Top-k Query Processing and Malicious Node Identification Based on Node Grouping in MANETs

In mobile ad hoc networks (MANETs), it is effective to retrieve data items using top-k query. However, accurate results may not be acquired in environments when malicious nodes are present. In this paper, we assume that malicious nodes attempt to replace necessary data items with unnecessary ones (w...

Full description

Bibliographic Details
Main Authors: Takuji Tsuda, Yuka Komai, Takahiro Hara, Shojiro Nishio
Format: Article
Language:English
Published: IEEE 2016-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/7433393/