2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS) 2017
DOI: 10.1109/iciiecs.2017.8276136
|View full text |Cite
|
Sign up to set email alerts
|

Selfish attack detection in mobile Ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…If a selfish node needs to send data to another node, it will start to work as a standard AODV process. The node returns to its silent mode and selfish behavior after it finishes sending its data [13,14].…”
Section: Selfishness Attackmentioning
confidence: 99%
“…If a selfish node needs to send data to another node, it will start to work as a standard AODV process. The node returns to its silent mode and selfish behavior after it finishes sending its data [13,14].…”
Section: Selfishness Attackmentioning
confidence: 99%
“…The central concept behind the suggested credit-based strategy for MANET is to reward mobile nodes for dependable network operations [76]. Virtual currency or a comparable electronic payment system is used to create incentives.…”
Section: Credit-basedmentioning
confidence: 99%
“…Passive nodes are also referred to as selfish nodes and active nodes are called cooperative nodes in works like [39]. While from a security standpoint, works like [23] refer to the scenario of having passive nodes as experiencing a selfish attack or a black hole attack.…”
Section: E = Kpmentioning
confidence: 99%