2017
DOI: 10.1007/s11277-017-4677-2
|View full text |Cite
|
Sign up to set email alerts
|

Co-operation Enforcing Reputation-Based Detection Techniques and Frameworks for Handling Selfish Node Behaviour in MANETs: A Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 20 publications
0
10
0
Order By: Relevance
“…In this case, the flow outgoing of a specific node indicates positive outranking flow and aids in estimating the dominant behavior of one mobile node over other alternative mobile nodes in terms of cooperation degree rendered by them during the process of data dissemination. In this outranking math model, the flow entering an alternative is determined based on Equation (10).…”
Section: Promothee-i-based Partial Rankingmentioning
confidence: 99%
See 2 more Smart Citations
“…In this case, the flow outgoing of a specific node indicates positive outranking flow and aids in estimating the dominant behavior of one mobile node over other alternative mobile nodes in terms of cooperation degree rendered by them during the process of data dissemination. In this outranking math model, the flow entering an alternative is determined based on Equation (10).…”
Section: Promothee-i-based Partial Rankingmentioning
confidence: 99%
“…In this context, the trust-based security routing algorithms are identified to facilitate minimized overhead with its computational complexity reduced by 0.9 time lesser than the cryptographic algorithms available in the literature. 10 Majority of the works in the literature assume that the mobile nodes interacting in the network are trustworthy, thereby the cryptographic algorithmic models considered for securing the network mobile nodes are considered to be irrational. Moreover, the existence of malicious nodes in MANETs is visualized as a serious security threat as it largely introduces negative influence on the network performance to an unexpected level.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In this phase, information related to the block name is recorded in the “user block collection” based on information derived from the participants of the transaction 30,31 . The steps involved in the construction of user block collection are presented as follows.…”
Section: The Proposed Rs‐imtmcb‐pir Schemementioning
confidence: 99%
“…11 The malicious nodes completely hide themselves from being detected and isolated from the routing path of the network. 12 In this context, the mobile nodes need to be monitored through direct (interacting with the mobile nodes) and indirect observations (interacting with the neighboring mobile nodes of the node being monitored) for identifying their malicious and selfish behavior. 13 Hence, the detection of malicious and selfish mobile nodes becomes necessary for sustaining the degree of cooperation among them.…”
Section: Introductionmentioning
confidence: 99%