Have a personal or library account? Click to login
A Credit-based Method to Selfish Node Detection in Mobile Ad-hoc Network Cover

A Credit-based Method to Selfish Node Detection in Mobile Ad-hoc Network

Open Access
|Dec 2018

References

  1. [1] K. Patel and J. M. Rathod, “Effective Utilization of Bandwidth for Mobile Ad Hoc Network,” <em>Indian J. Sci. Technol.</em>, vol. 9, no. 27, 2016. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.17485/ijst/2016/v9i27/92429" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.17485/ijst/2016/v9i27/92429</a>">https://doi.org/10.17485/ijst/2016/v9i27/92429</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.17485/ijst/2016/v9i27/92429" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.17485/ijst/2016/v9i27/92429</a></dgdoi:pub-id>
  2. [2] S. Stieglitz and C. Fuchß, “Challenges of MANET for mobile social networks,” <em>Procedia Comput. Sci.</em>, vol. 5, pp. 820–825, 2011. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.procs.2011.07.112" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.procs.2011.07.112</a>">https://doi.org/10.1016/j.procs.2011.07.112</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1016/j.procs.2011.07.112" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1016/j.procs.2011.07.112</a></dgdoi:pub-id>
  3. [3] N. Raza, M. U. Aftab, M. Qasim Akbar, O. Ashraf, and M. Irfan, “Mobile Ad-Hoc Networks Applications and Its Challenges,” <em>Commun. Netw.</em>, vol. 8, no. 8, pp. 131–136, 2016. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.4236/cn.2016.83013" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.4236/cn.2016.83013</a>">https://doi.org/10.4236/cn.2016.83013</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.4236/cn.2016.83013" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.4236/cn.2016.83013</a></dgdoi:pub-id>
  4. [4] D. Helen and D. Arivazhagan, “Applications, Advantages, and Challenges of Ad Hoc Networks,” <em>J. Acad. Ind. Res.</em>, vol. 2, no. 8, pp. 453–457, 2014.
  5. [5] N. Mohammed, H. Otrok, L. Wang, M. Debbabi, and P. Bhattacharya, “Mechanism design-based secure leader election model for intrusion detection in MANET,” <em>IEEE Trans. Dependable Secur. Comput.</em>, vol. 8, no. 1, pp. 89–103, 2011. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1109/TDSC.2009.22" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1109/TDSC.2009.22</a>">https://doi.org/10.1109/TDSC.2009.22</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1109/TDSC.2009.22" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/TDSC.2009.22</a></dgdoi:pub-id>
  6. [6] C. Chakrabarti, A. Banerjee and S. Roy, “An observer-based distributed scheme for selfish-node detection in a post-disaster communication environment using delay tolerant network,” in <em>2014 Applications and Innovations in Mobile Computing (AIMoC)</em>, 2014, pp. 151–156. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1109/AIMOC.2014.6785534" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1109/AIMOC.2014.6785534</a>">https://doi.org/10.1109/AIMOC.2014.6785534</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1109/AIMOC.2014.6785534" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/AIMOC.2014.6785534</a></dgdoi:pub-id>
  7. [7] U. Shevade, H. H. Song, L. Qiu, and Y. Zhang, “Incentive-aware routing in DTNs,” <em>Proc. Int. Conf. Netw. Protoc. ICNP</em>, pp. 238–247, 2008. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1109/ICNP.2008.4697042" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1109/ICNP.2008.4697042</a>">https://doi.org/10.1109/ICNP.2008.4697042</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1109/ICNP.2008.4697042" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/ICNP.2008.4697042</a></dgdoi:pub-id>
  8. [8] D. Das, K. Majumder, and A. Dasgupta, “Selfish Node Detection and Low Cost Data Transmission in MANET using Game Theory,” <em>Procedia Comput. Sci.</em>, vol. 54, pp. 92–101, 2015. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.procs.2015.06.011" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.procs.2015.06.011</a>">https://doi.org/10.1016/j.procs.2015.06.011</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1016/j.procs.2015.06.011" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1016/j.procs.2015.06.011</a></dgdoi:pub-id>
  9. [9] R. I. Ciobanu, C. Dobre, M. Dascǎlu, Ş. Trǎuşan-Matu, and V. Cristea, “SENSE: A collaborative selfish node detection and incentive mechanism for opportunistic networks,” <em>J. Netw. Comput. Appl.</em>, vol. 41, no. 1, pp. 240–249, 2014. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.jnca.2014.01.009" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.jnca.2014.01.009</a>">https://doi.org/10.1016/j.jnca.2014.01.009</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1016/j.jnca.2014.01.009" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1016/j.jnca.2014.01.009</a></dgdoi:pub-id>
  10. [10] M. Schütte, “Detecting Selfish and Malicious Nodes in MANETs,” pp. 1–7, 2006.
  11. [11] S. Bama B, and Indira K., “Detection of Selfish and Malicious Node in Mobile Ad-Hoc Network with NS-2 Using Chord Algorithm,” <em>Int. J. Eng. Technol.</em>, vol. 9, no. 2, pp. 466–471, 2017. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.21817/ijet/2017/v9i2/170902326" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.21817/ijet/2017/v9i2/170902326</a>">https://doi.org/10.21817/ijet/2017/v9i2/170902326</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.21817/ijet/2017/v9i2/170902326" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.21817/ijet/2017/v9i2/170902326</a></dgdoi:pub-id>
  12. [12] S. Mittal, and S. Dahiya, “Identification Technique for All Passive Selfish Node Attacks In a Mobile Network,” 2015. [Online]. Available: <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://www.ijarcsms.com/docs/paper/volume3/issue4/V3I4-0011.pdf">http://www.ijarcsms.com/docs/paper/volume3/issue4/V3I4-0011.pdf</ext-link> [Accessed: December 13, 2018].
  13. [13] D. Li, Y. Xu, and J. Liu, “Distributed relay selection over multi-source and multi-relay wireless cooperative networks with selfish nodes,” <em>Comput. Commun.</em>, vol. 33, no. 17, pp. 2145–2153, 2010. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.comcom.2010.07.017" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.comcom.2010.07.017</a>">https://doi.org/10.1016/j.comcom.2010.07.017</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1016/j.comcom.2010.07.017" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1016/j.comcom.2010.07.017</a></dgdoi:pub-id>
  14. [14] P. P. Patel and R. H. Jhaveri, “Various schemes to detect selfishness in wireless ad-hoc networks: A survey,” <em>Proc. 2015 Int. Conf. Green Comput. Internet Things, ICGCIoT 2015</em>, pp. 881–886, 2016. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1109/icgciot.2015.7380587" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1109/icgciot.2015.7380587</a>">https://doi.org/10.1109/icgciot.2015.7380587</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1109/ICGCIoT.2015.7380587" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/ICGCIoT.2015.7380587</a></dgdoi:pub-id>
  15. [15] S. Zhong, J. Chen, and Y. R. Yang, “Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks,” in <em>IEEE INFOCOM 2003, Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies,</em> pp. 1987–1997, 2003. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1109/INFCOM.2003.1209220" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1109/INFCOM.2003.1209220</a>">https://doi.org/10.1109/INFCOM.2003.1209220</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1109/INFCOM.2003.1209220" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/INFCOM.2003.1209220</a></dgdoi:pub-id>
  16. [16] R. Kaushik <em>et. al</em>., “Enhanced node cooperation technique for outwitting selfish nodes in an ad hoc network,” <em>IET Networks</em>, vol. 4, no. 2, pp. 148–157, 2015. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1049/iet-net.2013.0103" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1049/iet-net.2013.0103</a>">https://doi.org/10.1049/iet-net.2013.0103</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1049/iet-net.2013.0103" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1049/iet-net.2013.0103</a></dgdoi:pub-id>
  17. [17] F. Wang, F. Wang, B. Huang, and L. T. Yang, “COSR: A reputation-based secure route protocol in MANET,” <em>Eurasip J. Wirel. Commun. Netw.</em>, vol. 2010:258935, July 2010. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1155/2010/258935" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1155/2010/258935</a>">https://doi.org/10.1155/2010/258935</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1155/2010/258935" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1155/2010/258935</a></dgdoi:pub-id>
  18. [18] N. Samian, Z. A. Zukarnain, W. K. G. Seah, A. Abdullah, and Z. M. Hanapi, “Cooperation stimulation mechanisms for wireless multihop networks: A survey,” <em>Int. J. Adv. Res. Comp. Sc. Soft. Eng.,</em> vol. 5, no. 8, pp. 306–106, 2015. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.jnca.2015.04.012" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.jnca.2015.04.012</a>">https://doi.org/10.1016/j.jnca.2015.04.012</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1016/j.jnca.2015.04.012" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1016/j.jnca.2015.04.012</a></dgdoi:pub-id>
  19. [19] S. S. Shinde, B. D. Phulpagar, “A Comparative Study of Selfish Node Detection Methods in Manet,” <em>Int. J. Adv. Res. Comput. Sci. Softw. Eng.</em>, vol. 5, no. 8, pp. 306–310, 2015.
  20. [20] Z. Li and H. Shen, “Game-theoretic analysis of cooperation incentive strategies in mobile ad hoc networks,” <em>IEEE Trans. Mob. Comput.</em>, vol. 11, no. 8, pp. 1287–1303, 2012. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1109/TMC.2011.151" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1109/TMC.2011.151</a>">https://doi.org/10.1109/TMC.2011.151</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1109/TMC.2011.151" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/TMC.2011.151</a></dgdoi:pub-id>
  21. [21] K. Komathy and P. Narayanasamy, “Best neighbor strategy to enforce cooperation among selfish nodes in wireless ad hoc network,” <em>Comput. Commun.</em>, vol. 30, no. 18, pp. 3721–3735, 2007. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.comcom.2007.07.004" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.comcom.2007.07.004</a>">https://doi.org/10.1016/j.comcom.2007.07.004</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1016/j.comcom.2007.07.004" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1016/j.comcom.2007.07.004</a></dgdoi:pub-id>
  22. [22] M. Touati, R. El-Azouzi, M. Coupechoux, E. Altman, and J. M. Kelif, “A Controlled Matching Game for WLANs,” <em>IEEE J. Sel. Areas Commun.</em>, vol. 35, no. 3, pp. 707–720, 2017. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1109/JSAC.2017.2672258" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1109/JSAC.2017.2672258</a>">https://doi.org/10.1109/JSAC.2017.2672258</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1109/JSAC.2017.2672258" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/JSAC.2017.2672258</a></dgdoi:pub-id>
  23. [23] Z. Ullah, M. S. Khan, I. Ahmed, N. Javaid, and M. I. Khan, “Fuzzy-based trust model for detection of selfish nodes in MANETs,” <em>Proc. IEEE 30th Int. Conf. Adv. Inf. Netw. Appl. AINA</em>, pp. 965–972, 2016. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1109/AINA.2016.142" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1109/AINA.2016.142</a>">https://doi.org/10.1109/AINA.2016.142</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1109/AINA.2016.142" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/AINA.2016.142</a></dgdoi:pub-id>
  24. [24] J. Sengathir and R. Manoharan, “A futuristic trust coefficient-based semi-Markov prediction model for mitigating selfish nodes in MANETs,” <em>EURASIP J. Wirel. Commun. Netw.</em>, vol. 2015:158, 2015. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1186/s13638-015-0384-4" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1186/s13638-015-0384-4</a>">https://doi.org/10.1186/s13638-015-0384-4</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1186/s13638-015-0384-4" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1186/s13638-015-0384-4</a></dgdoi:pub-id>
  25. [25] K. Komathy and P. Narayanasamy, “A Probabilistic Behavioral Model for Selfish Neighbors in a Wireless Ad Hoc Network,” <em>IJCSNS International Journal of Computer Science and Network Security</em>, vol. 7, no. 7, July 2007.
  26. [26] A. Azni, R. Ahmad, Z. Noh, and A. Basari, “Correlated Node Behavior Model based on Semi Markov Process for MANETS,” <em>J. Comput. Sci. Issues</em>, vol. 9, no. 1, pp. 50–59, 2012.
  27. [27] A. H. Azni, A. Rabiah, and M. N. Zul Azri, “Epidemic Modeling for Correlated Node Behavior in Ad Hoc Networks Center for Advanced Computing Technology,” vol. 2, no. 1, pp. 22–30, 2013.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.20533/ijcc.2046.3359.2013.0003" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.20533/ijcc.2046.3359.2013.0003</a></dgdoi:pub-id>
  28. [28] O. A. Wahab, H. Otrok, and A. Mourad, “A cooperative watchdog model based on Dempster-Shafer for detecting misbehaving vehicles,” <em>Comput. Commun.</em>, vol. 41, pp. 43–54, 2014. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.comcom.2013.12.005" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.comcom.2013.12.005</a>">https://doi.org/10.1016/j.comcom.2013.12.005</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1016/j.comcom.2013.12.005" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1016/j.comcom.2013.12.005</a></dgdoi:pub-id>
  29. [29] A. Jesudoss, S. V. Kasmir Raja, and A. Sulaiman, “Stimulating truth-telling and cooperation among nodes in VANETs through payment and punishment scheme,” <em>Ad Hoc Networks</em>, vol. 24, Part A, pp. 250–253, 2015. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.adhoc.2014.08.018" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.adhoc.2014.08.018</a>">https://doi.org/10.1016/j.adhoc.2014.08.018</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1016/j.adhoc.2014.08.018" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1016/j.adhoc.2014.08.018</a></dgdoi:pub-id>
  30. [30] T. Hayajneh, G. Almashaqbeh, and S. Ullah, “A Green Approach for Selfish Misbehavior Detection in 802.11-Based Wireless Networks,” <em>Mob. Networks Appl.</em>, vol. 20, no. 5, pp. 623–635, 2015. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1007/s11036-015-0605-4" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1007/s11036-015-0605-4</a>">https://doi.org/10.1007/s11036-015-0605-4</ext-link> D. Djenouri, N. Ouali, and A. Mahmoudi, “Random Two-hop ACK to Detect Uncooperative Nodes in MANETs,” <em>Security</em>, vol. 2, no. 7, pp. 165–175, 2017.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1007/s11036-015-0605-4" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1007/s11036-015-0605-4</a></dgdoi:pub-id>
  31. [31] D. AbdelMohsen, and T. Abdelkader, “Detecting selfish nodes and motivating cooperation, Mobile Ad-hoc Networks,” <em>Computer Engineering &amp; Systems (ICCES)</em>, 2015 IEEE Tenth International Conference, pp. 301–306, 2015. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1109/icces.2015.7393064" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1109/icces.2015.7393064</a>">https://doi.org/10.1109/icces.2015.7393064</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1109/ICCES.2015.7393064" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/ICCES.2015.7393064</a></dgdoi:pub-id>
  32. [32] Z. Ullah <em>et. al</em>., “Fuzzy-Based Trust Model for Detection of Selfish Nodes in MANETs,” <em>2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)</em>, 2016. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1109/AINA.2016.142" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1109/AINA.2016.142</a>">https://doi.org/10.1109/AINA.2016.142</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1109/AINA.2016.142" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/AINA.2016.142</a></dgdoi:pub-id>
  33. [33] K. Chaker, A.Lakas, and N. Lagraa. “Detection of intelligent malicious and selfish nodes in VANET using threshold adaptive control,” <em>2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA)</em>, 2016. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1109/icedsa.2016.7818492" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1109/icedsa.2016.7818492</a>">https://doi.org/10.1109/icedsa.2016.7818492</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1109/ICEDSA.2016.7818492" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/ICEDSA.2016.7818492</a></dgdoi:pub-id>
  34. [34] C. Nimje, and P. Junghare, “A review on node activity detection, selfish &amp; malicious behavioral patterns using watchdog algorithm,” <em>2017 International Conference Inventive Systems and Control (ICISC),</em> 2017. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1109/icisc.2017.8068663" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1109/icisc.2017.8068663</a>">https://doi.org/10.1109/icisc.2017.8068663</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1109/ICISC.2017.8068663" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/ICISC.2017.8068663</a></dgdoi:pub-id>
  35. [35] A. Lupia, “TEEM: Trust-based Energy-Efficient Distributed Monitoring for Mobile Ad-hoc Networks,” <em>2017 Wireless Days,</em> IEEE, pp. 133–136, 2017. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1109/WD.2017.7918128" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1109/WD.2017.7918128</a>">https://doi.org/10.1109/WD.2017.7918128</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1109/WD.2017.7918128" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/WD.2017.7918128</a></dgdoi:pub-id>
  36. [36] S. Adabi, S. Jabbehdari, A. Rahmani, and S. Adabi, “A novel distributed clustering algorithm for mobile ad-hoc networks,” <em>J. Comput. Sci.</em>, vol. 4, no. 2, pp. 161–166, 2008. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.3844/jcssp.2008.161.166" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.3844/jcssp.2008.161.166</a>">https://doi.org/10.3844/jcssp.2008.161.166</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.3844/jcssp.2008.161.166" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.3844/jcssp.2008.161.166</a></dgdoi:pub-id>
DOI: https://doi.org/10.2478/acss-2018-0015 | Journal eISSN: 2255-8691 | Journal ISSN: 2255-8683
Language: English
Page range: 118 - 127
Published on: Dec 31, 2018
Published by: Riga Technical University
In partnership with: Paradigm Publishing Services
Publication frequency: 1 times per year

© 2018 Sanaz Nobahary, Shahram Babaie, published by Riga Technical University
This work is licensed under the Creative Commons Attribution 4.0 License.