

A Threshold-Based Method to Detect Selfish Nodes in MANET
Abstract
Keywords
References
T. Fahad, R. J. Askwith, “A Node Misbehaviour Detection Mechanism for Mobile Ad-Hoc Networks,” The 7th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting, 2006.
L. Buttyan, J. P. Hubaux, Stimulating cooperation in self organizing mobile ad hoc networks", in ACM/Kluwer Mobile Networks and Applications (MONET), Vol. 8, No. 5, Oct. 2003.
Michiardi P, Molva R. CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proceedings of 6th IFIP Communication and Multimedia Security Conference, September 2002.
S.Bansal and M.Baker, “Observation-based Cooperation Enforcement in Ad hoc Networks,” http://theory.stanford.edu/~sbansal/pubs/ocean03.pdf.
S. Yokoyama, Y. Nakane, O. Takahashi, and E. Miyamoto, “Evaluation of the Impact of Selfish Nodes in Ad Hoc Networks and Detection and Countermeasure Methods,” Proceedings of the 7th International Conference on Mobile Data Management (MDM 2006).
L. Blazevic, L. Buttyan, S. Capkun, S. Giordano, J.P. Hubaux, J. Y. Le Boudec,”Self-Organization in Mobile Ad-Hoc Networks: the Approach of Terminodes,” IEEE Communications Magazine, Vol. 39, No. 6, June 2001.
Pietro Michiardi and Refik Molva. Prevention of Denial of Service attacks and Selfishness in Mobile Ad Hoc Networks. http://www.eurecom.fr/ michiard/pub/michiardi adhoc dos.ps.
S. Zhong, J. Chen, and Y. Richard Yang, Sprite: A simple, Cheatproof, Credit-based System for Mobile Ad hoc Networks", in Proceedings of IEEE INFOCOM '03, San Francisco, CA, April 2003.
Sonja Buchegger and Jean-Yves Le Boudec. Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes | Fairness In Dynamic Ad-hoc Networks. In Proceedings of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), Lausanne, CH, June 2002.
Yongguang Zhang and Wenke Lee. Intrusion detection in wireless adhoc networks. In Mobile Computing and Networking, pages 275–283, 2000. also available as http://citeseer.nj.nec.com/zhang00intrusion.html.
Yongguang Zhang, Wenke Lee, and Yi-An Huang. Intrusion Detection Techniques for Mobile Wireless Networks. to appear in ACM Wireless Networks (WINET), 9, 2003. also available as http://www.wins.hrl.com/people/ygz/papers/winet03. pdf.
S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehaviour in Mobile Ad Hoc Networks,” Proc. Sixth Ann. Int’l Conf. Mobile Computing and Networking (MobiCom), pp. 255-265, 2000.
Vikram Srinivasan, Pavan Nuggehalli, Carla F. Chiasserini, Ramesh R. Rao, “Energy Efficiency of Ad Hoc Wireless Networks with Selfish Users”,
Charles E. Perkins and Elizabeth M. Royer, Ad hoc On-Demand Distance Vector Routing, Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, February 2008, pp. 90-100.
Dave B. Johnson and David A. Maltz. The dynamic source routing protocol for mobile ad hoc networks. Inter- net Draft, Mobile Ad Hoc Network (MANET) Working Group, IETF, October 2007.
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.