Handling Selfishness over Collaborative Mechanism in a Mobile Ad hoc Network
DOI:
https://doi.org/10.13052/2245-1439.714Keywords:
Adhoc networks, Replication techniques, collaborative mechanism, DetectionAbstract
Major constraint of Mobile ad hoc networks is unpredictable mobility and limited resources like energy consumption which may ultimately end in failure of network connectivity and performance deterioration. Almost all of the suggested techniques presume that every nodes share their memory space with full collaboration. But in realism, few nodes selfishly decide either to cooperate partially only with other nodes, or not at all. Thus, a advanced collaborative mechanism based on dissemination of selfish node awareness is suggested. Numerical results reveal that such mechanism results in better improvement in performance.
Downloads
References
Abbas, S., Merabti, M., Llewellyn-Jones, D., and Kifayat, K. (2013). Lightweight sybil attack detection in manets. IEEE Systems Journal, 7(2), 236–248.
Zhang, D., Song, H., and Yu, L. (2017). Robust fuzzy-model-based filtering for nonlinear cyber-physical systems with multiple stochastic incomplete measurements. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 47(8), 1826–1838.
AbdelMohsen, D., and Abdelkader, T. (2015). Detecting selfish nodes and motivating cooperation in Mobile Ad-hoc Networks. In Tenth International Conference on Computer Engineering & Systems (ICCES), 301–306.
Hlavacek, D. T., and Chang, J. M. (2015), Design and Analysis of a Method for Synoptic Level Network Intrusion Detection. In IEEE 39th Annual Computer Software and Applications Conference (COMPSAC), 2, 516–524.
Eidenbenz, S., Resta, G., and Santi, P. (2008). The COMMIT protocol for truthful and cost-efficient routing in ad hoc networks with selfish nodes. IEEE Transactions on Mobile Computing, 7(1), 19–33.
Hernandez-Orallo, E., Olmos, M. D. S., Cano, J. C., Calafate, C. T., and Manzoni, P. (2015). CoCoWa: A collaborative contact-based watchdog for detecting selfish nodes. IEEE Transactions on Mobile Computing, 14(6), 1162–1175.
Hernandez-Orallo, E., Serrat, M. D., Cano, J. C., Calafate, C. T., and Manzoni, P. (2012). Improving selfish node detection in MANETs using a collaborative watchdog. IEEE Communications Letters, 16(5), 642–645.
Keerthika, V., and Suganthe, R. C. (2013). Watchdog: Reduce time delay for spreading selfish information in manet. In International Conference on Information Communication and Embedded Systems (ICICES), 1104–1107.
Raz, N. R., and Akbarzadeh-T, M. R. (2013). Cooperation Tuning in MANETs: A fuzzy approach Fuzzy behaviors of node in the presence of conflict. In 13th Iranian Conference on Fuzzy Systems (IFSC), 1–6.
Passarella, A., and Conti, M. (2011). Characterising aggregate inter-contact times in heterogeneous opportunistic networks. In International Conference on Research in Networking, 301–313. Springer, Berlin, Heidelberg.
Paul, K., and Westhoff, D. (2002). Context aware detection of selfish nodes in dsr based ad-hoc networks. In Proceedings of the Vehicular Technology Conference, VTC 2002-Fall. 4, 2424–2429.
Rout, S.. Turuk, A. K., and Sahoo, B. (2009). “Energy Efficiency in Wireless Ad hoc Network using Clustering”, in proceedings on 12th International Conference on Information Technology, 223–226.
Sengathir, J., Manoharan, R., and Kumar, R. R. (2013). Markovian process based reputation mechanisms for detecting selfish nodes in MANETs: A survey. In Fifth International Conference on Advanced Computing (ICoAC), 217–222.
Gupta, S., Nagpal, C. K., and Singla, C. (2011). Impact of selfish node concentration in MANETs. International Journal of Wireless & Mobile Networks (IJWMN), 3, 29–37.
Toh, C. K. (1997). Associativity-based routing for ad hoc mobile networks. Wireless Personal Communications, 4(2), 103–139.
Zhu, H., Fu, L., Xue, G., Zhu, Y., Li, M., and Ni, L. M. (2010). Recognizing exponential inter-contact time in VANETs. In Proceedings in the INFOCOM, 1–5.
Wireless Communications: Principles and Practice. Theodore S. Rappaport. Prentice Hall, 2nd edition, December 2001.
Network Simulator 2 (ns2). Available at: http://www.isi.edu/nsnam/ns/ns/