2012
DOI: 10.1002/dac.1388
|View full text |Cite
|
Sign up to set email alerts
|

Outwitting smart selfish nodes in wireless mesh networks

Abstract: SUMMARYSelfish nodes are nodes that are reluctant to forward packets for others in wireless mesh networks. One of the effective techniques to remove them is to share the information of identified selfish nodes in the network. However, most selfish node detection schemes rarely address the trustworthiness of their shared information in the network. It turns devastating if smart selfish nodes are able to manipulate the shared information. We propose a detection framework named Separation of Detection Authority, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…It introduces a robust multi-agent and multi-layer game-based approach to identify both the selfish ( ) and malicious nodes ( ) and minimizes the possibilities of attacks in IoT communication layers. The security model is constructed based on the combined paradigm of reputation-based strategy [13] and game theory modeling [14]. The prime reason behind adopting these strategies is that various research approaches in the IoT security domain directed their research approach with these strategies.…”
Section: Introductionmentioning
confidence: 99%
“…It introduces a robust multi-agent and multi-layer game-based approach to identify both the selfish ( ) and malicious nodes ( ) and minimizes the possibilities of attacks in IoT communication layers. The security model is constructed based on the combined paradigm of reputation-based strategy [13] and game theory modeling [14]. The prime reason behind adopting these strategies is that various research approaches in the IoT security domain directed their research approach with these strategies.…”
Section: Introductionmentioning
confidence: 99%
“…We consider this an important step toward error detection systems with the possibility of variable trade‐off, so that trade‐off between error detection performance and energy cost can reflect current operational needs. With recent developments in the context of the ‘Internet of Things’ , increased dissemination of wireless sensor networks may be expected and error/behavior detection and fault tolerance are essential .…”
Section: Introductionmentioning
confidence: 99%
“…In a MANET, a number of mobile devices communicate with each other without any fixed infrastructure or central authority. A detection framework called separation of detection authority was proposed in [4] for detecting selfish nodes on MANETs. However, many applications need secured communication [1].…”
Section: Introductionmentioning
confidence: 99%
“…Authors in [3] proposed a two-layer INS concept to secure routing protocols. A detection framework called separation of detection authority was proposed in [4] for detecting selfish nodes on MANETs. Malicious attacks can be launched at any layer of the Open Systems Interconnection protocol models: physical layer like physical signal jamming, data link layer like affecting the medium access control operation, network layer by attacking the routing and data forwarding, or application layer for targeting one particular type of application.…”
Section: Introductionmentioning
confidence: 99%