A Detailed. Survey on Selfish Node Detection Techniques for Mobile Ad Hoc Networks

被引:0
|
作者
Kumar, Sunil [1 ]
Dutta, Kamlesh [2 ]
Sharma, Girisha [1 ]
机构
[1] HCTM Tech Campus, CSE Dept, Kaithal, Haryana, India
[2] Natl Inst Technol, CSE Dept, Hamirpur, Himachal Prades, India
关键词
Mobile Ad hoc Networks; MANETs; Selfish Node; Malicious Node; MODEL;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the limited transmission capability of mobile nodes in mobile ad hoc networks (MANETs), the intermediate nodes are used in multi-hop fashion for forwarding the packets for other nodes. However, the multi-hop communication causes a serious problem that a node may act as selfish by refraining from forwarding the packets for other nodes in order to save its energy and computing resources. A selfish node attempts to utilize the network resources for its own benefits, but reluctant to spend its resources for others. Therefore, it is really important to scrutinize and isolate the selfish nodes front the network in order to trim down the risks from such nodes, and improve the security of the network. This paper presents a comparative study of most prominent selfish node detection and mitigation techniques proposed by the researchers in the literature.
引用
收藏
页码:122 / 127
页数:6
相关论文
共 50 条
  • [31] Local detection of selfish routing behavior in ad hoc networks
    Wang, B
    Soltani, S
    Shapiro, JK
    Tan, PN
    [J]. 8TH INTERNATIONAL SYMPOSIUM ON PARALLEL ARCHITECTURES, ALGORITHMS AND NETWORKS, PROCEEDINGS, 2005, : 392 - 399
  • [32] A gradual solution to detect selfish nodes in mobile ad hoc networks
    Djenouri, Djamel
    Badache, Nadjib
    [J]. International Journal of Wireless and Mobile Computing, 2010, 4 (04) : 264 - 274
  • [33] On Collecting Underlying Topology in the Selfish Wireless Mobile ad hoc Networks
    Yuan, Xin Hui
    Chen, Song Qiao
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 2372 - 2376
  • [34] A New Routing Protocol in Mobile Ad Hoc Networks with Selfish Nodes
    Saremi, Fatemeh
    Mousavi, Hamid
    Movaghar, Ali
    [J]. 2008 INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS, 2008, : 114 - 118
  • [35] Impact of selfish nodes on route discovery in mobile ad hoc networks
    Zhang, Q
    Agrawal, DP
    [J]. GLOBECOM '04: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, 2004, : 2914 - 2918
  • [36] A survey of Attacks in Mobile Ad hoc Networks
    Meddeb, Rahma
    Triki, Bayrem
    Jemili, Arah
    Korbaa, Ouajdi
    [J]. 2017 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2017,
  • [37] A Survey of Survivability in Mobile Ad Hoc Networks
    Lima, Michele Nogueira
    dos Santos, Aldri Luiz
    Pujolle, Guy
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2009, 11 (01): : 66 - 77
  • [38] Broadcast Expenses Controlling Techniques in Mobile Ad-hoc Networks: A Survey
    Ahmad, Naeem
    Hussain, S. Zeeshan
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2016, 28 (03) : 248 - 261
  • [39] Monitoring in mobile ad hoc networks: A survey
    Battat, Nadia
    Seba, Hamida
    Kheddouci, Hamamache
    [J]. COMPUTER NETWORKS, 2014, 69 : 82 - 100
  • [40] Survey of security for mobile ad hoc networks
    Yi, Ping
    Jiang, Yi-Chuan
    Zhang, Shi-Yong
    Zhong, Yi-Ping
    [J]. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2005, 33 (05): : 893 - 899