Conviction Based Packet Promotion Scheme for Efficient Detection of Selfish Nodes in Mobile Ad Hoc Networks


(*) Corresponding author


Authors' affiliations


DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)

Abstract


Nodes in the Mobile Ad Hoc Network (MANET) moves arbitrarily because of infrastructure less environment. Since there is no fixed infrastructure, the mobility of nodes causes frequent changes in the topology of the network. Due to the lack of maintaining the centralized access control, MANETs are vulnerable to diverse type of loss such as packet loss, entering of selfish nodes and security threats. A loss of packet mainly happens based on presence of malicious nodes or selfish nodes. A node may act selfishly to preserve its scarce resources and do not forward the packets to other nodes but still want to use their services to send and receive their own packets. Several researchers focused on detecting and preventing the entry of selfish nodes in the network. Existing work presented an approach to verify the packet forwarding by the Merkle tree principle approach. But the mobility on packet data in mobile ad hoc networks needs an extension to improve the network lifetime. So in this work, a Conviction Based Packet Promotion Scheme (CBPPS) is introduced for detecting the selfish nodes using the direction-finding level behavior information. It uses conviction values to favor packet promoting by maintaining a conviction counter for each node which increases throughput and decreases the communication overhead. The detected selfish node is punished or rewarded by decreasing or increasing the conviction counter. Simulation experiments are conducted with various simulation scenarios to estimate the performance of the proposed CBPPS scheme for prolonged network lifetime against merkle tree principle [1] in terms of percentage of selfish nodes detected, time of detection, average packet delivery ratio. With CBPPS scheme, the selfish node detection effectiveness is high compared to existing merkle tree principle approach
Copyright © 2014 Praise Worthy Prize - All rights reserved.

Keywords


Selfish Nodes; Conviction Based Packet Promotion Scheme; Conviction Counter; Network Lifetime

Full Text:

PDF


References


Abderrahmane Baadache N, Ali Belmehdi, Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks, Journal of Network and Computer Applications, vol. 35, n. 3, pp. 1130–1139, 2012.

Mani P and Kamalakkannan P., Mitigating Selfish Behavior in Mobile Ad Hoc Networks: A Survey, International Journal of Computer Applications, vol. 73, n. 22, pp. 1-7, 2013.

A. Shajin Nargunam, M. P. Sebastian, Fully Distributed Security Architecture for MANET, (2006) International Review on Computers and Software (IRECOS), 1. (2), pp. 164 - 172.

A. Sameh, A. Mahmoud, S. El-Kassas, RARAN: Authenticated Routing for Ad Hoc Networks Protocol with Reputation, (2007) International Review on Computers and Software (IRECOS), 2. (5), pp. 463 - 474.

Wei Gong et. Al., Trust Based Malicious Nodes Detection in MANET, International Conference on E-Business and Information System Security, 2009. EBISS '09.

Sunho Lim et. Al., RandomCast: An Energy-Efficient Communication Scheme for Mobile Ad Hoc Networks, IEEE Transactiona On Mobile Computing, Vol. 8, n. 8, pp. 1039-1051, 2009.

Xue Wang et. Al., Distributed Energy Optimization for Target Tracking in Wireless Sensor Network”, IEEE Transactions on Mobile Computing, vol. 9, No. 1, pp. 73-86, 2009.

Lien-Wen Wu, Rui-Feng Yu, A threshold-based method for selfish nodes detection in MANET, International Computer Symposium (ICS), 2010 .

Hernandez-Orallo, E. et. Al., Improving Selfish Node Detection in MANETs Using a Collaborative Watchdog, IEEE Communications Letters, vol. 16, n. 5, pp.642 – 645, 2012.

Hernandez-Orallo, E. et. Al., Collaborative watchdogs: A fast and efficient approach to deal with selfish nodes in MANETs, Fourth International Conference on Ubiquitous and Future Networks (ICUFN), 2012

Tarannum, R. , Pandey, Y., Detection and deletion of selfish MANET nodes-a distributed approach, 1st International Conference on Recent Advances in Information Technology (RAIT), 2012

Hussain, M.A. et. Al., , “Evaluating network layer selfish behavior and a method to detect and mitigate its effect in MANETs” 15th International Multi topic Conference (INMIC), 2012

Yu Zhang et. Al., “AMD: Audit-based Misbehavior Detection in Wireless Ad Hoc Networks”, IEEE Transactions on Mobile Computing,vol. 99, pp. 160-173, 2012.

B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, and H. Rubens. ODSBR: An on-demand secure byzantine resilient routing protocol for wireless ad hoc networks, ACM Transactions on Information System Security, vol. 10, n. 4, pp. 11–35, 2008.

K. Liu, J. Deng, P. Varshney, and K. Balakrishnan, An acknowledgment based approach for the detection of routing misbehavior in manets. IEEE Transactions on Mobile Computing, vol. 6, n. 5, pp. 536–550, 2007.

Mohamed M.E.A. Mahmoud et. Al., FESCIM: Fair, Efficient, and Secure Cooperation Incentive Mechanism for Multihop Cellular Networks, IEEE Ttransactions on Mobile Computing, Vol. 11, n. 5, 2012.

N. Potlapally, S. Ravi, A. Raghunathan, and N. Jha, A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols, IEEE Trans. Mobile Computing, vol. 5, n. 2, pp. 128-143, 2006.

M. Mahmoud and X. Shen, Stimulating Cooperation in Multi-Hop Wireless Networks Using Cheating Detection System, Proc. IEEE INFOCOM, pp. 776-784, Mar. 2010.

Y. Zhang, W. Lou, and Y. Fang, A Secure Incentive Protocol for Mobile Ad Hoc Networks, ACM Wireless Networks, vol. 13, n. 5, pp. 569-582, 2007.

Kumar, J., Kulkarni, M., Gupta, D., Performance comparison of MANET routing protocols, (2010) International Review on Computers and Software (IRECOS), 5 (1), pp. 1-5.

Jiang, H., Zhang, S., Shao, G., Group mobility judge based on node's neighbors matrix in clustering MANET, (2012) International Review on Computers and Software (IRECOS), 7 (6), pp. 2886-2890.

Sengan, S., Chethur Pandian, S., An efficient agent-based intrusion detection system for detecting malicious nodes in MANET routing, (2012) International Review on Computers and Software (IRECOS), 7 (6), pp. 3037-3041.

Priyadarsini, S., Umashankar, S., TSRD-RL algorithm based secured route discovery for MANET with improved route lifetime, (2012) International Review on Computers and Software (IRECOS), 7 (2), pp. 499-504.

Vinod Kumar, R., Wahidabanu, R.S.D., Cross-layer based energy efficient congestion control protocol for MANETs, (2013) International Review on Computers and Software (IRECOS), 8 (12), pp. 2992-3001.

Mathiyalagan, G., Wahi, A., Route optimization using adaptive shrink mechanism for MANET, (2013) International Review on Computers and Software (IRECOS), 8 (12), pp. 2821-2830.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize