Random Feedbacks for Selfish Nodes Detection in Mobile Ad Hoc Networks

  • Djamel Djenouri
  • Nabil Ouali
  • Ahmed Mahmoudi
  • Nadjib Badache
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3751)


A mobile ad hoc network (MANET) is a temporary infrastructureless network, formed by a set of mobile hosts that dynamically establish their own network on the fly without relying on any central administration. Mobile hosts used in MANET have to ensure the services ensured by the powerful fixed infrastructure in traditional networks, the packet forwarding is one of these services.

Resource limitation of MANET’s nodes, particulary in energy supply, along with the multi-hop nature of these networks may cause a new problem that does not exist in traditional networks. To save its energy a node may behave selfishly(no-cooperatively), thus it misbehaves by not forwarding packets originated from other nodes, while using their resources to forward its own packets to remote recipients. Such a behavior hugely threatens the QoS (Quality of Service), and particulary the packet forwarding service availability. Some solutions for selfish nodes detection have been recently proposed, but almost all these solutions rely on the monitoring in the promiscuous mode technique of the watchdog [1], which suffers from many problems especially when using the power control technique. In this paper we propose a new approach to detect selfish nodes unwilling to participate in packet forwarding, that mitigates some watchdog’s problems. We also assess the performance of our solution by simulation.


mobile ad-hoc networks security selfishness packet forwarding GloMoSim 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: ACM Mobile Computing and Networking, MOBICOM 2000, pp. 255–265 (2000)Google Scholar
  2. 2.
    Buttyan, L., Hubaux, J.P.: Stimulating cooperation in self-organizing mobile ad hoc networks. ACM/Kluwer Mobile Networks and Applications 8(5) (2003)Google Scholar
  3. 3.
    David, B., David, A.: Dynamic source routing in ad hoc wireless networks. Mobile Computing, ch. 5, 153–181 (1996)Google Scholar
  4. 4.
    Djenouri, D., Badache, N.: New power-aware routing for mobile ad hoc networks. Accepted in the International Journal of Ad Hoc and Ubiquitous Computing, Inderscience (2005) (to appear)Google Scholar
  5. 5.
    Doshi, S., Brown, T.: Minimum energy routing schemes for a wireless ad hoc network. In: IEEE INFOCOM 2002 (2002) Google Scholar
  6. 6.
    Djenouri, D., Badache, N.: Simulation performance evaluation of an energy efficient routing protocol for mobile ad hoc networks. In: IEEE International Conference on Pervasive Services (ICPS 2004), American University of Beirut (AUB), Lebanon (2004)Google Scholar
  7. 7.
    Yang, H., Meng, X., Lu, S.: Self-organized network layer security in mobile ad hoc networks. In: ACM MOBICOM Wireless Security Workshop (WiSe 2002), Georgia, Atlanta, USA (2002)Google Scholar
  8. 8.
    Michiardi, P., Molva, R.: Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Communication and Multimedia Security 2002 Conference, Portoroz, Slovenia (2002) Google Scholar
  9. 9.
    Buchegger, S., Boudec, J.Y.L.: Performance analysis of the confidant, protocol cooperation of nodes fairness in dynamic ad hoc networks. In: Third ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2002), Lausanne, Switzerland, pp. 80–91 (2002)Google Scholar
  10. 10.
    Buchegger, S., Le-Boudec, J.Y.: A robust reputation system for p2p and mobile ad-hoc networks. In: Second Workshop on the Economics of Peer-to-Peer Systems (2004) Google Scholar
  11. 11.
    Buttyan, L., Hubaux, J.P.: Nuglets: a virtual currency to stimulate cooperation in self-organized mobile ad hoc networks. Technical report No. DSC/2001/001, Swiss Federal Institution of Technology, Lausanne, Switzerland (2001) Google Scholar
  12. 12.
    Srinivasan, V., Nuggehalli, P., F.Chiasserini, C., R.Rao, R.: Cooperation in wireless ad hoc networks. In: IEEE INFOCOM 2003, San Francisco, California, USA (2003) Google Scholar
  13. 13.
    Papadimitratos, P., Haas, Z.J.: Secure data transmission in mobile ad hoc networks. In: ACM MOBICOM Wireless Security Workshop (WiSe 2003), San Diego, California, USA (2003) Google Scholar
  14. 14.
    Kargl, F., Klenk, A., Weber, M., Schlott, S.: Advanced detection of selfish or malicious nodes in ad hoc networks. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, vol. 3313, pp. 152–165. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  15. 15.
    Capkun, S., Buttyan, L., Hubaux, J.P.: Self-organized public-key management for mobile ad hoc networks. IEEE Transactions on Mobile Computing 2(1), 52–64 (2003)CrossRefGoogle Scholar
  16. 16.
    Weimerskirch, A., Westhoff, D.: Zero common-knowledge authentication for pervasive networks. Selected Areas in Cryptography, 73–87 (2003)Google Scholar
  17. 17.
    Zeng, X., Bagrodia, R., Gerla, M.: Glomosim: A library for the parallel simulation of large-scale wireless networks. In: Proceeding of the 12th Workshop on Parallel and distributed Simulation, PADS 1998 (1998)Google Scholar
  18. 18.
    Djenouri, D., Derhab, A., Badache, N.: Ad hoc networks routing protocols and mobility. International Arab jornal of Information Technology (2005) (to appear)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Djamel Djenouri
    • 1
  • Nabil Ouali
    • 2
  • Ahmed Mahmoudi
    • 2
  • Nadjib Badache
    • 2
  1. 1.Basic Software LaboratoryCERIST Center of researchAlgiersAlgeria
  2. 2.LSIUSTHB UniversityAlgiersAlgeria

Personalised recommendations