Random feedbacks for selfish nodes detection in mobile ad hoc networks

被引:0
|
作者
Djenouri, D [1 ]
Ouali, N
Mahmoudi, A
Badache, N
机构
[1] CERIST Ctr Res, Basic Software Lab, Algiers, Algeria
[2] USTHB, LSI, Algiers, Algeria
关键词
mobile ad-hoc networks; security; selfishness; packet forwarding; GloMoSim;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A mobile ad hoc network (MANET) is a temporary infrastructureless network, formed by a set of mobile hosts that dynamically establish their own network on the fly without relying on any central administration. Mobile hosts used in MANET have to ensure the services ensured by the powerful fixed infrastructure in traditional networks, the packet forwarding is one of these services. Resource limitation of MANET's nodes, particulary in energy supply, along with the multi-hop nature of these networks may cause a new problem that does not exist in traditional networks. To save its energy a node may behave selfishly (no-cooperatively), thus it misbehaves by not forwarding packets originated from other nodes, while using their resources to forward its own packets to remote recipients. Such a behavior hugely threatens the QoS (Quality of Service), and particulary the packet forwarding service availability. Some solutions for selfish nodes detection have been recently proposed, but almost all these solutions rely on the monitoring in the promiscuous mode technique of the watchdog [1], which suffers from many problems especially when using the power control technique. In this paper we propose a new approach to detect selfish nodes unwilling to participate in packet forwarding, that mitigates some watchdog's problems. We also assess the performance of our solution by simulation.
引用
收藏
页码:68 / 75
页数:8
相关论文
共 50 条
  • [31] Using a two-timer scheme to detect selfish nodes in mobile ad-hoc networks
    Liu, Hongxun
    Delgado-Frias, Jose G.
    Medidi, Sirisha
    PROCEEDINGS OF THE SIXTH IASTED INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INTERNET, AND INFORMATION TECHNOLOGY, 2007, : 179 - 184
  • [32] One method for selfish nodes security problem in ad hoc networks
    Wu, Hao
    Zheng, Zhi-Bin
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2005, 33 (SUPPL.): : 2317 - 2321
  • [33] A Way to Solve the Threat of Selfish and Malicious Nodes for Ad hoc Networks
    Wang, Xingfu
    Dai, Fuquan
    Qian, Lei
    Dong, Hao
    ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 1, 2008, : 368 - 370
  • [34] Truthful topology control in Wireless Ad Hoc Networks with selfish nodes
    Cai, Jianfeng
    Liu, Yunhuai
    Lian, Jie
    Li, Mo
    Pooch, Udo
    Ni, Lionel
    2006 INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING, PROCEEDINGS, 2006, : 203 - 210
  • [35] Intrusion detection system for mobile Ad hoc networks based on the behavior of nodes
    Mamatha, S., 1600, Science and Engineering Research Support Society (07):
  • [36] Detection of colluding misbehaving nodes in Mobile Ad hoc and Wireless Mesh Networks
    Graffi, Kalman
    Mogre, Parag S.
    Hollick, Matthias
    Steinmetz, Ralf
    GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11, 2007, : 5097 - 5101
  • [37] Prevention of Wormhole Attacks in Mobile Ad Hoc Networks by Intrusion Detection Nodes
    Su, Ming-Yang
    Chiang, Kun-Lin
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2010, 6221 : 253 - 260
  • [38] Intrusion Detection System for Mobile Ad hoc Networks Based on the Behavior of Nodes
    Mamatha, S.
    Damodaram, A.
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (06): : 241 - 256
  • [39] Intrusion Detection System for Detecting Malicious Nodes in Mobile Ad Hoc Networks
    Singh, Yuvraj
    Jena, Sanjay Kumar
    ADVANCES IN PARALLEL, DISTRIBUTED COMPUTING, 2011, 203 : 410 - 419
  • [40] A neighbor detection algorithm based on multiple virtual mobile nodes for mobile ad hoc networks
    Bostanipour, Behnaz
    Garbinato, Benoit
    COMPUTER NETWORKS, 2017, 112 : 294 - 313