2013
DOI: 10.1007/s11277-013-1419-y
|View full text |Cite
|
Sign up to set email alerts
|

Reputation-Based Cooperative Detection Model of Selfish Nodes in Cluster-Based QoS-OLSR Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(10 citation statements)
references
References 22 publications
0
9
0
Order By: Relevance
“…Sicari et al introduced node reputation mechanism to improve the accuracy of data fusion. In [18], a relay node election scheme is proposed in mobile ad hoc network. It is used to recognize the selfish action of node to provide the optimal link-state protocol operating well.…”
Section: Reputation Modelmentioning
confidence: 99%
“…Sicari et al introduced node reputation mechanism to improve the accuracy of data fusion. In [18], a relay node election scheme is proposed in mobile ad hoc network. It is used to recognize the selfish action of node to provide the optimal link-state protocol operating well.…”
Section: Reputation Modelmentioning
confidence: 99%
“…In this simple approach, we do not consider the case where certain nodes will deliberately announce that they are farther away from the sink in order to delay the process or try to launch attacks. This kind of malicious behaviour is studied in [38], where the authors propose a solution based on the reputation of nodes. This kind of solutions could be applied to our protocols and are part of our future works.…”
Section: Attack Detection Perspectivementioning
confidence: 99%
“…RCMs have been widely studied in various fields of distributed networks to support secure and trustworthy communications and collaborations among participants [4][5][6][7][8][9][10][11][12].…”
Section: Related Workmentioning
confidence: 99%
“…As a key scheme for managing trust, the reputation computation model (RCM) has been introduced as an effective approach to characterize and quantify nodes' behaviors for MWNs. Although a number of RCMs and reputation-based trust functions for MWNs have been proposed in the literature, all existing RCMs were based on the direct observation of layer-specifics to evaluate the node reputation, thus ignoring many key factors of reputation in other layers [4][5][6][7][8][9][10][11][12] such as node forwarding behaviors at the network layer, channel collisions at the MAC layer, channel quality measures at the physical layer and node access behaviors at the application layer. Moreover, they did not take into account the bad mouthing attack where attackers provide dishonest recommendations to frame up good parties and/or boost trust values of malicious peers.…”
Section: Introductionmentioning
confidence: 99%