[HTML][HTML] T2AR: trust-aware ad-hoc routing protocol for MANET

G Dhananjayan, J Subbiah - SpringerPlus, 2016 - Springer
Secure data transfer against the malicious attacks is an important issue in an infrastructure-
less independent network called mobile ad-hoc network (MANET). Trust assurance between …

GT-QoSec: A game-theoretic joint optimization of QoS and security for differentiated services in next generation heterogeneous networks

ZM Fadlullah, C Wei, Z Shi… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Recently, numerous real-time, data-rich, and differentiated applications and services have
appeared in the next-generation Heterogeneous Networks. As a result, the number of …

Secure and efficient uav tracking in space-air-ground integrated network

J Li, W Zhang, Y Meng, S Li, L Ma… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With the development of 5G and other communication techniques, the space-air-ground
integrated network (SAGIN) is regarded as a promising solution to provide wide-range, cost …

Resource allocation in wireless powered relay networks: A bargaining game approach

Z Zheng, L Song, D Niyato, Z Han - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Information and power transfer in mobile relay networks have recently emerged
simultaneously, where the relay can harvest the radio frequency (RF) energy and then use …

A fuzzy logic and game theory based adaptive approach for securing opportunistic networks against black hole attacks

A Chhabra, V Vashishth… - International Journal of …, 2018 - Wiley Online Library
Opportunistic networks (OppNets) are networks that can be used in situations of sparse
network connectivity. Strategies for implementing secure transmission of messages in …

A game theory based secure model against black hole attacks in opportunistic networks

A Chhabra, V Vashishth… - 2017 51st Annual …, 2017 - ieeexplore.ieee.org
Opportunistic Networks, a subset of Delay Tolerant Networks (DTNs), do not have a
predefined source to destination end-to-end path and hence, offer a multitude of challenges …

Hey, influencer! Message delivery to social central nodes in social opportunistic networks

C Borrego, J Borrell, S Robles - Computer Communications, 2019 - Elsevier
This paper presents a new strategy to efficiently deliver messages to influencers in social
opportunistic networks. An influencer node is an important node in the network with a high …

Towards an incentive‐compatible, reputation‐based framework for stimulating cooperation in opportunistic networks: a survey

N Mantas, M Louta, E Karapistoli, GT Karetsos… - Iet …, 2017 - Wiley Online Library
In opportunistic networks (OppNets), routing and data forwarding among mobile devices are
facilitated by relays or next‐hop forwarders. To guarantee end‐to‐end data delivery it is …

A Markovian analysis for explicit probabilistic stopping-based information propagation in postdisaster ad hoc mobile networks

J Liu, N Kato - IEEE Transactions on Wireless Communications, 2015 - ieeexplore.ieee.org
There has been surging research interest in utilizing mobile phones for information relaying
in postdisaster areas lacking infrastructure support. A common complication for such …

Finding overlapping communities based on Markov chain and link clustering

X Deng, G Li, M Dong, K Ota - Peer-to-peer Networking and Applications, 2017 - Springer
Since community structure is an important feature of complex network, the study of
community detection has attracted more and more attention in recent years. Despite most …