A Credit-based Method to Selfish Node Detection in Mobile Ad-hoc Network

Abstract Ad-hoc networks are a set of mobile nodes that are connected via a wireless channel. Some of the nodes in this network behave selfishly and do not send data to other nodes so that in order to increase network performance these nodes must be identified. A credit-based algorithm is proposed to detect the selfish nodes. Three watchdog nodes are selected to monitor suspicious nodes in each cluster. The cluster head nodes detect the existence of selfish nodes by controlling general features of network, such as delay, the total number of sent packets, the total number of received packets, throughput, and network traffic. The watchdog nodes send their comment on selfishness or cooperation of the node to the cluster head. Cluster head makes decisions with a majority vote on a suspicious node. The simulation results show that the rate of detection accuracy and the life time of network are considerably high and the false alarm rate and energy consumption are low comparing to that of similar methods.

[1]  Stefan Stieglitz,et al.  Challenges of MANET for Mobile Social Networks , 2011, ANT/MobiWIS.

[2]  Sana Ullah,et al.  A Green Approach for Selfish Misbehavior Detection in 802.11-Based Wireless Networks , 2015, Mobile Networks and Applications.

[3]  Benxiong Huang,et al.  COSR: A Reputation-Based Secure Route Protocol in MANET , 2010, EURASIP J. Wirel. Commun. Netw..

[4]  Amaresh Kumar,et al.  Detection of Selfish and Malicious Node in Mobile Ad-Hoc Network with NS-2 Using Chord Algorithm , 2017 .

[5]  S. V. Kasmir Raja,et al.  Stimulating truth-telling and cooperation among nodes in VANETs through payment and punishment scheme , 2015, Ad Hoc Networks.

[6]  Haiying Shen,et al.  Game-Theoretic Analysis of Cooperation Incentive Strategies in Mobile Ad Hoc Networks , 2012, IEEE Transactions on Mobile Computing.

[7]  K. Komathy,et al.  A Probabilistic Behavioral Model for Selfish Neighbors in a Wireless Ad Hoc Network , 2007 .

[8]  Juan-Carlos Cano,et al.  TEEM: Trust-based Energy-Efficient Distributed Monitoring for Mobile Ad-hoc Networks , 2017, 2017 Wireless Days.

[9]  Sam Jabbehdari,et al.  A Novel Distributed Clustering Algorithm for Mobile Ad-hoc Networks , 2008 .

[10]  Muhammad Irfan,et al.  Mobile Ad-Hoc Networks Applications and Its Challenges , 2016 .

[11]  Youyun Xu,et al.  Distributed relay selection over multi-source and multi-relay wireless cooperative networks with selfish nodes , 2010, Comput. Commun..

[12]  Chandrima Chakrabarti,et al.  An observer-based distributed scheme for selfish-node detection in a post-disaster communication environment using delay tolerant network , 2014, 2014 Applications and Innovations in Mobile Computing (AIMoC).

[13]  Koushik Majumder,et al.  Selfish Node Detection and Low Cost Data Transmission in MANET using Game Theory , 2015 .

[14]  Zul Azri,et al.  Modeling Stochastic Correlated Node Behavior for Survivability in Ad Hoc Networks , 2013 .

[15]  Nadeem Javaid,et al.  Fuzzy-Based Trust Model for Detection of Selfish Nodes in MANETs , 2016, 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA).

[16]  Eitan Altman,et al.  A Controlled Matching Game for WLANs , 2017, IEEE Journal on Selected Areas in Communications.

[17]  Yin Zhang,et al.  Incentive-aware routing in DTNs , 2008, 2008 IEEE International Conference on Network Protocols.

[18]  Martin Schütte Detecting Selfish and Malicious Nodes in MANETs , 2006 .

[19]  Winston Khoon Guan Seah,et al.  Cooperation stimulation mechanisms for wireless multihop networks: A survey , 2015, J. Netw. Comput. Appl..

[20]  Tamer Abdelkader,et al.  Detecting selfish nodes and motivating cooperation in Mobile Ad-hoc Networks , 2015, 2015 Tenth International Conference on Computer Engineering & Systems (ICCES).

[21]  K. Komathy,et al.  Best neighbor strategy to enforce cooperation among selfish nodes in wireless ad hoc network , 2007, Comput. Commun..

[22]  J. Singhai,et al.  Enhanced node cooperation technique for outwitting selfish nodes in an ad hoc network , 2015, IET Networks.

[23]  R. Ahmad,et al.  Epidemic Modeling for Correlated Node Behavior in Ad Hoc Networks , 2013 .

[24]  Omar Abdel Wahab,et al.  A cooperative watchdog model based on Dempster-Shafer for detecting misbehaving vehicles , 2014, Comput. Commun..

[25]  Janakiraman Sengathir,et al.  A futuristic trust coefficient-based semi-Markov prediction model for mitigating selfish nodes in MANETs , 2015, EURASIP J. Wirel. Commun. Netw..

[26]  Burairah Hussin,et al.  Correlated Node Behavior Model based on Semi Markov Process for MANETS , 2012, ArXiv.

[27]  Ciprian Dobre,et al.  SENSE: A collaborative selfish node detection and incentive mechanism for opportunistic networks , 2014, J. Netw. Comput. Appl..

[28]  Chetan Nimje,et al.  A review on node activity detection, selfish & malicious behavioral patterns using watchdog algorithm , 2017, 2017 International Conference on Inventive Systems and Control (ICISC).

[29]  Abderrahmane Lakas,et al.  Detection of intelligent malicious and selfish nodes in VANET using threshold adaptive control , 2016, 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA).

[30]  Prabir Bhattacharya,et al.  This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. IEEE TRANSACTIONS ON DEPEDABLE AND SECURE COMPUTING 1 Mechanism Design-Based Secure Leader Elec , 2022 .

[31]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[32]  S. Shinde,et al.  A Comparative Study of Selfish Node Detection Methods in Manet , 2015 .

[33]  Kaushika Patel,et al.  Effective Utilization of Bandwidth for Mobile Ad Hoc Network , 2016 .

[34]  Rutvij H. Jhaveri,et al.  Various schemes to detect selfishness in wireless ad-hoc networks: A survey , 2015, 2015 International Conference on Green Computing and Internet of Things (ICGCIoT).

[35]  D. Arivazhagan,et al.  Applications, Advantages and Challenges of Ad Hoc Networks , 2014 .