2017 13th IEEE Conference on Automation Science and Engineering (CASE) 2017
DOI: 10.1109/coase.2017.8256143
|View full text |Cite
|
Sign up to set email alerts
|

Trust-based protocol for securing routing in opportunistic networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 12 publications
0
1
0
Order By: Relevance
“…People have designed a trust-based routing protocol [9] (TRP) that combines various practical algorithms to reduce the negative impact of malicious nodes. For many uncooperative nodes in the opportunistic social network, the uncooperative nodes are mainly divided into two types: (1) The received information is not forwarded.…”
Section: Related Workmentioning
confidence: 99%
“…People have designed a trust-based routing protocol [9] (TRP) that combines various practical algorithms to reduce the negative impact of malicious nodes. For many uncooperative nodes in the opportunistic social network, the uncooperative nodes are mainly divided into two types: (1) The received information is not forwarded.…”
Section: Related Workmentioning
confidence: 99%