2005
DOI: 10.1007/978-3-540-30496-8_13
|View full text |Cite
|
Sign up to set email alerts
|

Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
50
0

Year Published

2007
2007
2023
2023

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 88 publications
(52 citation statements)
references
References 14 publications
0
50
0
Order By: Relevance
“…We use the concept of a 'position cheating detection system' similar to intrusion detection systems in MANETs, for example, Reference [20]. In these systems, every node uses multiple algorithms (so-called sensors) to detect malicious or selfish behavior of other nodes in the network.…”
Section: Position Verification Approachmentioning
confidence: 99%
“…We use the concept of a 'position cheating detection system' similar to intrusion detection systems in MANETs, for example, Reference [20]. In these systems, every node uses multiple algorithms (so-called sensors) to detect malicious or selfish behavior of other nodes in the network.…”
Section: Position Verification Approachmentioning
confidence: 99%
“…Faulty links are given decreased rating and are consequently avoided. Just and Kranakis [18] and Kargl et al [19] proposed schemes for detecting selfish or malicious nodes in an ad hoc network. The schemes involve probing mechanisms which are similar in functionality to that of Awerbuch et al [6] above Patwardhan and Lorga [20] presented a secure routing protocol called Sec AODV.…”
Section: Schemes Which Employ Detection and Isolation Mechanismsmentioning
confidence: 99%
“…Accordingly, we need to require that node i can reliably observe the actions of node j; see, e.g., [19], [30] for details about how to obtain this information.…”
Section: A Single Stagementioning
confidence: 99%