded in the literature based on the merits of watchdog, acknowledgement, incentives, reputation coefficients, game theory and Multi‐Attribute Decision Making (MADM) 15 . In the recent years, game theory and MADM‐based malicious and selfish node detection mechanisms are identified to be highly predominant for maintaining the degree of cooperation among mobile nodes and preventing network degradation 16 .…”
Section: Introductionmentioning
confidence: 99%