DETECTION AND ISOLATION OF RELUCTANT NODES USING REPUTATION BASED SCHEME IN AN AD-HOC NETWORK

In an ad hoc network, the transmission range of nodes is limited; hence nodes mutually cooperate with its neighbouring nodes in order to extend the overall communication. However, along with the cooperative nodes, there may be some reluctant nodes like selfish nodes and malicious nodes present in the network. Such nodes degrade the performance of the network. This paper, gives a survey of reputation based mechanism and credit based mechanism. These include different strategies by which non cooperative nodes are detected, isolated and/or prevented, their advantages and limitations. Also, a global reputation based scheme is proposed in this paper for the detection and isolation of selfish node. A cluster head is used which is responsible for reputation management of each node in the network. Detection of selfish nodes is accomplished which are created due to nodes conserving their energy using NS2. After their detection, performance analysis of network with selfish node and the network after isolation of selfish node is carried out.

[1]  Luiz A. DaSilva,et al.  A reputation-based mechanism for isolating selfish nodes in ad hoc networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[2]  Ralf Steinmetz,et al.  On the effect of node misbehavior in ad hoc networks , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).

[3]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[4]  David A. Maltz,et al.  The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4 , 2007, RFC.

[5]  Qi He,et al.  SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).

[6]  Mehdi Dehghan,et al.  A secure credit-based cooperation stimulating mechanism for MANETs using hash chains , 2009, Future Gener. Comput. Syst..

[7]  Haiying Shen,et al.  ARM: An Account-Based Hierarchical Reputation Management System for Wireless Ad Hoc Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[8]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[9]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[10]  Christos Douligeris,et al.  Detecting unauthorized and compromised nodes in mobile ad hoc networks , 2007, Ad Hoc Networks.

[11]  Benxiong Huang,et al.  COSR: Cooperative On-Demand Secure Route Protocol in MANET , 2006, 2006 International Symposium on Communications and Information Technologies.

[12]  Anchare V. Babu,et al.  Node Isolation Probability of Wireless Adhoc Networks in Nagakami Fading Channel , 2010, ArXiv.

[13]  Wesley Chee-Wah Tan,et al.  Enforcing Cooperation in an Ad Hoc Network using a Cost-Credit Based Forwarding and Routing Approach , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[14]  David B. Johnson,et al.  The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .

[15]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[16]  Jean-Yves Le Boudec,et al.  Self-Policing Mobile Ad Hoc Networks , 2004, Mobile Computing Handbook.