T Bouali, H Sedjelmaci… - 2016 IEEE Wireless …, 2016 - ieeexplore.ieee.org
… of our proposed mechanism to detect malicious nodes, then, we highlight its impact on
the end-to-end delay, delivery ratio and generated overhead in a malicious environment. …