Skip to main content

A Novel Approach for Non-cooperative Node Detection and Avoidance Using Reputation-Based Scheme in Mobile Ad hoc Network

  • Conference paper
  • First Online:
Computational Advancement in Communication Circuits and Systems

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 335))

Abstract

A mobile ad hoc network (MANET) is a collection of wireless mobile nodes that form a dynamic network without the need for any infrastructure. Due to the dynamic nature of MANET, it is prone to different kinds of malicious attacks. In order to pursue secure communication in such networks, there are many research solutions proposed for detecting and avoiding such malicious activities. As we know, MANET works properly if participating nodes cooperate in routing and forwarding. However, a node may decide not to cooperate just to save its resources but still use network to relay its traffic. In this scenario, we propose a reputation-based strategy to detect non-cooperative or selfish nodes and to select proper forwarder node for improving overall packet delivery of the network. Moreover, our proposed solution ensures data integrity. We have also done survey and performance analysis on some existing malicious attacks detection and prevention techniques available. The entire simulation has been done using the Network Simulator (NS-2) (http://www.isi.edu/nsnam/ns/) and simulation results show better delivery compared to some of other existing techniques discussed in the papers by Khamayseh et al. (J Netw 7(1):116–125, 2012), Marti et al. (Proceedings of International Conference on Mobile Computing and Networking (MOBICOM’OO), 255–265, 2000), Woungang et al. (Proceedings of IEEE Conference, 2012) and Hu et al. (IEEE J Sel Areas Commun 24(2):307–380, 2006).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. P. Michiardi, R. Molva, CORE: A Collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks, in Proceedings of IFIP-Communication and Multimedia Security Conference (2002)

    Google Scholar 

  2. NS2 simulation package, http://www.isi.edu/nsnam/ns/

  3. Y. Khamayseh, R. Al-Salah, M.B. Yassein, Malicious nodes detection in MANETs: behavioral analysis approach. J. Netw. 7(1), 116–125 (2012)

    Google Scholar 

  4. S. Marti, T.J. Giuli, K. Lai, M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in Proceedings of International Conference on Mobile Computing and Networking (MOBICOM’OO) (2000), pp. 255–265

    Google Scholar 

  5. I. Woungang, S.K. Dhurandher, R.D. Peddi, M.S. Obaidat, Detecting blackhole attacks on DSR-based mobile ad hoc networks, in Proceedings of IEEE Conference (2012)

    Google Scholar 

  6. Y.-C. Hu, A. Perrig, D. Johnson, Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24(2), 370–380 (2006)

    Google Scholar 

  7. E.M. Shakshuki, N. Kang, T.R. Sheltami, EAACK—a secure intrusion-detection system for MANETs. IEEE Trans. Ind. Electron. 60(3), 1089–1098 (2013)

    Google Scholar 

  8. J.W. Huang, I. Woungang, H.C. Chao, M.S. Obaidat, T.Y. Chi, S.K. Dhurandher, Multi-path trust-based secure AOMDV routing in ad hoc networks, in Proceeedings of IEEE Globecom (2011), pp. 1–5

    Google Scholar 

  9. C. Chakrabarti, R. Chaki, Improved cluster based route discovery algorithm for ad-hoc networks, in Proceedings of IEEE ICCIA (2011), pp. 1–4

    Google Scholar 

  10. C. Chakrabarti, A. Banerjee, S. Roy, An observer-based distributed scheme for selfish-node detection in a post-disaster communication environment using delay tolerant network, in Proceedings of IEEE AIMoC (2014), pp. 151–156

    Google Scholar 

  11. A. Nadeem, M.P. Howarth, A survey of MANET intrusion detection and prevention approaches for network layer attacks. IEEE Commun. Surv. Tutorials 15(4), 2027–2045 (2013)

    Google Scholar 

  12. M. Alsaadi, Y. Qian, Performance study of a secure routing protocol in wireless mobile ad hoc networks, in 2nd International Symposium on Wireless Pervasive Computing (IEEE Computer Society, New York, 2007), pp. 425–430

    Google Scholar 

  13. G. Bella, G. Costantino, S. Riccobene, Evaluating the device reputation through full observation in MANETs, J. Inf. Assur. Secur. 4, 458–465 (2009)

    Google Scholar 

  14. S. Arya, C. Arya, Malicious nodes detection in mobile ad hoc networks, J. Inf. Oper. Manag. 3(1), 210–221 (2012) ISSN: 0976–7754 & E-ISSN: 0976–7762

    Google Scholar 

  15. Z. Gao, H. Zhu, S. Du, C. Xiao , R. Lu, PMDS: a probabilistic misbehavior detection scheme in DTN, in IEEE ICC 2012—Wireless Networks Symposium (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chandrima Chakrabarti .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this paper

Cite this paper

Chakrabarti, C., Banerjee, A., Chakrabarti, S., Chakraborty, A. (2015). A Novel Approach for Non-cooperative Node Detection and Avoidance Using Reputation-Based Scheme in Mobile Ad hoc Network. In: Maharatna, K., Dalapati, G., Banerjee, P., Mallick, A., Mukherjee, M. (eds) Computational Advancement in Communication Circuits and Systems. Lecture Notes in Electrical Engineering, vol 335. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2274-3_31

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2274-3_31

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2273-6

  • Online ISBN: 978-81-322-2274-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics