Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services 2017
DOI: 10.1145/3144457.3144486
|View full text |Cite
|
Sign up to set email alerts
|

Trust-based Scheme for Cheating and Collusion Detection in Wireless Multihop Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(11 citation statements)
references
References 18 publications
0
11
0
Order By: Relevance
“…In the next section, we show how to exploit [11,12] to characterize the long-term utility region and construct a practical transmission strategy. In Section 2.4, we will show how to integrate the strategic stability 3 property into this strategy, this property being important to ensure that selfish nodes effectively implement the efficient strategies.…”
Section: Repeated Game Formulation Of the Problemmentioning
confidence: 99%
See 4 more Smart Citations
“…In the next section, we show how to exploit [11,12] to characterize the long-term utility region and construct a practical transmission strategy. In Section 2.4, we will show how to integrate the strategic stability 3 property into this strategy, this property being important to ensure that selfish nodes effectively implement the efficient strategies.…”
Section: Repeated Game Formulation Of the Problemmentioning
confidence: 99%
“…The proposed incentive mechanism combines the ideas of credit and reputation. To our knowledge, the closest existing incentive mechanism to the one proposed in the present paper is given by ICARUS in [3,6], and [8]. Here, we go further by dealing with the problem of imperfect observation and that of credit outage or excess.…”
Section: Introductionmentioning
confidence: 96%
See 3 more Smart Citations