2006 IEEE International Conference on Communications 2006
DOI: 10.1109/icc.2006.254994
|View full text |Cite
|
Sign up to set email alerts
|

Modeling and Analysis of Connectivity in Mobile Ad Hoc Networks with Misbehaving Nodes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
32
0

Year Published

2007
2007
2016
2016

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 42 publications
(32 citation statements)
references
References 11 publications
0
32
0
Order By: Relevance
“…Since every node is autonomous, it needs to decide how to act in the network by itself. Considering the potential impacts of various misbehaviors, we extend the geometric random graph model aforementioned by introducing an additional assumption that all nodes operate independently in the following five states [7], [8]:…”
Section: Node Classificationmentioning
confidence: 99%
See 3 more Smart Citations
“…Since every node is autonomous, it needs to decide how to act in the network by itself. Considering the potential impacts of various misbehaviors, we extend the geometric random graph model aforementioned by introducing an additional assumption that all nodes operate independently in the following five states [7], [8]:…”
Section: Node Classificationmentioning
confidence: 99%
“…Then, the probability that a node occupies a specific grid, denoted by p, is very small. With large N and small p, the node distribution can be modeled by the Poisson distribution [7], [8]:…”
Section: (I) Poisson Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…Also the Ping-Pong effect caused due to unnecessary handoff has been reduced. However in practice, all the mobile nodes in the network are not cooperative, but can be in other states like failed state, selfish state or malicious state [20][21]. In [22], a five node network model is developed to consider all the four states, namely, cooperative state, failed state, selfish state and malicious state in calculating the handover probability, UHP, MHP and WDP considering BW as performance metric.…”
Section: Introductionmentioning
confidence: 99%