منابع مشابه
A secure routing protocol with node selfishness resistance in MANETs
In mobile ad hoc networks (MANETs), available nodes must act as their own router and also rely on other nodes to relay communication packets. However, some intermediate nodes may refuse to forward packets to other nodes or discard route-discovery requests from others to save power, as much as those consumed during the message transmission phase. In order to prevent node selfishness, we have pro...
متن کاملProbabilistic Broadcasting Based on Selfishness and Additional Coverage in MANETs
For designing broadcast protocols in mobile ad hoc networks (MANETs), one of the important goals is to reduce the rebroadcast packets redundancy while reaching all the nodes in network. In this paper, we propose a probabilistic broadcasting mechanism based on selfishness and additional coverage in MANETs. Our approach dynamically adjusts the rebroadcast probability according to the extra covere...
متن کاملDetection mechanism for reputation-based selfishness prevention in MANETs
Mobile ad-hoc networks require users to cooperate in the relaying of data. Reputation-based selfishness prevention mechanisms are aimed at observing the behavior of nodes, and detecting and isolating selfish nodes that might drop packets. Mechanisms are therefore necessary to adequately and rapidly detect cooperative and selfish nodes. This work proposes a novel detection mechanism that outperf...
متن کاملA survey on Selfishness and Countermeasure in MANET
Routing is a easiest way to launch a attack in MANET due to highly dynamic topology which makes routing procedure more complicated and insecure and therefore nodes are more susceptible to compromise and are particularly vulnerable to denial of service attack (DoS) attacks launched by malicious nodes or intruders .Another challenging issue is selfishness of a node which dramatically decreases th...
متن کاملCooperation enforcement schemes for MANETs: a survey
The employment of adequate trust methods in mobile ad hoc networks (MANET) has been receiving increasing attention during the last few years, and several trust and security establishment solutions that rely on cryptographic and hashing schemes have been proposed. These schemes, although effective, produce significant processing and communication overheads and consume energy, and, hence, they do...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering
سال: 2014
ISSN: 2320-3765,2278-8875
DOI: 10.15662/ijareeie.2014.0311036