Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes - Fairness In Dynamic Ad-hoc NeTworks
Citations
1,367 citations
1,330 citations
Cites background from "Performance Analysis of the CONFIDA..."
...In [7], [8], Buchegger and Le Boudec proposed and evaluated their CONFIDENT protocol, which detects and isolates misbehaving nodes....
[...]
...One possibility to provide incentive is to use a reputation system [4], [7], [8], [9]....
[...]
...However, as observed by several authors [4], [5], [6], [7], [8], it may soon be possible to deploy ad hoc networks for civilian applications as well....
[...]
1,188 citations
807 citations
743 citations
Cites methods from "Performance Analysis of the CONFIDA..."
...Both the proposed schemes ([16] and [39]) are applicable to WSNs with a slight modification: The renewal period of the reputation tables would be decreased, in order to increase the bandwidth efficiency....
[...]
...CONFIDANT protocol [39] works as an extension to reactive source routing protocols, such as DSR, and uses a...
[...]
...[36] statistical not applicable Rao and Kesidis [37] statistical not applicable Nadkarni and Mishra [38] misuse not applicable CONFIDANT protocol [39] reputation applicable with modification Sun et al....
[...]
References
[...]
10,880 citations
[...]
6,044 citations
"Performance Analysis of the CONFIDA..." refers background or methods in this paper
...As explained by Richard Dawkins in ‘The Selfish Gene’ [6], reciprocal altruism is beneficial for every ecological system when favors are granted simultaneously, so there is an intrinsic motivation for cooperation because of instant gratification....
[...]
...Dawkins divides birds into two types: ‘suckers’ that always help and ‘cheats’ that have other birds groom parasites off their head but fail to return the favor....
[...]
...Dawkins then introduces a third kind of bird, the ‘grudger’ that starts out being helpful to every bird, but bears a grudge against those birds that do not return the favor and subsequently no longer grooms their heads....
[...]
...An ecological example used by Dawkins [6] explains the survival chances (and thus gene selection) of birds grooming parasites off each other’s head, which they cannot clean themselves....
[...]
...According to Dawkins, simulation has shown that when starting with a majority population of cheats and marginal groups of both suckers and grudgers, the grudgers win over time....
[...]
4,182 citations
"Performance Analysis of the CONFIDA..." refers methods in this paper
...Dynamic Source Routing is a protocol developed for routing in mobile ad-hoc networks and was proposed for MANET by Broch, Johnson, and Maltz [ 8 ]....
[...]
3,747 citations
"Performance Analysis of the CONFIDA..." refers background in this paper
...Marti, Giuli, Lai, and Baker [9] observed that throughput increased in mobile ad-hoc networks by complementing DSR with a ‘watchdog’ for detection of non-forwarding nodes and a ‘pathrater’ (for trust management and routing policy, every path used is rated), which enable nodes to avoid non-forwarding nodes in their routes....
[...]
...[9] Sergio Marti, T.J. Giuli, Kevin Lai, and Mary Baker....
[...]
2,661 citations
"Performance Analysis of the CONFIDA..." refers background in this paper
...Zhou and Haas [18] employ asynchronous threshold security and share refreshing for distributed certification authorities for key management in mobile ad-hoc networks....
[...]
...[18] Lidong Zhou and Zygmunt Haas....
[...]