Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 3
Page No. 376 - 383

A Novel Routing Algorithm for Selfish Node Detection for Optimal Data Transmission in Mobile Ad Hoc Network

Authors : S. Senthilkumar and J. William

References

Balakrishnan, K., J. Deng and P.K. Varhney, 2005. TWOACK: Preventing selfishness in mobile ad hoc networks. Proceedings of the IEEE Wireless Communications and Networking Conference, Volume 4, March 13-17, 2005, New Orleans, LA., USA., pp: 2137-2142.

Biradar, R.C. and S.S. Manvi, 2012. Neighbor supported reliable multipath multicast routing in MANETs. J. Network Comput. Appli., 35: 1074-1085.
CrossRef  |  Direct Link  |  

Buchegger, S. and J.Y. Le Boudec, 2002. Performance analysis of the CONFIDANT protocol. Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing, June 9-11, 2002, Lausanne, Switzerland, pp: 226-236.

Fiore, M., C.E. Casetti, C.F. Chiasserini and P. Papadimitratos, 2013. Discovery and verification of neighbor positions in mobile ad hoc networks. Mobile Comput. IEEE. Trans., 12: 289-303.
CrossRef  |  Direct Link  |  

He, Q., D.P. Wu and P. Khosla, 2004. SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks. Proceedings of IEEE Wireless Communications and Networking Conference, Mar. 21-25, Atlanta, GA, United States, pp: 825-830.

Liu, K., J. Deng, P.K. Varshney and K. Balakrishnan, 2007. An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Trans. Mobile Comput., 6: 536-550.
CrossRef  |  

Liu, Y., K. Li, Y. Jin, Y. Zhang and W. Qu, 2011. A novel reputation computation model based on subjective logic for mobile ad hoc networks. Future Gener. Comput. Syst., 27: 547-554.
CrossRef  |  Direct Link  |  

Marti, S., T.J. Giuli, K. Lai and M. Baker, 2000. Mitigating routing misbehavior in mobile ad hoc networks. Proceedings of the 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking, August 6-11, 2000, Boston, MA., USA., pp: 255-265.

Michiardi, P. and R. Molva, 2002. CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. Proceedings of the IFIP TC6/TC11 6th Joint Working Conference on Communications and Multimedia Security, September 26-27, 2002, Portoroz, Slovenia, pp: 107-121.

Pirzada, A.A., C. McDonald and A. Datta, 2006. Performance comparison of trust-based reactive routing protocols. IEEE Trans. Mobile Comput., 5: 695-710.
CrossRef  |  

Roy, D.B. and R. Chaki, 2011. MADSN: Mobile agent based detection of selfish node in MANET. Int. J. Wireless Mobile Netw., 3: 225-235.
Direct Link  |  

Song, C. and Q. Zhang, 2010. Protocols for stimulating packet forwarding in wireless ad hoc networks security and privacy in emerging wireless networks. Wireless Commun. IEEE., 17: 50-55.
CrossRef  |  Direct Link  |  

Wang, J., Y. Liu and Y. Jiao, 2011. Building a trusted route in a mobile ad hoc network considering communication reliability and path length. J. Netw. Comput. Appl., 34: 1138-1149.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved