Exponential reliability factor based mitigation mechanism for selfish nodes in MANETs

J. Sengathir, R. Manoharan

Abstract


Reliable dissemination of data in mobile ad hoc networks mainly depends on thecooperation among all the active mobile nodes present in the network. However,enforcing a node to cooperate with all the other mobile nodes is a difficult task.Moreover, the mobile nodes in an ad hoc network have limited battery power and hencethey refuse to forward their neighbor nodes’ packets so as to conserve their energy.This intentional selfish behavior of mobile nodes reduces the degree of cooperationbetween active mobile nodes which in turn affects the network performance. Hence,a need arises for formulating a reputation mechanism which helps in isolating selfishnodes in MANETs. In this paper, we propose an Exponential Reliability FactorBased Mitigation Mechanism (ERFBM) for detecting and isolating selfish nodes.This ERFBM efficiently isolates selfish nodes with the aid of Exponential ReliabilityFactor (ERF) computed based on the first and second hand information obtainedfrom the mobile nodes. The effective performance of ERFBM is extensively studiedthrough ns-2 simulations and the results obtained clearly portray that the proposedERFBM isolates selfish nodes at a faster rate of 36% than the considered benchmarkmitigation mechanisms such as Record and Trust-Based Detection (RTBD), ReliabilityFactor Based Mitigation Mechanism (RFBMM) and Packet Monitoring ConservationAlgorithm (PCMA). The simulation study also depicts that ERFBM on an average,improves the performance of the network by reducing the communication overhead by21%, 29% and 34% more than the three benchmark mitigation mechanisms consideredfor investigation.


Keywords


Available energy metric; exponential reliability factor; Mobile Ad Hoc Network (MANET); moving average method; selfish nodes.

Full Text:

PDF

References


Amir Khusru, Akhtar & Sahoo, G., 2009. Mathematical Model for the Detection of Selfish Nodes in

MANETs,” International Journal of Computer Science and Informatics, 1(3): 25-28.

Azni, A.H., Ahmad, R., Noh Z. A. M., Basari, A. S. H & Hussin, B., 2012. Correlated Node Behavior

Model based on Semi Markov Process for MANETS. IJCSI International Journal of Computer

Science, 9(1): 50-59.

Buchegger, S & Boudec, J-Y., 2002a. Performance Analysis of the CONFIDANT protocol: Cooperation

of Nodes – Fairness in Distributed Ad-hoc Networks. in Proc., 3rd ACM International Symposium

on Mobile ad hoc Networking and Computing (MobiHoc ‘02), New York, USA, 226-236.

Buchegger, S & Boudec, J-Y., 2002b. Nodes bearing Grudges: Towards routing security, Fairness,

and Robustness in Mobile Ad-Hoc Networks. in Proc., Tenth Euro micro workshop on Parallel,

Distributed and Network-based Processing, Canary Islands, Spain, 403-410.

Buttyan, L & Hubaux, J-P., 2003. Stimulating Cooperation in Self–organizing Mobile Ad hoc Networks,”

MONET Journal of Mobile Computing and Networking: 8(1): 579-592.

Campos, C.A.V & de Moraes, L.F.M., 2011. A Markovian Model Representation of Individual Mobility

Scenarios in Ad Hoc Networks and Its Evaluation. EURASIP Journal on Wireless Communications

and Networking, 3(1): 231 –5292.

Cizeron, E., & Hamma, S., 2009. Multipath routing in MANETs using Multiple Description Coding. IEEE

International Conference on Wireless and Mobile Computing, Networking and Communications,

– 287.

Chiejina, E., Xiao, H., & Christianson, B., 2015. A Dynamic Reputation Management System for Mobile

Ad Hoc Networks. Computers, 4(1): 87-112.

Fahad, T. & Askwith, R., 2006. A Node Misbehavior Detection Mechanism for Mobile Ad hoc Networks.

in Proc., Seventh Annual Post Graduate Symposium on the convergence of Telecommunications, Networking and Broadcasting (PGNet), 78-84.

Feeney. L. M., 2001. An Energy Consumption Model for Performance Analysis of Routing Protocols for

Mobile Ad Hoc Networks. ACM Journal of Mobile Networks and Applications, 6(3): 239–249.

Hortelano, J., Carlos T., Calafate, D., Cano, J. C., de Leoni, M, Manzoni, P., & Mecella, M., 2010.

Black-Hole Attacks in P2P Mobile Networks Discovered through Bayesian Filters. OTM 2010

Workshops, LNCS 6428, 543–552,

Kargl, F., Klenk, S., Schlott & Weber, M., 2004. Advanced Detection of Selfish or Malicious Nodes in

Ad hoc Networks. in Proc., First European Workshop on Security in Ad-Hoc and Sensor Network

(ESAS 2004), Heidelberg, Germany, 255-263.

Kim, D. J. J., Aceves, G. L & Obraczka, K., 2003. Routing Mechanisms for Mobile Ad Hoc Networks

based on the Energy Drain Rate. IEEE Transactions on Mobile Computing, 2(2): 161-173.

Kumar, J. M. S., Karthivel. A., Kirubakara. N., Sivaraman. P. & Subramanian. M, 2015, A Unified

Approach for Detecting and Eliminating Selfish Nodes in MANETs using TBUT. Eurasip Journal

on Wireless Communications and Networking, 1(3) : 143-154.

Kumar. K. A., & Bahadhur, S., 2013. Selfish Node Detection in Replica Allocation over MANETs. IOSR

Journal of Computer Engineering (IOSR-JCE), 13(5): 7-13.

Li, Z., Jia, Z, Zhang, R & Wang. H., 2009. Trust-based on-demand multipath routing in mobile ad hoc

networks, Special Issue on Multi Agents and Distributed Information Security, IET Information

Security, 4(4): 212-232.

Li, Z & Shen, H., 2012. Game-theoretic Analysis of Cooperation Incentive Strategies in Mobile Ad Hoc

Network. IEEE Transactions on Mobile Computing 11( 8), 1287-1303.

Marti, S., Giuli, T, J., Lai, K & Baker, M., 2000. Mitigating routing misbehavior in mobile ad hoc

networks. in Proc., 6th ACM Annual International Conference on Mobile Computing and Network

(ACM-MobiCom), Boston, USA, 255-265.

Michiardi. P & Molva. R, 2002, CORE: a collaborative reputation mechanism to enforce node cooperation

in mobile ad hoc networks. in Proc., 6th IFIP Conf. on Security, Communications and Multimedia,

Protoroz, Solvenia, 107-121.

Mukhtar, M. K., 2014. A Collaborative Contact-based Watch dog for detecting Selfish Nodes in

Cooperative MANETs. An International Journal of Research in Engineering and Technology, 3(11):

-442.

Niu, B. H., Zhao, V & Jiang, H., 2011. A Cooperation Stimulation Strategy in Wireless Multicast

Networks,” IEEE Transactions on Signal Processing, 59(5): 2355-2369.

Orallo, H, E., Manuel D., Olmos, S., Cano, J., C., & Calafate & Manzoni, T., 2012. Improving Selfish

Node Detection in MANETs Using a collaborative Watchdog. IEEE Communication Letters, 16(5):

-645.

Orallo, H, E., Manuel D., Olmos, S., Cano, J., C., & Manzoni, P., 2014. A Fast Model for Evaluating

the Detection of Selfish Nodes Using a Collaborative Approach in MANETs. Wireless Personal

Communications, 74(3): 1099-1116.

Patil, P. A., Kanth, B. S. R., Kumar, M. P. D & Malavika. J. 2011. Design of Energy Efficient Routing

protocols for MANETs. International Journal of Computer Science, 8(1): 215-220.

Pusphalatha, M., Revathy, V & Rama Rao, P., 2009. Trust based Energy aware reliable reactive protocol

in mobile ad hoc networks. World Academy of Science, Engineering and Technology, 3(27): 335-

Roy, D. P., & Chaki, R., 2011a. Detection of Denial of Service Attack Due to Selfish Nodes in MANET by Mobile Agent, CCIS 162, Springer Verlag pp. 14-23.

Roy, D. P., & Chaki, R., 2011b. MADSN Mobile Agent Based Detection of Selfish Node in MANET.

International Journal of Wireless & Mobile Network, 3( 4), 225-235.

Sengathir, J & Manoharan, R., 2014 A reliability factor based mathematical model for isolating

selfishness in MANETs’, International Journal of Information and Communication Technology,

(3/4): 403-421.

Subramaniyan, S., Johnson. W & Subramaniyan, K., 2014 A distributed framework for detecting

selfish nodes in MANET using Record- and Trust-Based Detection (RTBD) Technique. EURASIP

Journal on Wireless Communications and Networking, 1(1): 205-211.

Wang, B., Soltani, S., Shapiro, J. K & Tan, P. K., 2005. Local Detection of Selfish Routing Behavior in

Ad hoc Networks. in Proc., 8th IEEE International Conference on Parallel Architectures, Algorithms

and Networks, 1(1): 16-22.

Wang, W & Li, X. Y., 2006. Low-Cost Routing in Selfish and Rational Wireless Ad Hoc Networks,” IEEE

Transactions on Mobile Computing, 5(5), pp. 596-607.


Refbacks

  • There are currently no refbacks.