作者: N. Nasser , Y. Chen
DOI: 10.1109/ICC.2007.196
关键词:
摘要: … : a malicious node falsely reports other nodes as misbehaving while in fact it is the true culprit. Each node maintains a table that records the number of packets the node sends, forwards …