2014
DOI: 10.1504/ijict.2014.063223
|View full text |Cite
|
Sign up to set email alerts
|

Reliability factor-based mathematical model for isolating selfish nodes in MANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 11 publications
0
10
0
Order By: Relevance
“…The simulation experiments of the proposed HHOA‐NLOS‐LS are conducted using EstiNet 8.1 network simulator in order to investigate its predominance over the benchmarked schemes used for comparison 27‐33 . The network simulator EstiNet 8.1 is used for simulating the proposed HHOA‐NLOS‐LS, since it is the world‐renowned tool that is a commercial version of the NCTUns network simulator and acts as an emulator.…”
Section: Simulation Results and Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The simulation experiments of the proposed HHOA‐NLOS‐LS are conducted using EstiNet 8.1 network simulator in order to investigate its predominance over the benchmarked schemes used for comparison 27‐33 . The network simulator EstiNet 8.1 is used for simulating the proposed HHOA‐NLOS‐LS, since it is the world‐renowned tool that is a commercial version of the NCTUns network simulator and acts as an emulator.…”
Section: Simulation Results and Discussionmentioning
confidence: 99%
“…The simulation experiments of the proposed HHOA-NLOS-LS are conducted using EstiNet 8.1 network simulator in order to investigate its predominance over the benchmarked schemes used for comparison. [27][28][29][30][31][32][33] The network simulator EstiNet 8.1 is used for simulating the proposed HHOA-NLOS-LS, since it is the world-renowned tool that is a commercial version of the NCTUns network simulator and acts as an emulator. EstiNet simulator facilitates vital capabilities that include realistic distance based vehicle movement and optimally enhanced IEEE 802.11p/1609 VANET network simulation of the road for VANET.…”
Section: Computational Complexitymentioning
confidence: 99%
“…CoCoWa greatly reduces the cost of transmission by accurately predicting the selfish behaviour of nodes. Authors of this paper also has proposed a Reliability Factor Based Mitigation Mechanism (RFBMM) [18] that estimates the reliability of the mobile nodes through a packet deficiency parameter. This reliability parameter is computed based on the weighted sum of product of the estimated normalized deficiency factor which has been collected for some session period.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In this experiment, the FTCSPM is analysed based on varying CBR traffic flows viz., low (2-4), medium (6), high (8)(9)(10). Figure 5a-e presents the comparative analysis plots of packet delivery ratio, energy consumption rate, average end-to-end delay, packet drop rate and throughput derived for comparing the selfish mitigation mechanisms like FTCSPM, CNBM, PBM and ECNBM.…”
Section: Performance Evaluation Of Ftcspm By Varying the Cbr Traffic mentioning
confidence: 99%
“…In the literature, various mitigation mechanisms proposed for selfish nodes either concentrates on the past history of mobile nodes or estimates conditional probabilistic factor based on both the past and present behaviour of the mobile node into account [9,10]. However, these approaches lack to detect selfish nodes by forecasting the probability of transition between the behavioural states of the mobile nodes based on its present characteristics.…”
Section: Introductionmentioning
confidence: 99%