Volume- 2
Issue- 2
Year- 2014
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
Yogesh Bansal,
The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehaviour a node may exhibit is selfishness. A selfish node is a node which avoids the forwarding activity due to its current low power status or it feels so over utilized in the forwarding activity and fears that it will drain so much power that it will not have enough energy to send or receive its own packets in the future. This selfish behaviour problem is quite common in ad hoc networks. One way of preventing selfishness in a MANET is a detection and exclusion mechanism. In this paper, we have proposed an Enhanced AODV routing protocol to detect and isolate selfish nodes from the network in MANETs. The strategy assumes that the selfish nodes are not malicious and obligated to speak truth about their current energy level.[20]S. Corson, and J. Macker, Mobile Ad hoc Networking: “Routing Protocol Performance Issues and Evaluation Consideration” rfc 2501, jan 2003.
[1] C.E. Perkins and E.M. Royer. Ad hoc on demand Distance Vector routing, mobile computing systems and applications, 1999. Proceedings. WMCSA ’99. Second IEEE Workshop on, 1999, p90 - p100.
[2] D. Johnson, D. A. Maltz, Dynamic source routing in ad hoc wireless networks, in Mobile Computing (T. Imielinski and H. Korth, eds.), Kluwer Acad. Publ., 1996.
[3] V. Park, and S. Corson, Temporally-Ordered Routing Algorithm (TO- RA) Version 1 Functional Specification. IETF Internet draft, 1997.
[4] K. Mandalas, D. Flitzanis, G. F. Marias, P. Georgiadis "A Survey of Several Cooperation Enforcement Schemes for MANETs" International Symposium on Signal Processing and Information Technology IEEE, 2005.
[5] L. Blazevic, L. Buttyan, S. Capkun, S. Giordano, J.P. Hubaux, J. Y. Le Boudec, “Self-Organization in Mobile Ad-Hoc Networks: the Approach of Terminodes” IEEE Communications Magazine, Vol. 39, No. 6, June 2001.
[6] A. A. Pirzada, C. McDonald and A. Datta, “ Performance Comparison of Trust Based Reactive Routing Protocols” IEEE transaction on mobile computing, Vol. 5, No. 6, June 2006, pp 695- 710
[7] Shin Yokoyama†, Yoshikazu Nakane Osamu Takahashi, Eiichi Miyamoto, "Evaluation of the Impact of Selfish Nodesin Ad Hoc Networks and Detection and Countermeasure Methods", Proceedings of the 7th International Conference on Mobile Data Management (MDM'06).
[8] L. Buttyan and J. Hubaux, “Stimulating Cooperation in Self Organizing Mobile Ad Hoc Networks”, ACM/Kluwer Mobile Networks and Applications, Vol.8, No.5, October 2003.
[9] L. Buttyan and J. Hubaux, “Enforcing Service Availability in Mobile Ad-Hoc WANs”, in Proceedings of IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), Boston, August 2000.
[10] N. Ben Salem, L. Buttyan, J.P. Hubaux, M. Jakobsson, “A Charging and Rewarding Scheme for Packet Forwarding in Multihop Cellular Networks”, in Proc. ACM MobiHoc 03, pp. 13–24, 2003.
[11] L. Buttyan and J. Hubaux, “Nuglets: a virtual currency to stimulate cooperation in self-organized ad hoc networks”, in Technical Report EPFL, DSC, 2001.
[12] L. Anderegg, S. Eidenbenz, “Ad hoc-VCG: A Truthful and Cost Efficient Routing Protocol for Mobile Ad hoc Networks with Selfish Agents”, Proc. ACM Mobicom, pp. 245–259, 2003.
[13] Yongguang Zhang and Wenke Lee. Intrusion detection in wireless Adhoc networks. In Mobile Computing and Networking, pages 275–283, 2000.
[14] Yongguang Zhang, Wenke Lee, and Yi-An Huang. Intrusion Detection Techniques for Mobile Wireless Networks. to appear in ACM Wireless Networks (WINET), 9, 2003.
[15] Vikram Srinivasan, Pavan Nuggehalli, Carla F. Chiasserini, Ramesh R. Rao, “Energy Efficiency of Ad Hoc Wireless Networks with Selfish Users”.
[16] Buchegger S, Le Boudec JY. Performance analysis of the CONFIDANT protocol. In Proceedings of 3rd ACM International Symposium, on Mobile Ad Hoc Networking and Computing, June 2002.
[17] Michiardi P, Molva R. CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proceedings of 6th IFIP Communication and Multimedia Security Conference, September 2002.
[18] S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” Proc. Sixth Ann. Int’l Conf. Mobile Computing and Networking (MobiCom), pp. 255- 265, 2000.
[19] He Q, Wu D, Khosla P. SORI: a secure and objective reputationbased incentive scheme for ad-hoc networks. In Proceedings of IEEE WCNC2004, March 2004.
Assistant Professor in Computer Science/Information Tech. Baddi University of Emerging Sciences and Technology, Baddi. India.(e-mail: er.yogesh.it@gmail.com)
No. of Downloads: 4 | No. of Views: 1056
Manali Shukla, Ishika Goyal, Bhavya Gupta, Jhanvi Sharma.
July 2024 - Vol 12, Issue 4
Dipti Prajapati, Samishtarani Sabat, Sanika Bhilare, Rashmi Vishe, Prof. Suman Bhujbal.
March 2024 - Vol 12, Issue 2
Anu Sharma, Vivek Kumar.
May 2023 - Vol 11, Issue 3