Survey of different techniques for detecting selfish nodes in MANETs

سال انتشار: 1401
نوع سند: مقاله ژورنالی
زبان: انگلیسی
مشاهده: 145

فایل این مقاله در 15 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

JR_KJMMRC-11-2_005

تاریخ نمایه سازی: 16 خرداد 1401

چکیده مقاله:

In Mobile Ad-hoc Networks (MANETs), each node is free to move and connect with another over a wireless connection, without the requirement for a centralized controller or base station. These features make MANET useful and functional in a variety of areas, including tactical situations, sensor networks, and rescue operations. However, this type of network also has a range of issues such as security, Quality of Service, dynamic topology, scalability, the absence of central management, and energy consumption. In MANETs, some of the nodes do not take part in forwarding packets to other nodes to conserve their resources such as energy, bandwidth, and power. The nodes which act selfishly to conserve their resources are called selfish nodes. In recent years, mobile ad hoc networks have become a very popular research topic. In this paper, we classified techniques for detecting selfish nodes in ۴ categories namely reputation-based scheme, credit-based scheme, acknowledgment-based scheme, and game-theoretic scheme. Then we mentioned different methods available for reducing the effect of selfish nodes in mobile ad hoc networks. Finally tables ۱ and ۲ show the comparison of techniques for detecting selfish nodes.

کلیدواژه ها:

نویسندگان

Mahboubeh Vanday Baseri

Department of Computer Science, Shahid Bahonar University of Kerman, Kerman, Iran

Hamideh Fatemidokht

Department of Computer Science, Shahid Bahonar University of Kerman, Kerman, Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • K. Susan, K. C., J.-O. A. M., and M. E. ...
  • J. S. Raja. and I. J. Raja, Survey on Sel ...
  • H. Yadav and H. K. Pati, A Survey on Sel ...
  • S. Aifa and T. Thomas, Review on Di erent Techniques ...
  • S.J.H. Al-Shakarchi and R. Alubady, A Survey of Sel sh ...
  • J. H. Choi, K. S. Shim, S. Lee, and K. ...
  • N. K. Gupta, A. K. Sharma, and A. Gupta, Sel ...
  • S. Marti, T.J. Giuli, K. Lai, and M. Baker, Mitigating ...
  • R. kaushikand J. Singhai, Detection, and Isolation of Reluctant Nodes ...
  • M. Ponnusamy, Dr. A. Senthilkumar, Dr.R.Manikandan, Detection of Sel sh ...
  • T. H. Lacey, R.F. Mills, B.E. Mullins, R.A. Raines, M. ...
  • B.V. Sherif and P. Salini, Detection and Isolation of Sel ...
  • L. Buttyan, J.P. Hubaux, Stimulating cooperation in self-organizing mobile ad ...
  • L. Buttyan and J.P. Hubaux, Enforcing Service Availability in Mobile ...
  • S. Mubeen and S. Johar, Detection and Elimination of the ...
  • K. Rama Abirami and M. G. Sumithra, Evaluation of Neighbor ...
  • M. Bounouni and L. Bouallouche-Medjkoune, Adaptive Credit-Based Stimulation Scheme for ...
  • K. Balakrishnan, J. Deng, and P. K. Varshney, TWOACK: Preventing ...
  • K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, ...
  • H. M. Sun, Ch. H. Chen and Y. F. Ku, ...
  • S. Sayyar, A. Khan, F. Ullah, H. Anwar, and Z. ...
  • A. Srivastsva, S.K. Gupta, M. Najim, N. Sahu, G. Aggarwal, ...
  • D. B. Roy and R. Chaki, MADSN: Mobile Agent-Based Detection ...
  • J. H. Cho and I. R. Chen, On the Tradeo ...
  • L. Zhao, J. Zhang, K. Yang, and H. Zhang, Using ...
  • A.A. Sharah, M. Alhaj, and M. Hassan, Sel sh Dynamic ...
  • D. Hales, From Sel sh Nodes to Cooperative Networks { ...
  • V. Srinivasan, P. Nuggehalli, C.F. Chiasserini, and R.R. Rao, Cooperation ...
  • A. Gupta and A. Saxena, Detection and Prevention of Sel ...
  • D. E. Charles, K. D. Georgilakis and A. D. Panagopoulos, ...
  • http://www.universalteacherpublications.com/univ/ebooks/or/Ch۹/limit.htm (Avail-able at March ۱۵, ۲۰۱۰) ...
  • نمایش کامل مراجع