A survey on human-centric communications in non-cooperative wireless relay networks

B Jedari, F Xia, Z Ning - IEEE Communications Surveys & …, 2018 - ieeexplore.ieee.org
The performance of data delivery in wireless relay networks (WRNs), such as delay-tolerant
networks and device-to-device communications heavily relies on the cooperation of mobile …

A comprehensive confirmation-based selfish node detection algorithm for socially aware networks

Z Xiong, X Li, X Zhang, M Deng, F Xu, B Zhou… - Journal of Signal …, 2023 - Springer
Data transmission in socially aware networks is usually accomplished through opportunistic
peer-to-peer links in a storage-carry-forward way. This way demands nodes to actively …

[HTML][HTML] An efficient probabilistic routing scheme based on game theory in opportunistic networks

X Qin, X Wang, L Wang, Y Lin, X Wang - Computer Networks, 2019 - Elsevier
Routing is one of the most challenging problems in opportunistic networks (OppNets)
because of the intermittence of the network connection. To address the issue, many routing …

Secure routing based on social similarity in opportunistic networks

L Yao, Y Man, Z Huang, J Deng… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
The lack of pre-existing infrastructure or dynamic topology makes it impossible to establish
end-to-end connections in opportunistic networks (OppNets). Instead, a store-and-forward …

A distributed framework for detecting selfish nodes in MANET using Record-and Trust-Based Detection (RTBD) technique

S Subramaniyan, W Johnson… - EURASIP Journal on …, 2014 - Springer
A mobile ad hoc network (MANET) is a self-organized system comprised by multiple mobile
wireless nodes. The node misbehavior due to selfish reasons can significantly diminish the …

A social-based watchdog system to detect selfish nodes in opportunistic mobile networks

B Jedari, F Xia, H Chen, SK Das, A Tolba… - Future Generation …, 2019 - Elsevier
Detecting selfish nodes in opportunistic mobile networks can reduce the loss of network
resources, thus improve the data delivery performance. Most of existing detection schemes …

Selfish node detection based on fuzzy logic and Harris hawks optimization algorithm in IoT networks

A Akhbari, A Ghaffari - Security and Communication Networks, 2021 - Wiley Online Library
The Internet of things describes a network of physical things for example,“things” that are
connected with the sensors, software, and other technologies to connect and exchange data …

A survey of mobile social networks: Applications, social characteristics, and challenges

T Qiu, B Chen, AK Sangaiah, J Ma… - IEEE Systems …, 2017 - ieeexplore.ieee.org
With the popularity of mobile devices and the development of the wireless technologies,
humans can be connected ubiquitously. Because of the mobility of the devices, it is a hard …

A taxonomy on misbehaving nodes in delay tolerant networks

W Khalid, Z Ullah, N Ahmed, Y Cao, M Khalid… - computers & …, 2018 - Elsevier
Abstract Delay Tolerant Networks (DTNs) are type of Intermittently Connected Networks
(ICNs) featured by long delay, intermittent connectivity, asymmetric data rates and high error …

Fapmic: Fake packet and selective packet drops attacks mitigation by merkle hash tree in intermittently connected networks

W Khalid, N Ahmad, S Khan, NU Saquib… - IEEE …, 2023 - ieeexplore.ieee.org
Delay/Disruption Tolerant Networks (DTNs) are a special category of
IntermittentlyConnectedNetworks (ICNs). It has features such as long-delay, frequent …