A unified approach for detecting and eliminating selfish nodes in MANETs using TBUT

Recent years have witnessed the increasing efforts toward making architecture standardization for the secured wireless mobile ad hoc networks. In this scenario when a node actively utilizes the other node resources for communicating and refuses to help other nodes in their transmission or reception of data, it is called a selfish node. As the entire mobile ad hoc network (MANETs) depends on cooperation from neighboring nodes, it is very important to detect and eliminate selfish nodes from being part of the network. In this paper, token-based umpiring technique (TBUT) is proposed, where every node needs a token to participate in the network and the neighboring nodes act as umpire. This proposed TBUT is found to be very efficient with a reduced detection time and less overhead. The security analysis and experimental results have shown that TBUT is feasible for enhancing the security and network performance of real applications.

[1]  Athanasios V. Vasilakos,et al.  Approximating Congestion + Dilation in Networks via "Quality of Routing" Games , 2012, IEEE Trans. Computers.

[2]  Rengaramanujam Srinivasan,et al.  ETUS: enhanced triple umpiring system for security and robustness of wireless mobile ad hoc networks , 2011, Int. J. Commun. Networks Distributed Syst..

[3]  Rengaramanujam Srinivasan,et al.  ETUS: An enhanced triple umpiring system for security and performance improvement of mobile ad hoc networks , 2011, Int. J. Netw. Manag..

[4]  Ayyaswamy Kathirvel Introduction to Glomosim , 2011 .

[5]  Rengaramanujam Srinivasan,et al.  Triple Umpire System for Security of Mobile Ad Hoc Networks , 2009 .

[6]  A. M. Kurkure SELFISH NODE DETECTION TECHNIQUES IN MANET: A REVIEW , 2013 .

[8]  C. Rajabhushanam,et al.  System of One to Three Umpire Security System for Wireless Mobile Ad hoc Network , 2011 .

[9]  Rengaramanujam Srinivasan,et al.  A System of Umpires for Security of MANET , 2009 .

[10]  Athanasios V. Vasilakos,et al.  ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.

[11]  Athanasios V. Vasilakos,et al.  Toward Incentivizing Anti-Spoofing Deployment , 2014, IEEE Transactions on Information Forensics and Security.

[12]  L. Sudha Rani DETECTION AND PREVENTION OF WORMHOLE ATTACK IN STATELESS MULTICASTING , 2012 .

[13]  Tarik Taleb,et al.  Combating Against Attacks on Encrypted Protocols , 2007, 2007 IEEE International Conference on Communications.

[14]  Athanasios V. Vasilakos,et al.  Provably secure three-party authenticated key agreement protocol using smart cards , 2014, Comput. Networks.

[15]  A. Kathirvel,et al.  Global Mobile Information System Simulator in Fedora Linux , 2009 .

[16]  Athanasios V. Vasilakos,et al.  A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proceedings of the IEEE.

[17]  Jianhua Ma,et al.  P2P soft security: On evolutionary dynamics of P2P incentive mechanism , 2011, Comput. Commun..

[18]  Rengaramanujam Srinivasan,et al.  Self Umpiring System for Security in Wireless Mobile Ad Hoc Network , 2010, Wirel. Sens. Netw..

[19]  Shusen Yang,et al.  A survey on the ietf protocol suite for the internet of things: standards, challenges, and opportunities , 2013, IEEE Wireless Communications.

[20]  Rengaramanujam Srinivasan,et al.  Performance Analysis of Propagation Model using Wireless Mobile Ad Hoc Network Routing Protocols , 2009 .

[21]  Timothy X. Brown,et al.  Jamming and sensing of encrypted wireless ad hoc networks , 2006, MobiHoc '06.

[22]  Arya Megha,et al.  Grayhole Attack and Prevention in Mobile Adhoc Network , 2011 .

[23]  Chang-Wu Yu,et al.  A Distributed and Cooperative Black Hole Node Detection and Elimination Mechanism for Ad Hoc Networks , 2007, PAKDD Workshops.

[24]  Suresh Koneri Chandrasekaran,et al.  Primary Path Reservation Using Enhanced Slot Assignment in TDMA for Session Admission , 2015, TheScientificWorldJournal.

[25]  Athina Markopoulou,et al.  Blacklisting Recommendation System: Using Spatio-Temporal Patterns to Predict Future Attacks , 2011, IEEE Journal on Selected Areas in Communications.

[26]  Jameela Al-Jaroodi,et al.  Towards more reliable and secure source routing in mobile ad hoc and sensor networks , 2014, Telecommun. Syst..

[27]  Keren Bergman,et al.  Inaugural Issue Editors' Introduction , 2009 .

[28]  Sinjumol Thomas,et al.  Anatomical Studies on Vitex Leucoxylon and Vitex Negundo (Verbenaceae) , 2014 .

[29]  Manoj Duhan,et al.  An effective implementation of security based algorithmic approach in mobile adhoc networks , 2014, Human-centric Computing and Information Sciences.

[30]  Athanasios V. Vasilakos,et al.  Delay Tolerant Networks: Protocols and Applications , 2011 .

[31]  Athanasios V. Vasilakos,et al.  CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding , 2012, 2012 Proceedings IEEE INFOCOM.

[32]  Ayyaswamy Kathirvel Enhanced Triple Umpiring System for Security and Performance Improvement in Wireless MANETS , 2010, Int. J. Commun. Networks Inf. Secur..

[33]  Michael K. Danquah,et al.  The quintessential research world is progressively interdisciplinary , 2012 .

[34]  A. K. Mousa,et al.  Comment on “On Soft β-Open Sets and Soft β-Continuous Functions” , 2015, TheScientificWorldJournal.

[35]  Athanasios V. Vasilakos,et al.  Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.

[36]  Ayyaswamy Kathirvel and Rengaramanujam Srinivasan Enhanced Triple Umpiring System for Security and Performance Improvement in Wireless MANETS , 2010 .

[37]  Rengaramanujam Srinivasan,et al.  Self _ USS : A Self Umpiring System for Security in Mobile Ad hoc Network , 2022 .

[38]  Ayyaswamy Kathirvel,et al.  A Study on Salvaging Route Reply for AODV Protocol in the Presence of Malicious Nodes , 2009 .

[39]  Prashant B. Swadas,et al.  Dpraodv: A Dyanamic Learning System Against Blackhole Attack in Aodv Based Manet , 2009, ArXiv.

[40]  Juan-Carlos Cano,et al.  A Fast Model for Evaluating the Detection of Selfish Nodes Using a Collaborative Approach in MANETs , 2014, Wirel. Pers. Commun..

[41]  G. Jyoshna,et al.  REMOVAL OF BYZANTINE ATTACKS IN ADHOC NETWORKS , 2012 .

[42]  Rengaramanujam Srinivasan,et al.  A System of Umpires for Security of Wireless Mobile Ad Hoc Network , 2010, Int. Arab. J. e Technol..

[43]  Naixue Xiong,et al.  Nodes organization for channel assignment with topology preservation in multi-radio wireless mesh networks , 2012, Ad Hoc Networks.

[44]  Athanasios V. Vasilakos,et al.  A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..

[45]  Athanasios V. Vasilakos,et al.  Directional routing and scheduling for green vehicular delay tolerant networks , 2012, Wireless Networks.

[46]  Athanasios V. Vasilakos,et al.  Peer-to-Peer Media Streaming: Insights and New Developments , 2011, Proceedings of the IEEE.

[47]  Athanasios V. Vasilakos,et al.  Service configuration and traffic distribution in composite radio environments , 2004, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[48]  Athanasios V. Vasilakos,et al.  Flooding-limited and multi-constrained QoS multicast routing based on the genetic algorithm for MANETs , 2011, Math. Comput. Model..

[49]  Rengaramanujam Srinivasan,et al.  Enchanced Self Umpiring System for Security Using Salvaging Route Reply , 2010 .

[50]  Athanasios V. Vasilakos,et al.  TB2F: Tree-bitmap and bloom-filter for a scalable and efficient name lookup in Content-Centric Networking , 2014, 2014 IFIP Networking Conference.

[51]  Leena Sahu,et al.  A Cooperative Approach for Understanding Behavior of Intrusion Detection System in Mobile Ad Hoc Networks , 2013 .

[52]  S. K. Muthusundar,et al.  Temporary Redundant Transmission Mechanism for SCTP Multihomed Hosts , 2015, TheScientificWorldJournal.

[53]  Murthy J.V.R,et al.  Text Document Classification based-on Least Square Support Vector Machines with Singular Value Decomposition , 2011 .

[54]  Jiann-Liang Chen,et al.  Developing a BDSR scheme to avoid black hole attack based on proactive and reactive architecture in MANETs , 2011, 13th International Conference on Advanced Communication Technology (ICACT2011).

[55]  Naixue Xiong,et al.  Comparative analysis of quality of service and memory usage for adaptive failure detectors in healthcare systems , 2009, IEEE Journal on Selected Areas in Communications.

[56]  Athanasios V. Vasilakos,et al.  Joint Forensics-Scheduling Strategy for Delay-Sensitive Multimedia Applications over Heterogeneous Networks , 2011, IEEE Journal on Selected Areas in Communications.

[57]  Kathirvel Ayyaswamy Underwater Wireless Sensor Networks: Applications, Challenges and Design Issues of the Network Layer - A Review , 2015 .

[58]  Leandros Tassiulas,et al.  Resource Allocation and Cross Layer Control in Wireless Networks (Foundations and Trends in Networking, V. 1, No. 1) , 2006 .

[59]  Bipin Bihari Jayasingh,et al.  A Novel Metric for Detection of Jellyfish Reorder Attack on Ad Hoc Network , 2010 .

[60]  Leandros Tassiulas,et al.  Resource Allocation and Cross-Layer Control in Wireless Networks , 2006, Found. Trends Netw..