2017 2nd International Conference on Computing and Communications Technologies (ICCCT) 2017
DOI: 10.1109/iccct2.2017.7972268
|View full text |Cite
|
Sign up to set email alerts
|

An integrated game theoretical approach to detect misbehaving nodes in MANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
8
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(13 citation statements)
references
References 12 publications
0
8
0
Order By: Relevance
“…A controlled identical mechanism of game and also another game theory modeling to detect and isolate malicious nodes are evaluated by the studies of [29] and [30], respectively. Both the studies concluded their research scope into futuristic dynamic IoT networks.…”
Section: Related Workmentioning
confidence: 99%
“…A controlled identical mechanism of game and also another game theory modeling to detect and isolate malicious nodes are evaluated by the studies of [29] and [30], respectively. Both the studies concluded their research scope into futuristic dynamic IoT networks.…”
Section: Related Workmentioning
confidence: 99%
“…The routing task confirmation step is done when the source node is routed to the destination node by using the DSR method. A new routing task is assigned by the middle relay node to the new node, and this assignment confirmation should be created for it, which is assumed by the hash function as a signature function by the supervisor in the verification phase [20]. The proposed mechanism is a multi-phase method based on reputation and game theory for stimulation of cooperation between selfish nodes in the internet of things, and this mechanism has been designed in three phases including setup and clustering, sending data and playing a multi-person game, and update and detecting selfish and malicious nodes.…”
Section: -Related Workmentioning
confidence: 99%
“…In the game theory methods, each node plays a role as players in the game, which are interacting with each other and design the game and its profits to send the data packets. These methods have a higher false positive rate, and the average end to end delay is more than other methods [19][20][21]. Another group of selfish nodes detection and recognition methods in the network is hybrid and specified methods.…”
Section: -Introductionmentioning
confidence: 99%
“…The payoff of wireless stations is based on the individual power of each station. Vijayakumaran et al proposed a novel detection of the selfish node, which consists of two phases [31]. The generation phase includes routing task confirmation phase and the routing-report generation phase, and coordination-confirmation report generation phase.…”
Section: Related Workmentioning
confidence: 99%
“…Game theorybased approaches take advantage of the incentive mechanisms through payoffs and have lower false-positive rate and overhead (time, supervisory, hardware) compared to the other aforementioned methods in the network to detect the selfish and malicious nodes. However, the prior game theory-based methods have less throughput and more end-to-end delay, and the proposed methods attempt to increase these parameters [28][29][30][31].…”
Section: Introductionmentioning
confidence: 99%