Abstract
Reliable dissemination of data in mobile ad hoc networks mainly depends on the cooperation among all the active mobile nodes present in the network. However, enforcing a node to cooperate with all the other mobile nodes is a difficult task. Moreover, the mobile nodes in an ad hoc network have limited battery power and hence they refuse to forward their neighbor nodes’ packets so as to conserve their energy. This intentional selfish behavior of mobile nodes reduces the degree of cooperation between active mobile nodes which in turn affects the network performance. Hence, a need arises for formulating a reputation mechanism which helps in isolating selfish nodes in MANETs. In this paper, we propose an Exponential Reliability Factor Based Mitigation Mechanism (ERFBM) for detecting and isolating selfish nodes. This ERFBM efficiently isolates selfish nodes with the aid of Exponential Reliability Factor (ERF) computed based on the first and second hand information obtained from the mobile nodes. The effective performance of ERFBM is extensively studied through ns-2 simulations and the results obtained clearly portray that the proposed ERFBM isolates selfish nodes at a faster rate of 36% than the considered benchmark mitigation mechanisms such as Record and Trust-Based Detection (RTBD), Reliability Factor Based Mitigation Mechanism (RFBMM) and Packet Monitoring Conservation Algorithm (PCMA). The simulation study also depicts that ERFBM on an average, improves the performance of the network by reducing the communication overhead by 21%, 29% and 34% more than the three benchmark mitigation mechanisms considered for investigation.
Article PDF
Similar content being viewed by others
Avoid common mistakes on your manuscript.
References
Amir Khusru, Akhtar & Sahoo, G., 2009. Mathematical Model for the Detection of Selfish Nodes in MANETs,” International Journal of Computer Science and Informatics, 1(3): 25–28.
Azni, A.H., Ahmad, R., Noh Z. A. M., Basari, A. S. H & Hussin, B., 2012. Correlated Node Behavior Model based on Semi Markov Process for MANETS. IJCSI International Journal of Computer Science, 9(1): 50–59.
Buchegger, S & Boudec, J-Y., 2002a. Performance Analysis of the CONFIDANT protocol: Cooperation of Nodes—Fairness in Distributed Ad-hoc Networks. in Proc., 3rd ACM International Symposium on Mobile ad hoc Networking and Computing (MobiHoc ‘02), New York, USA, 226–236.
Buchegger, S & Boudec, J-Y., 2002b. Nodes bearing Grudges: Towards routing security, Fairness, and Robustness in Mobile Ad-Hoc Networks. in Proc., Tenth Euro micro workshop on Parallel, Distributed and Network-based Processing, Canary Islands, Spain, 403–410.
Buttyan, L & Hubaux, J-P., 2003. Stimulating Cooperation in Self–organizing Mobile Ad hoc Networks,” MONET Journal of Mobile Computing and Networking: 8(1): 579–592.
Campos, C.A.V & de Moraes, L.F.M., 2011. A Markovian Model Representation of Individual Mobility Scenarios in Ad Hoc Networks and Its Evaluation. EURASIP Journal on Wireless Communications and Networking, 3(1): 231–5292.
Cizeron, E., & Hamma, S., 2009. Multipath routing in MANETs using Multiple Description Coding. IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, 282–287.
Chiejina, E., Xiao, H., & Christianson, B., 2015. A Dynamic Reputation Management System for Mobile Ad Hoc Networks. Computers, 4(1): 87–112.
Fahad, T. & Askwith, R., 2006. A Node Misbehavior Detection Mechanism for Mobile Ad hoc Networks. in Proc., Seventh Annual Post Graduate Symposium on the convergence of Telecommunications, Networking and Broadcasting (PGNet), 78–84.
Feeney, L. M., 2001. An Energy Consumption Model for Performance Analysis of Routing Protocols for Mobile Ad Hoc Networks. ACM Journal of Mobile Networks and Applications, 6(3): 239–249.
Hortelano, J., Carlos T., Calafate, D., Cano, J. C., de Leoni, M, Manzoni, P., & Mecella, M., 2010. Black-Hole Attacks in P2P Mobile Networks Discovered through Bayesian Filters. OTM 2010 Workshops, LNCS 6428, 543–552,
Kargl, F., Klenk, S., Schlott & Weber, M., 2004. Advanced Detection of Selfish or Malicious Nodes in Ad hoc Networks. in Proc., First European Workshop on Security in Ad-Hoc and Sensor Network (ESAS 2004), Heidelberg, Germany, 255–263.
Kim, D. J. J., Aceves, G. L & Obraczka, K., 2003. Routing Mechanisms for Mobile Ad Hoc Networks based on the Energy Drain Rate. IEEE Transactions on Mobile Computing, 2(2): 161–173.
Kumar, J. M. S., Karthivel. A., Kirubakara. N., Sivaraman. P. & Subramanian. M, 2015, A Unified Approach for Detecting and Eliminating Selfish Nodes in MANETs using TBUT. Eurasip Journal on Wireless Communications and Networking, 1(3): 143–154.
Kumar, K. A., & Bahadhur, S., 2013. Selfish Node Detection in Replica Allocation over MANETs. IOSR Journal of Computer Engineering (IOSR-JCE), 13(5): 7–13.
Li, Z., Jia, Z, Zhang, R & Wang. H., 2009. Trust-based on-demand multipath routing in mobile ad hoc networks, Special Issue on Multi Agents and Distributed Information Security, IET Information Security, 4(4): 212–232.
Li, Z & Shen, H., 2012. Game-theoretic Analysis of Cooperation Incentive Strategies in Mobile Ad Hoc Network. IEEE Transactions on Mobile Computing 11(8), 1287–1303.
Marti, S., Giuli, T, J., Lai, K & Baker, M., 2000. Mitigating routing misbehavior in mobile ad hoc networks. in Proc., 6th ACM Annual International Conference on Mobile Computing and Network (ACM-MobiCom), Boston, USA, 255–265.
Michiardi. P & Molva. R, 2002, CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. in Proc., 6th IFIP Conf. on Security, Communications and Multimedia, Protoroz, Solvenia, 107–121.
Mukhtar, M. K., 2014. A Collaborative Contact-based Watch dog for detecting Selfish Nodes in Cooperative MANETs. An International Journal of Research in Engineering and Technology, 3(11):437–442.
Niu, B. H., Zhao, V & Jiang, H., 2011. A Cooperation Stimulation Strategy in Wireless Multicast Networks,” IEEE Transactions on Signal Processing, 59(5): 2355–2369.
Orallo, H, E., Manuel D., Olmos, S., Cano, J., C., &Calafate & Manzoni, T., 2012. Improving Selfish Node Detection in MANETs Using a collaborative Watchdog. IEEE Communication Letters, 16(5):642–645.
Orallo, H, E., Manuel D., Olmos, S., Cano, J., C., & Manzoni, P., 2014. A Fast Model for Evaluating the Detection of Selfish Nodes Using a Collaborative Approach in MANETs. Wireless Personal Communications, 74(3): 1099–1116.
Patil, P. A., Kanth, B. S. R., Kumar, M. P. D & Malavika. J. 2011. Design of Energy Efficient Routing protocols for MANETs. International Journal of Computer Science, 8(1): 215–220.
Pusphalatha, M., Revathy, V & Rama Rao, P., 2009. Trust based Energy aware reliable reactive protocol in mobile ad hoc networks. World Academy of Science, Engineering and Technology, 3(27): 335–338.
Roy, D. P., & Chaki, R., 2011a. Detection of Denial of Service Attack Due to Selfish Nodes in MANET by Mobile Agent, CCIS 162, Springer Verlag pp. 14–23.
Roy, D. P., & Chaki, R., 2011b. MADSN Mobile Agent Based Detection of Selfish Node in MANET. International Journal of Wireless & Mobile Network, 3(4), 225–235.
Sengathir, J & Manoharan, R., 2014 A reliability factor based mathematical model for isolating selfishness in MANETs’, International Journal of Information and Communication Technology, 6(3/4): 403–421.
Subramaniyan, S., Johnson. W & Subramaniyan, K., 2014 A distributed framework for detecting selfish nodes in MANET using Record- and Trust-Based Detection (RTBD) Technique. EURASIP Journal on Wireless Communications and Networking, 1(1): 205–211.
Wang, B., Soltani, S., Shapiro, J. K & Tan, P. K., 2005. Local Detection of Selfish Routing Behavior in Ad hoc Networks. in Proc., 8th IEEE International Conference on Parallel Architectures, Algorithms and Networks, 1(1): 16–22.
Wang, W & Li, X. Y., 2006. Low-Cost Routing in Selfish and Rational Wireless Ad Hoc Networks,” IEEE Transactions on Mobile Computing, 5(5), pp. 596–607.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made.
The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.
To view a copy of this licence, visit https://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Sengathir, J., Manoharan, R. Exponential reliability factor based mitigation mechanism for selfish nodes in MANETs. J Engin Res 4, 3 (2016). https://doi.org/10.7603/s40632-016-0003-5
Revised:
Accepted:
Published:
DOI: https://doi.org/10.7603/s40632-016-0003-5