New approach for selfish nodes detection in mobile ad hoc networks

被引:8
|
作者
Djenouri, Djamel [1 ]
Badache, Nadjib [1 ]
机构
[1] CERIST, Basic Software Lab, Algeirs, Algeria
关键词
mobile ad hoc networks; security selfishness; packet forwarding; power control; GloMoSim simulation;
D O I
10.1109/SECCMW.2005.1588323
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A mobile ad hoc network (MANET) is a temporary infrastructure less network, formed by a set of mobile hosts that dynamically establish their own network on the fly without relying on any central administration. Mobile hosts used in MANET have to ensure the services that were ensured by the powerful fixed infrastructure in traditional networks, the packet forwarding is one of these services. The resource limitation of nodes used in MANET, particulary in energy supply, along with the multi-hop nature of this network may cause a new phenomena which does not exist in traditional networks. To save its energy a node may behave selfishly and uses the forwarding service of other nodes without correctly forwarding packets for them. This deviation from the correct behavior represents a potential threat against the quality of service (QoS), as well as the service availability, one of the most important security requirements. Some solutions have been recently proposed, but almost all these solutions rely on the watchdog [13] technique in their monitoring components, which suffers from many problems. In this paper we propose a new approach to mitigate some of these problems, and we assess its performance by simulation.
引用
收藏
页码:288 / 294
页数:7
相关论文
共 50 条
  • [1] Random feedbacks for selfish nodes detection in mobile ad hoc networks
    Djenouri, D
    Ouali, N
    Mahmoudi, A
    Badache, N
    [J]. OPERATIONS AND MANAGEMENT IN IP-BASED NETWORKS, PROCEEDINGS, 2005, 3751 : 68 - 75
  • [2] A New Routing Protocol in Mobile Ad Hoc Networks with Selfish Nodes
    Saremi, Fatemeh
    Mousavi, Hamid
    Movaghar, Ali
    [J]. 2008 INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS, 2008, : 114 - 118
  • [3] Detection and prevention of selfish and misbehaving nodes at MAC layer in mobile ad hoc networks
    Gunasekaran, R.
    Uthariaraj, V. Rhymend
    Sudharsan, R.
    Priyadarshini, S. Sujitha
    Yamini, U.
    [J]. 2008 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-4, 2008, : 1857 - 1860
  • [4] Selfish Attack Detection in Mobile Ad hoc Networks
    Ghonge, Mangesh M.
    Jawandhiya, P. M.
    Thakare, V. M.
    [J]. 2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2017,
  • [5] Advanced detection of selfish or malicious nodes in ad hoc networks
    Kargl, F
    Klenk, A
    Schlott, S
    Weber, M
    [J]. SECURITY IN AD-HOC AND SENSOR NETWORKS, 2005, 3313 : 152 - 165
  • [6] A Service Negotiation Model for Selfish nodes in the Mobile Ad hoc networks
    Yang, Yang
    Guo, Shao-yong
    Qiu, Xue-song
    Meng, Luo-ming
    [J]. 2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [7] A gradual solution to detect selfish nodes in mobile ad hoc networks
    Djenouri, Djamel
    Badache, Nadjib
    [J]. International Journal of Wireless and Mobile Computing, 2010, 4 (04) : 264 - 274
  • [8] Impact of selfish nodes on route discovery in mobile ad hoc networks
    Zhang, Q
    Agrawal, DP
    [J]. GLOBECOM '04: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, 2004, : 2914 - 2918
  • [9] Trust Based Intrusion Detection Technique to Detect Selfish Nodes in Mobile Ad Hoc Networks
    Kumar, Sunil
    Dutta, Kamlesh
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2018, 101 (04) : 2029 - 2052
  • [10] Trust Based Intrusion Detection Technique to Detect Selfish Nodes in Mobile Ad Hoc Networks
    Sunil Kumar
    Kamlesh Dutta
    [J]. Wireless Personal Communications, 2018, 101 : 2029 - 2052