Reviews
Description
This work is motivated by the fact that a selfish replica allocation could lead to overall poor MANET data accessibility. This book presents three types of mitigation approaches that calculate the reputation of mobile nodes using past history highlighting trust factor, present and past behavior based conditional probabilistic factor, and future forecasting trust value for effective mitigation of selfish nodes. The detected selfish nodes are to be isolated from the route path between source and destination in order to increase the overall communication in the network. This selfish nature tends to drop in data approachability.
EXTRA 10 % discount with code: EXTRA
The promotion ends in 21d.13:43:05
The discount code is valid when purchasing from 10 €. Discounts do not stack.
This work is motivated by the fact that a selfish replica allocation could lead to overall poor MANET data accessibility. This book presents three types of mitigation approaches that calculate the reputation of mobile nodes using past history highlighting trust factor, present and past behavior based conditional probabilistic factor, and future forecasting trust value for effective mitigation of selfish nodes. The detected selfish nodes are to be isolated from the route path between source and destination in order to increase the overall communication in the network. This selfish nature tends to drop in data approachability.
Reviews