Survey of different techniques for detecting selfish nodes in MANETs

Publish Year: 1401
نوع سند: مقاله ژورنالی
زبان: English
View: 201

This Paper With 15 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_KJMMRC-11-2_005

تاریخ نمایه سازی: 16 خرداد 1401

Abstract:

In Mobile Ad-hoc Networks (MANETs), each node is free to move and connect with another over a wireless connection, without the requirement for a centralized controller or base station. These features make MANET useful and functional in a variety of areas, including tactical situations, sensor networks, and rescue operations. However, this type of network also has a range of issues such as security, Quality of Service, dynamic topology, scalability, the absence of central management, and energy consumption. In MANETs, some of the nodes do not take part in forwarding packets to other nodes to conserve their resources such as energy, bandwidth, and power. The nodes which act selfishly to conserve their resources are called selfish nodes. In recent years, mobile ad hoc networks have become a very popular research topic. In this paper, we classified techniques for detecting selfish nodes in ۴ categories namely reputation-based scheme, credit-based scheme, acknowledgment-based scheme, and game-theoretic scheme. Then we mentioned different methods available for reducing the effect of selfish nodes in mobile ad hoc networks. Finally tables ۱ and ۲ show the comparison of techniques for detecting selfish nodes.

Authors

Mahboubeh Vanday Baseri

Department of Computer Science, Shahid Bahonar University of Kerman, Kerman, Iran

Hamideh Fatemidokht

Department of Computer Science, Shahid Bahonar University of Kerman, Kerman, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • K. Susan, K. C., J.-O. A. M., and M. E. ...
  • J. S. Raja. and I. J. Raja, Survey on Sel ...
  • H. Yadav and H. K. Pati, A Survey on Sel ...
  • S. Aifa and T. Thomas, Review on Di erent Techniques ...
  • S.J.H. Al-Shakarchi and R. Alubady, A Survey of Sel sh ...
  • J. H. Choi, K. S. Shim, S. Lee, and K. ...
  • N. K. Gupta, A. K. Sharma, and A. Gupta, Sel ...
  • S. Marti, T.J. Giuli, K. Lai, and M. Baker, Mitigating ...
  • R. kaushikand J. Singhai, Detection, and Isolation of Reluctant Nodes ...
  • M. Ponnusamy, Dr. A. Senthilkumar, Dr.R.Manikandan, Detection of Sel sh ...
  • T. H. Lacey, R.F. Mills, B.E. Mullins, R.A. Raines, M. ...
  • B.V. Sherif and P. Salini, Detection and Isolation of Sel ...
  • L. Buttyan, J.P. Hubaux, Stimulating cooperation in self-organizing mobile ad ...
  • L. Buttyan and J.P. Hubaux, Enforcing Service Availability in Mobile ...
  • S. Mubeen and S. Johar, Detection and Elimination of the ...
  • K. Rama Abirami and M. G. Sumithra, Evaluation of Neighbor ...
  • M. Bounouni and L. Bouallouche-Medjkoune, Adaptive Credit-Based Stimulation Scheme for ...
  • K. Balakrishnan, J. Deng, and P. K. Varshney, TWOACK: Preventing ...
  • K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, ...
  • H. M. Sun, Ch. H. Chen and Y. F. Ku, ...
  • S. Sayyar, A. Khan, F. Ullah, H. Anwar, and Z. ...
  • A. Srivastsva, S.K. Gupta, M. Najim, N. Sahu, G. Aggarwal, ...
  • D. B. Roy and R. Chaki, MADSN: Mobile Agent-Based Detection ...
  • J. H. Cho and I. R. Chen, On the Tradeo ...
  • L. Zhao, J. Zhang, K. Yang, and H. Zhang, Using ...
  • A.A. Sharah, M. Alhaj, and M. Hassan, Sel sh Dynamic ...
  • D. Hales, From Sel sh Nodes to Cooperative Networks { ...
  • V. Srinivasan, P. Nuggehalli, C.F. Chiasserini, and R.R. Rao, Cooperation ...
  • A. Gupta and A. Saxena, Detection and Prevention of Sel ...
  • D. E. Charles, K. D. Georgilakis and A. D. Panagopoulos, ...
  • http://www.universalteacherpublications.com/univ/ebooks/or/Ch۹/limit.htm (Avail-able at March ۱۵, ۲۰۱۰) ...
  • نمایش کامل مراجع