One method for selfish nodes security problem in ad hoc networks

被引:0
|
作者
Wu, Hao [1 ]
Zheng, Zhi-Bin [1 ]
机构
[1] Modern Telecommunication Center, Beijing Jiaotong University, Beijing 100044, China
来源
Tien Tzu Hsueh Pao/Acta Electronica Sinica | 2005年 / 33卷 / SUPPL.期
关键词
Battery life - Mobile ad hoc networks - Neighbor monitoring - Node cooperation - Reputation evaluation - Selfish nodes - Trusted center servers;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:2317 / 2321
相关论文
共 50 条
  • [31] Context aware detection of selfish nodes in DSR based ad-hoc networks
    Paul, K
    Westhoff, D
    IEEE 56TH VEHICULAR TECHNOLOGY CONFERENCE, VTC FALL 2002, VOLS 1-4, PROCEEDINGS, 2002, : 2424 - 2429
  • [32] A Game Theoretical Approach for Topology Control in Wireless Ad Hoc Networks with Selfish Nodes
    Abdullah Waqas
    Hasan Mahmood
    Wireless Personal Communications, 2017, 96 : 249 - 263
  • [33] A Game Theoretical Approach for Topology Control in Wireless Ad Hoc Networks with Selfish Nodes
    Waqas, Abdullah
    Mahmood, Hasan
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (01) : 249 - 263
  • [34] Preventing selfish behavior in ad hoc networks
    Seredynski, M.
    Bouvry, P.
    Klopotek, M. A.
    2007 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1-10, PROCEEDINGS, 2007, : 3554 - +
  • [35] OMH—Suppressing Selfish Behavior in Ad hoc Networks with One More Hop
    Chengqi Song
    Qian Zhang
    Mobile Networks and Applications, 2009, 14 : 178 - 187
  • [36] Trust Based Intrusion Detection Technique to Detect Selfish Nodes in Mobile Ad Hoc Networks
    Sunil Kumar
    Kamlesh Dutta
    Wireless Personal Communications, 2018, 101 : 2029 - 2052
  • [37] The COMMIT protocol for truthful and cost-efficient routing in ad hoc networks with selfish nodes
    Eidenbenz, Stephan
    Resta, Giovanni
    Santi, Paolo
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2008, 7 (01) : 19 - 33
  • [38] Trust Based Intrusion Detection Technique to Detect Selfish Nodes in Mobile Ad Hoc Networks
    Kumar, Sunil
    Dutta, Kamlesh
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 101 (04) : 2029 - 2052
  • [39] Security in ad hoc networks
    Molva, R
    Michiardi, P
    PERSONAL WIRELESS COMMUNICATIONS, PROCEEDINGS, 2003, 2775 : 756 - 775
  • [40] OMH-Suppressing Selfish Behavior in Ad hoc Networks with One More Hop
    Song, Chengqi
    Zhang, Qian
    MOBILE NETWORKS & APPLICATIONS, 2009, 14 (02): : 178 - 187