Abstract
Mobile ad hoc network (MANET) is a network that permits mobile servers and customers to convey without fixed infrastructure. MANET is a promptly developing region of investigation as it employs a group of uses. To encourage effective information access and update data sets are conveyed on MANET. Since information openness is influenced by the portability and power imperatives of the servers and customers, the information in MANET is reproduced. As in ad hoc network, since portable host moves unreservedly network panel happens habitually in this way information accessibility is decreased bringing about execution debasement. The majority of the replication strategies expect that each node advances each packet provided to it and combine completely as far as sharing the memory space. A portion of the nodes may go about as selfish nodes which may selfishly conclude and participate incompletely with all the different nodes. In this manner, selfish conduct of nodes could lessen the general information openness in the network. At first, a design model of a MANET is built and the correspondence between the versatile is started. The packet drop can occur in MANET because of the selfish node or network clog. In this paper, MSD-SNDT and MBD-SNDT method is proposed to recognize the selfish nodes effectively in MANET. The reproduction study shows that the proposed MSD-SNDT and MBD-SNDT strategy improves the selfish node detection ratio, packet delivery proportion (PDP), and normal packet drop proportion.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Santhosh Kumari D, Thirunadana Sikamani K (2015) Revival of selfish nodes in clustered MANET. Int J Adv Eng Technol 8(3):412-419. (ISSN: 2231-1963)
Fogue M, Garrido P, Martinez FJ, Cano JC, Calafate CT, Manzoni P (2015) CoCoWa: a collaborative contact-based watchdog for detecting selfish nodes. IEEE Trans Mob Comput 14(6):1162–1175. (P-ISSN: 1536-1233, E-ISSN: 1558-0660)
Xia H, Jia Z, Li X, Ju L, Sha EH-M (2013) Trust prediction and trust-based source routing in mobile ad hoc networks. Elsevier- Ad Hoc Netw 11, 2013, pp 2096–2114. (ISSN: 1570-8705)
Annamalai Giri A, Mohan E (2018) Distributed attack detection for wireless sensor networks. Int J Eng Technol 7(6):465–468. (ISSN: 2227-524X)
Zouridaki C, Mark B L, Hejmo M, Thomas RK (2005) A quantitative trust establishment framework for reliable data packet delivery in MANETs. In: Proceedings of ACM SASN, pp 1–10
Sengathir J, Manoharan R (2015) A futuristic trust coefficient-based semi- Markov prediction model for mitigating selfish nodes in MANETs. Springer Open J EURASIP J Wirel Commun Netw 2015(1):1–13. (ISSN: 1687-1499, 1687-1472)
Tarannum R, Pandey Y (2012) Detection and deletion of selfish MANET nodes-a distributed approach. In: 2012 1st International conference on recent advances in information technology (RAIT), IEEE Xplore May 2012, pp 45–56. (E-ISBN: 978-1-4577-0697-4:P-ISBN: 978-1-4577-0694-3)
Sengathir J, Manoharan R (2016) Exponential reliability factor based mitigation mechanism for selfish nodes in MANETs. J Eng Res 4(1):67–78. (ISSN: 2307-1877 Online ISSN: 2307-1885)
Karthikayen A, Selvakumar Raja S (2018) A skellam distribution inspired trust factor-based selfish node detection technique in MANETs. J Adv Res Dyn Control Syst JARDCS 10(13-Special Issue):940–949. ISSN: 1943-023X
Tamilarasan S, Aramudan M (2011) A performance and analysis of misbehaving node in MANET using intrusion detection system. IJCSNS Int J Comput Sci Netw Secur 11(5):258–264. ISSN: 1738-7906
Ali R, Griggio A, Franzén A, Dalpiaz F, Giorgini P (2012) Optimizing monitoring requirements in self-adaptive systems. In: International conference on exploring modeling methods for systems analysis and design, pp 362–377, book series—Lecture notes in business information processing book series LNBIP, vol 113. https://link.springer.com/chapter/10.1007/978-3-642-31072-0_25
Capkun S, Buttyan L, Hubaux JP (2003) Self-organized public-key management for mobile ad hoc networks. IEEE Trans Mob Comput 2(1):52–64. https://doi.org/10.1109/tmc.2003.1195151. P-ISSN: 1536-1233, E-ISSN: 1558-0660
Zhang Y (2011) An energy efficient-based AODVM routing in MANET. In: International conference on information and management engineering innovative computing and information, pp 66–72, book series—Communications in computer and information science CCIS, vol me 232
El-Bendary AM, Mohsen, Shen, Xuemin Sherman (2014) Secure routing protocols. In: Security for multi-hop wireless networks, pp 63–93. https://www.springer.com/gp/book/9783319046020
Cano J-C, Manzoni P, Kim D, Toh C-K (2007) A low-complexity routing algorithm with power control for self-organizing short-range wireless networks. Springer Wirel Pers Commun Int J 41:407–425. https://doi.org/10.1007/s11277-006-9150-6. EISSN 1572-834X, PISSN 0929-6212
Ramya K, Kavitha T (2016) Deterring selfish nodes using hierarchical account-aided reputation system in MANET. In: International conference on computing technologies and intelligent data engineering (ICCTIDE’16), pp 34–45. EISBN: 978-1-4673-8437-7, PISBN: 978-1-4673-8438-4. https://doi.org/10.1109/icctide.2016.7725351
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Ramesh, V., Suresh Kumar, C. (2021). An Experimental Analysis on Selfish Node Detection Techniques for MANET Based on MSD and MBD-SNDT. In: Pandian, A., Fernando, X., Islam, S.M.S. (eds) Computer Networks, Big Data and IoT. Lecture Notes on Data Engineering and Communications Technologies, vol 66. Springer, Singapore. https://doi.org/10.1007/978-981-16-0965-7_7
Download citation
DOI: https://doi.org/10.1007/978-981-16-0965-7_7
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-0964-0
Online ISBN: 978-981-16-0965-7
eBook Packages: EngineeringEngineering (R0)