Exponential reliability factor based mitigation mechanism for selfish nodes in MANETs
Abstract
Reliable dissemination of data in mobile ad hoc networks mainly depends on thecooperation among all the active mobile nodes present in the network. However,enforcing a node to cooperate with all the other mobile nodes is a difficult task.Moreover, the mobile nodes in an ad hoc network have limited battery power and hencethey refuse to forward their neighbor nodes’ packets so as to conserve their energy.This intentional selfish behavior of mobile nodes reduces the degree of cooperationbetween active mobile nodes which in turn affects the network performance. Hence,a need arises for formulating a reputation mechanism which helps in isolating selfishnodes in MANETs. In this paper, we propose an Exponential Reliability FactorBased Mitigation Mechanism (ERFBM) for detecting and isolating selfish nodes.This ERFBM efficiently isolates selfish nodes with the aid of Exponential ReliabilityFactor (ERF) computed based on the first and second hand information obtainedfrom the mobile nodes. The effective performance of ERFBM is extensively studiedthrough ns-2 simulations and the results obtained clearly portray that the proposedERFBM isolates selfish nodes at a faster rate of 36% than the considered benchmarkmitigation mechanisms such as Record and Trust-Based Detection (RTBD), ReliabilityFactor Based Mitigation Mechanism (RFBMM) and Packet Monitoring ConservationAlgorithm (PCMA). The simulation study also depicts that ERFBM on an average,improves the performance of the network by reducing the communication overhead by21%, 29% and 34% more than the three benchmark mitigation mechanisms consideredfor investigation.
References
Amir Khusru, Akhtar & Sahoo, G., 2009. Mathematical Model for the Detection of Selfish Nodes in
MANETs,” International Journal of Computer Science and Informatics, 1(3): 25-28.
Azni, A.H., Ahmad, R., Noh Z. A. M., Basari, A. S. H & Hussin, B., 2012. Correlated Node Behavior
Model based on Semi Markov Process for MANETS. IJCSI International Journal of Computer
Science, 9(1): 50-59.
Buchegger, S & Boudec, J-Y., 2002a. Performance Analysis of the CONFIDANT protocol: Cooperation
of Nodes – Fairness in Distributed Ad-hoc Networks. in Proc., 3rd ACM International Symposium
on Mobile ad hoc Networking and Computing (MobiHoc ‘02), New York, USA, 226-236.
Buchegger, S & Boudec, J-Y., 2002b. Nodes bearing Grudges: Towards routing security, Fairness,
and Robustness in Mobile Ad-Hoc Networks. in Proc., Tenth Euro micro workshop on Parallel,
Distributed and Network-based Processing, Canary Islands, Spain, 403-410.
Buttyan, L & Hubaux, J-P., 2003. Stimulating Cooperation in Self–organizing Mobile Ad hoc Networks,”
MONET Journal of Mobile Computing and Networking: 8(1): 579-592.
Campos, C.A.V & de Moraes, L.F.M., 2011. A Markovian Model Representation of Individual Mobility
Scenarios in Ad Hoc Networks and Its Evaluation. EURASIP Journal on Wireless Communications
and Networking, 3(1): 231 –5292.
Cizeron, E., & Hamma, S., 2009. Multipath routing in MANETs using Multiple Description Coding. IEEE
International Conference on Wireless and Mobile Computing, Networking and Communications,
– 287.
Chiejina, E., Xiao, H., & Christianson, B., 2015. A Dynamic Reputation Management System for Mobile
Ad Hoc Networks. Computers, 4(1): 87-112.
Fahad, T. & Askwith, R., 2006. A Node Misbehavior Detection Mechanism for Mobile Ad hoc Networks.
in Proc., Seventh Annual Post Graduate Symposium on the convergence of Telecommunications, Networking and Broadcasting (PGNet), 78-84.
Feeney. L. M., 2001. An Energy Consumption Model for Performance Analysis of Routing Protocols for
Mobile Ad Hoc Networks. ACM Journal of Mobile Networks and Applications, 6(3): 239–249.
Hortelano, J., Carlos T., Calafate, D., Cano, J. C., de Leoni, M, Manzoni, P., & Mecella, M., 2010.
Black-Hole Attacks in P2P Mobile Networks Discovered through Bayesian Filters. OTM 2010
Workshops, LNCS 6428, 543–552,
Kargl, F., Klenk, S., Schlott & Weber, M., 2004. Advanced Detection of Selfish or Malicious Nodes in
Ad hoc Networks. in Proc., First European Workshop on Security in Ad-Hoc and Sensor Network
(ESAS 2004), Heidelberg, Germany, 255-263.
Kim, D. J. J., Aceves, G. L & Obraczka, K., 2003. Routing Mechanisms for Mobile Ad Hoc Networks
based on the Energy Drain Rate. IEEE Transactions on Mobile Computing, 2(2): 161-173.
Kumar, J. M. S., Karthivel. A., Kirubakara. N., Sivaraman. P. & Subramanian. M, 2015, A Unified
Approach for Detecting and Eliminating Selfish Nodes in MANETs using TBUT. Eurasip Journal
on Wireless Communications and Networking, 1(3) : 143-154.
Kumar. K. A., & Bahadhur, S., 2013. Selfish Node Detection in Replica Allocation over MANETs. IOSR
Journal of Computer Engineering (IOSR-JCE), 13(5): 7-13.
Li, Z., Jia, Z, Zhang, R & Wang. H., 2009. Trust-based on-demand multipath routing in mobile ad hoc
networks, Special Issue on Multi Agents and Distributed Information Security, IET Information
Security, 4(4): 212-232.
Li, Z & Shen, H., 2012. Game-theoretic Analysis of Cooperation Incentive Strategies in Mobile Ad Hoc
Network. IEEE Transactions on Mobile Computing 11( 8), 1287-1303.
Marti, S., Giuli, T, J., Lai, K & Baker, M., 2000. Mitigating routing misbehavior in mobile ad hoc
networks. in Proc., 6th ACM Annual International Conference on Mobile Computing and Network
(ACM-MobiCom), Boston, USA, 255-265.
Michiardi. P & Molva. R, 2002, CORE: a collaborative reputation mechanism to enforce node cooperation
in mobile ad hoc networks. in Proc., 6th IFIP Conf. on Security, Communications and Multimedia,
Protoroz, Solvenia, 107-121.
Mukhtar, M. K., 2014. A Collaborative Contact-based Watch dog for detecting Selfish Nodes in
Cooperative MANETs. An International Journal of Research in Engineering and Technology, 3(11):
-442.
Niu, B. H., Zhao, V & Jiang, H., 2011. A Cooperation Stimulation Strategy in Wireless Multicast
Networks,” IEEE Transactions on Signal Processing, 59(5): 2355-2369.
Orallo, H, E., Manuel D., Olmos, S., Cano, J., C., & Calafate & Manzoni, T., 2012. Improving Selfish
Node Detection in MANETs Using a collaborative Watchdog. IEEE Communication Letters, 16(5):
-645.
Orallo, H, E., Manuel D., Olmos, S., Cano, J., C., & Manzoni, P., 2014. A Fast Model for Evaluating
the Detection of Selfish Nodes Using a Collaborative Approach in MANETs. Wireless Personal
Communications, 74(3): 1099-1116.
Patil, P. A., Kanth, B. S. R., Kumar, M. P. D & Malavika. J. 2011. Design of Energy Efficient Routing
protocols for MANETs. International Journal of Computer Science, 8(1): 215-220.
Pusphalatha, M., Revathy, V & Rama Rao, P., 2009. Trust based Energy aware reliable reactive protocol
in mobile ad hoc networks. World Academy of Science, Engineering and Technology, 3(27): 335-
Roy, D. P., & Chaki, R., 2011a. Detection of Denial of Service Attack Due to Selfish Nodes in MANET by Mobile Agent, CCIS 162, Springer Verlag pp. 14-23.
Roy, D. P., & Chaki, R., 2011b. MADSN Mobile Agent Based Detection of Selfish Node in MANET.
International Journal of Wireless & Mobile Network, 3( 4), 225-235.
Sengathir, J & Manoharan, R., 2014 A reliability factor based mathematical model for isolating
selfishness in MANETs’, International Journal of Information and Communication Technology,
(3/4): 403-421.
Subramaniyan, S., Johnson. W & Subramaniyan, K., 2014 A distributed framework for detecting
selfish nodes in MANET using Record- and Trust-Based Detection (RTBD) Technique. EURASIP
Journal on Wireless Communications and Networking, 1(1): 205-211.
Wang, B., Soltani, S., Shapiro, J. K & Tan, P. K., 2005. Local Detection of Selfish Routing Behavior in
Ad hoc Networks. in Proc., 8th IEEE International Conference on Parallel Architectures, Algorithms
and Networks, 1(1): 16-22.
Wang, W & Li, X. Y., 2006. Low-Cost Routing in Selfish and Rational Wireless Ad Hoc Networks,” IEEE
Transactions on Mobile Computing, 5(5), pp. 596-607.