CoCoWa: A collaborative contact-based watchdog for detecting selfish nodes

E Hernandez-Orallo, MDS Olmos… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
Mobile ad-hoc networks (MANETs) assume that mobile nodes voluntary cooperate in order
to work properly. This cooperation is a cost-intensive activity and some nodes can refuse to …

A dynamic anomaly detection scheme for AODV-based mobile ad hoc networks

H Nakayama, S Kurosawa, A Jamalipour… - IEEE transactions on …, 2008 - ieeexplore.ieee.org
Mobile ad hoc networks (MANETs) are usually formed without any major infrastructure. As a
result, they are relatively vulnerable to malicious network attacks, and therefore, security is a …

[HTML][HTML] Issues and challenges in node connectivity in mobile ad hoc networks: a holistic review

M Jain, S Chand - Wireless Engineering and Technology, 2015 - scirp.org
One of the fundamental properties of an ad hoc network is its connectivity. Maintaining
connectivity in wireless networks is extremely difficult due to dynamic changing topology of …

[PDF][PDF] Preventing aodv routing protocol from black hole attack

L Himral, V Vig, N Chand - International Journal of Engineering …, 2011 - academia.edu
Ad-hoc networks, due to their improvised nature, are frequently established insecure
environments, which makes them susceptible to attacks. These attacks are launched by …

A cooperative routing for MANET based on distributed trust and energy management

U Venkanna, JK Agarwal, RL Velusamy - Wireless Personal …, 2015 - Springer
A mobile ad-hoc network is an autonomous system having collection of mobile nodes
connected by wireless links. Mobile nodes in a MANET communicate with each other based …

A survey on detecting black hole attack in AODV-based mobile ad hoc networks

RAR Mahmood, AI Khan - 2007 International Symposium on …, 2007 - ieeexplore.ieee.org
This paper presents a survey of current methods of detecting black hole attack against ad
hoc on-demand distance vector routing protocol in mobile ad hoc networks. In a black hole …

Reputation-based cooperative detection model of selfish nodes in cluster-based QoS-OLSR protocol

N Moati, H Otrok, A Mourad, JM Robert - Wireless personal …, 2014 - Springer
The QOLSR is a multimedia protocol that was designed on top of the optimized link state
routing (OLSR) protocol for mobile ad hoc network. It considers the quality of service (QoS) …

A fast model for evaluating the detection of selfish nodes using a collaborative approach in MANETs

E Hernández-Orallo, MDS Olmos, JC Cano… - Wireless personal …, 2014 - Springer
Mobile ad-hoc networks (MANETs) rely on network cooperation schemes to work properly.
Nevertheless, if nodes have a selfish behaviour and are unwilling to cooperate, the overall …

Modeling and analysis of connectivity in mobile ad hoc networks with misbehaving nodes

F Xing, W Wang - 2006 IEEE International Conference on …, 2006 - ieeexplore.ieee.org
Mobile ad hoc networks are vulnerable to malicious attacks and failures due to their unique
features, such as node mobility and dynamic network topology. The design and evaluation …

The controversy of selfish nodes in ad hoc networks

CK Toh, D Kim, S Oh, H Yoo - 2010 The 12th International …, 2010 - ieeexplore.ieee.org
Currently, there are work related to selfish nodes in ad hoc mobile networks. In this paper,
questions on the viability, validity, and presence of selfish nodes are raised and discussed …