Abstract
A class of networks provides wireless services that present a promising solution to address technical issues in regions where at the time of transmission, an end-to-end path does not exist betwixt the sender and the receiver. In such networks, a node misbehaves by dropping packets or not forwarding the packets of other nodes even when it has sufficient buffer. The nodes showing this kind of behavior are termed as selfish nodes. These nodes are unwilling to use their own resources (i.e., buffer and power) when they forward the packets of other nodes. Selfish nodes reduce packet delivery ratio and waste system resources, i.e., bandwidth and power, which in turn increases the overhead. In this paper, we present a reputation-based approach that helps to remit the selfish behavior of the network nodes. According to the simulation results, mitigation of selfish nodes leads to high delivery probability and lower overhead ratio.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Miao J, Hasan O, Mokhtar SB, Brunie L, Yim K (2012) An analysis of strategies for preventing selfish behavior in mobile delay tolerant networks
Lee SB, Pan G, Park J-S, Gerla M, Lu S (2007) Secure incentives for commercial ad dissemination in vehicular networks. In: Proceedings of MobiHoc, pp 150–159
Aravindha K, Senthil Kumar A (2017) An analysis of dynamic delay tolerant network strategies for preventing selfish behavior network 5(3):20–25
Mehto A, Chawla M (2013) Comparing delay tolerant network routing protocols for optimizing L-copies in spray and wait routing for minimum delay
Buttyan L, Dora L, Felegyhazi M, Vajda I (2010) Barter trade improves message delivery in opportunistic networks. Ad Hoc Netw 8(1):1–14
Buttyan L, Dora L, Felegyhazi M, Vajda I (2007) Barter-based cooperation in delay-tolerant personal wireless networks. In: IEEE international symposium on a world of wireless, mobile and multimedia networks, 2007. WoWMoM 2007, pp 1–6
Dini G, Duca AL (2010) A reputation-based approach to tolerate misbehaving carriers in delay tolerant networks. In: IEEE symposium computers and communications (ISCC)
Zhong S, Chen J, Yang Y (2003) Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: Twenty-second annual joint conference of the IEEE computer and communications (INFOCOM 2003), vol 3
Zhang Y, Lou W, Liu W, Fang Y (2007) A secure incentive protocol for mobile ad hoc networks. Wirel Netw 13(5):569–582
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sharma, A., Mittal, A., Arora, S., Nagrath, P. (2019). A Decentralized Self-detection Mechanism to Defend Selfish Behavior in Spray and Wait Protocol. In: Bhattacharyya, S., Hassanien, A., Gupta, D., Khanna, A., Pan, I. (eds) International Conference on Innovative Computing and Communications. Lecture Notes in Networks and Systems, vol 55. Springer, Singapore. https://doi.org/10.1007/978-981-13-2324-9_9
Download citation
DOI: https://doi.org/10.1007/978-981-13-2324-9_9
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-2323-2
Online ISBN: 978-981-13-2324-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)