A survey on human-centric communications in non-cooperative wireless relay networks
The performance of data delivery in wireless relay networks (WRNs), such as delay-tolerant
networks and device-to-device communications heavily relies on the cooperation of mobile …
networks and device-to-device communications heavily relies on the cooperation of mobile …
A comprehensive confirmation-based selfish node detection algorithm for socially aware networks
Z Xiong, X Li, X Zhang, M Deng, F Xu, B Zhou… - Journal of Signal …, 2023 - Springer
Data transmission in socially aware networks is usually accomplished through opportunistic
peer-to-peer links in a storage-carry-forward way. This way demands nodes to actively …
peer-to-peer links in a storage-carry-forward way. This way demands nodes to actively …
[HTML][HTML] An efficient probabilistic routing scheme based on game theory in opportunistic networks
Routing is one of the most challenging problems in opportunistic networks (OppNets)
because of the intermittence of the network connection. To address the issue, many routing …
because of the intermittence of the network connection. To address the issue, many routing …
Secure routing based on social similarity in opportunistic networks
The lack of pre-existing infrastructure or dynamic topology makes it impossible to establish
end-to-end connections in opportunistic networks (OppNets). Instead, a store-and-forward …
end-to-end connections in opportunistic networks (OppNets). Instead, a store-and-forward …
A distributed framework for detecting selfish nodes in MANET using Record-and Trust-Based Detection (RTBD) technique
S Subramaniyan, W Johnson… - EURASIP Journal on …, 2014 - Springer
A mobile ad hoc network (MANET) is a self-organized system comprised by multiple mobile
wireless nodes. The node misbehavior due to selfish reasons can significantly diminish the …
wireless nodes. The node misbehavior due to selfish reasons can significantly diminish the …
A social-based watchdog system to detect selfish nodes in opportunistic mobile networks
Detecting selfish nodes in opportunistic mobile networks can reduce the loss of network
resources, thus improve the data delivery performance. Most of existing detection schemes …
resources, thus improve the data delivery performance. Most of existing detection schemes …
Selfish node detection based on fuzzy logic and Harris hawks optimization algorithm in IoT networks
A Akhbari, A Ghaffari - Security and Communication Networks, 2021 - Wiley Online Library
The Internet of things describes a network of physical things for example,“things” that are
connected with the sensors, software, and other technologies to connect and exchange data …
connected with the sensors, software, and other technologies to connect and exchange data …
A survey of mobile social networks: Applications, social characteristics, and challenges
With the popularity of mobile devices and the development of the wireless technologies,
humans can be connected ubiquitously. Because of the mobility of the devices, it is a hard …
humans can be connected ubiquitously. Because of the mobility of the devices, it is a hard …
A taxonomy on misbehaving nodes in delay tolerant networks
Abstract Delay Tolerant Networks (DTNs) are type of Intermittently Connected Networks
(ICNs) featured by long delay, intermittent connectivity, asymmetric data rates and high error …
(ICNs) featured by long delay, intermittent connectivity, asymmetric data rates and high error …
Fapmic: Fake packet and selective packet drops attacks mitigation by merkle hash tree in intermittently connected networks
Delay/Disruption Tolerant Networks (DTNs) are a special category of
IntermittentlyConnectedNetworks (ICNs). It has features such as long-delay, frequent …
IntermittentlyConnectedNetworks (ICNs). It has features such as long-delay, frequent …