scholarly journals A Credit-based Method to Selfish Node Detection in Mobile Ad-hoc Network

2018 ◽  
Vol 23 (2) ◽  
pp. 118-127 ◽  
Author(s):  
Sanaz Nobahary ◽  
Shahram Babaie

Abstract Ad-hoc networks are a set of mobile nodes that are connected via a wireless channel. Some of the nodes in this network behave selfishly and do not send data to other nodes so that in order to increase network performance these nodes must be identified. A credit-based algorithm is proposed to detect the selfish nodes. Three watchdog nodes are selected to monitor suspicious nodes in each cluster. The cluster head nodes detect the existence of selfish nodes by controlling general features of network, such as delay, the total number of sent packets, the total number of received packets, throughput, and network traffic. The watchdog nodes send their comment on selfishness or cooperation of the node to the cluster head. Cluster head makes decisions with a majority vote on a suspicious node. The simulation results show that the rate of detection accuracy and the life time of network are considerably high and the false alarm rate and energy consumption are low comparing to that of similar methods.

Electronics ◽  
2022 ◽  
Vol 11 (2) ◽  
pp. 185
Author(s):  
Muhammad Fayaz ◽  
Gulzar Mehmood ◽  
Ajab Khan ◽  
Sohail Abbas ◽  
Muhammad Fayaz ◽  
...  

A mobile ad hoc network (MANET) is a group of nodes constituting a network of mobile nodes without predefined and pre-established architecture where mobile nodes can communicate without any dedicated access points or base stations. In MANETs, a node may act as a host as well as a router. Nodes in the network can send and receive packets through intermediate nodes. However, the existence of malicious and selfish nodes in MANETs severely degrades network performance. The identification of such nodes in the network and their isolation from the network is a challenging problem. Therefore, in this paper, a simple reputation-based scheme is proposed which uses the consumption and contribution information for selfish node detection and cooperation enforcement. Nodes failing to cooperate are detached from the network to save resources of other nodes with good reputation. The simulation results show that our proposed scheme outperforms the benchmark scheme in terms of NRL (normalized routing load), PDF (packet delivery fraction), and packet drop in the presence of malicious and selfish attacks. Furthermore, our scheme identifies the selfish nodes quickly and accurately as compared to the benchmark scheme.


2019 ◽  
Vol 8 (4) ◽  
pp. 12824-12829

A group of mobile nodes using a common wireless media forms a dynamic multihop network known as Mobile Ad-Hoc network (MANET). Creating substructure (cluster) of the mobile adhoc network, basically divides the network into sub network. It has been observed that clustering of large size MANET improves the system performance to a large extent. Clustering allows the MANET to organize it in some hierarchy which reduces control overhead and make it scalable. This paper, gives a new scheme of clustering the MANET that uses the concept of dominating set. The cluster so formed by the proposed method is more stable (less mobile) than the earlier existing algorithms .Here the dominating nodes will be considered as the cluster head of a particular cluster. The non dominating nodes will select the most qualified dominating node as their cluster head and will join the cluster. The quality of the node is measured by its clustering co efficient


Since Mobile Ad hoc Network (MANET) has distributed network structure using wireless links, designing efficient security applications has become a critical need. Selfish nodes are nodes that refuse to forward the data from other nodes. The existence of selfish nodes will disturb the normal process of the network, and reduce the network performance. Intrusion Detection System (IDS) is a scheme for detecting any misbehaviors in the network operation by monitoring the traffic flow. Each monitoring node need to execute the IDS module. The common problems encountered by the monitoring nodes are energy depletion, link disconnection, mobility and coverage. Hence the selection of monitoring nodes plays an important role in IDS. This paper develops a technique for deployment and selection of monitoring nodes for detection of selfish attacks. In this technique, the whole network is virtually divided in smaller grid like zones. In each grid, the nodes with higher stability and better coverage are assigned a reward value. A cost metric is derived in terms of energy consumption and computational delay. Then the nodes with minimum cost and high reward are selected as monitoring nodes. By simulation results, it is shown that the proposed technique has reduced detection delay, energy consumption and detection overhead.


2021 ◽  
Author(s):  
Venkatasubramanian S ◽  
Suhasini A ◽  
Vennila C

Abstract MANET – Mobile Ad Hoc Network is the connection of several remote mobile nodes. These networks are dynamic and independent to move anywhere. It does not contain any central controller, and hence it is stated as a structure less network. MANET is one of the most emerging technologies getting popular in recent days. It's significant features, and real-time issues grab the research community's attention towards it. The unstable data transmission will leverage the overall network performance, and designing an energy-efficient routing protocol is challenging. The main reason for this problem is the lack of a stable multipath routing system and resource constraints. Various research works have launched several efficient routing mechanisms, but the need for advancement still exists. In this paper, we propose a Ticket –ID Based Routing management system for enabling reliable routing for the entire network. The proposed system work under the TID principle, which executes according to the node properties and routing maintenance system. This system works under the supervision of TID- Routing manger. The TID routing manager is responsible for managing the ticketing pool and allocating unique ticket-ID based on the collected node factors such as energy, node location, speed, etc. The proposed routing system facilitates the shortest path for reliable communication. An experimental work using NS- simulator is done with the proposed method. The proposed work's efficiency is determined using a comparison work between T-ID BRM with TABRP, OGFSO, and PDMR. The observation states that the proposed Ticket-ID system achieves 94% better than other existing methods.


Author(s):  
D. Rajalakshmi ◽  
Meena K.

A MANET (mobile ad hoc network) is a self-organized wireless network. This network is more vulnerable to security failure due to dynamic topology, infrastructure-less environment, and energy consumption. Based on this security issue, routing in MANET is very difficult in real time. In these kinds of networks, the mobility and resource constraints could lead to divide the networks and minimize the performance of the entire network. In real time it is not possible because some selfish nodes interacts with other nodes partially or may not share the data entirely. These kind of malicious or selfish nodes degrade the network performance. In this chapter, the authors proposed and implemented the effect of malicious activities in a MANETs using self-centered friendship tree routing. It's a novel replica model motivated by the social relationship. Using this technique, it detects the malicious nodes and prevents hacking issues in routing protocol in future routes.


Author(s):  
A. Aranganathan ◽  
C.D. Suriyakala

Mobile Ad-hoc Network is a non-secure wireless network which has no infrastructure, dynamical topology in which the nodes can move anywhere, may join or leave the network through multi-hop communication. In cluster network, all the nodes can select one Cluster Head for transmission of data to another Cluster Head through gateways which is mainly used for saving energy of each node. Intelligent agents are used for collecting secure data from neighboring nodes and inform to the trusted agent in clustered networks. Security plays major role in wireless medium. Detecting malicious node is also causing a major concern to damage the data packets. To avoid this problem of entering malicious node in networks and non-secured data, agents based trusted revocation in clustering mobile ad-hoc network for improving security with Certificate Authority to improve the network performance like high throughput, less latency time and improved certificate revocation time using ns2 simulators.


Author(s):  
A. Aranganathan ◽  
C. D. Suriyakala

Mobile Ad-hoc Network is a non-secure wireless network which has no infrastructure, dynamical topology in which the nodes can move anywhere, may join or leave the network through multi-hop communication. In cluster network, all the nodes can select one Cluster Head for transmission of data to another Cluster Head through gateways which is mainly used for saving energy of each node. Intelligent agents are used for collecting secure data from neighboring nodes and inform to the trusted agent in clustered networks. Security plays major role in wireless medium. Detecting malicious node is also causing a major concern to damage the data packets. To avoid this problem of entering malicious node in networks and non-secured data, agents based trusted revocation in clustering mobile ad-hoc network for improving security with Certificate Authority to improve the network performance like high throughput, less latency time and improved certificate revocation time using ns2 simulators.


Author(s):  
Asha Asha ◽  
G. Mahadevan

<p>Mobile Ad Hoc Network (MANET) is a collection of mobile nodes, which dynamically form a temporary network, without using any infrastructure like wireless access points or base-stations. The provision of QoS guarantees is much more challenging in Mobile Ad hoc Networks. There are many interesting applications such as multimedia services, disaster recovery etc can be supported if Quality-of-Service (QoS) support can be provided for MANETs. But QoS provisioning in MANETs is a very challenging problem when compared to wired IP networks. This is because of unpredictable node mobility, wireless multi-hop communication, contention for wireless channel access, limited battery power and range of mobile devices as well as the absence of a central coordination authority. So, the design of an efficient and reliable routing scheme providing QoS support for such applications is a difficult task. In this paper we studied the challenges and approaches for QoS aware routing techniques.  </p><p> </p>


2019 ◽  
Vol 8 (2) ◽  
pp. 4775-4778

The Mobile and ad hoc wireless network has a set of nodes and is a low power, wireless infrastructure less, self-organized and limited distance communicating network devices. The nodes are always changing their characteristics over time results into a different network topology. So, it is very difficult to predict the mobile ad hoc network performance. In this research paper we proposed comparative analysis and estimate the performance of network amongst the mobile nodes by reducing the control overhead. Main intention of the paper is to relate and estimate the performance of different network routing protocols under diverse mobility models. The routing protocols performance metrics are examined with varying node speed and node density of network amongst different mobile nodes. NS-3 is used as a network simulator with version 3.25 (NS-3.25) to carry out the research simulation results.


2015 ◽  
Vol 4 (1) ◽  
pp. 31-42
Author(s):  
Mohammad Masoud Javidi

MANETs are self configuring networks that are formed by a set of wireless mobile nodes and have no fixed network infrastructure nor administrative support. Since transmission range of wireless network interfaces is limited, forwarding hosts may be needed. Each node in a wireless ad hoc network functions is as both a host and a router. Due to their communication type and resources constraint, MANETs are vulnerable to diverse types of attacks and intrusions so, security is a critical issue. Network security is usually provided in the three phases: intrusion prevention, intrusion detection and intrusion tolerance phase. However, the network security problem is far from completely solved. Researchers have been exploring the applicability of game theory approaches to address the network security issues. This paper reviews some existing game theory solutions which are designed to enhance network security in the intrusion detection phase. Keywords: Mobile Ad hoc Network (MANET), Intrusion detection system (IDS), Cluster head, host based, Game theory.


Sign in / Sign up

Export Citation Format

Share Document