ZRLBS: Zone Reputation Based Load Balancing Simulator to Grip Selfish Behavior in Social Networks

Summary A Mobile Ad hoc Network (MANET) is generally composed of a dynamic set of cooperative neighbors, which are willing to share their wireless transmission power with neighboring Mobile Unit (MU) to support multihop communication between MUs that are not in the direct transmission range of each other. MANETs, blamed of nomadic MUs, limited battery power and unreliable transmission medium, makes them extremely prone to misbehaviors. A relatively less investigated behavioral concern in MANET is caused by the so called cooperative nature of the MUs. Theoretically, MU participation in open communication is crucial leaving no space for issues like preserving the power for personal usage only. Hence, the research effort on MANET focused mainly on routing and assumes that all nodes are usually cooperative. But this a MANET myth, practically limited power and resource constraints can make a MU prone to go into the shell of power save mode resulting in deteriorated MANET performance. This paper summarizes research results addressing the hunting and dealing with selfish behavior in MANETs from a two-side perspective: the detection and punishment of selfish MUs and the proposal of a fairer MANET environment defined by Zone Reputation Based Load Balancing Simulator (ZRLBS) that attempts to split the action area and stochastically leverage the load added to reputation management (creation and maintenance) among the participants MUs to prevent selfish behavior. We evaluated the performance of ZRLBS based scheme using the packet delivery ratio, the communication overhead, and Selfish Node (SN) detection in a discrete eventsimulation environment. The results indicate that a reputationbased zone oriented load balancing mechanism can significantly reduce the effect of selfish attacks and improve performance in MANETs.

[1]  Luís E. T. Rodrigues,et al.  Friends and foes: preventing selfishness in open mobile ad hoc networks , 2003, 23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings..

[2]  Levente Buttyán,et al.  Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..

[3]  Ratul Mahajan,et al.  Sustaining cooperation in multi-hop wireless networks , 2005, NSDI.

[4]  Marco Conti,et al.  Mesh networks: commodity multihop ad hoc networks , 2005, IEEE Communications Magazine.

[5]  Levente Buttyán,et al.  Enforcing service availability in mobile ad-hoc WANs , 2000, MobiHoc.

[6]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[7]  Jean-Pierre Hubaux,et al.  Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks , 2001 .

[8]  David Hales,et al.  From selfish nodes to cooperative networks - emergent link-based incentives in peer-to-peer networks , 2004, Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004. Proceedings..

[9]  Girish Katkar,et al.  Mobile ad hoc networking: imperatives and challenges , 2003, Ad Hoc Networks.

[10]  Jean-Yves Le Boudec,et al.  A test-bed for misbehavior detection in mobile ad-hoc networks - how much can watchdogs really do? , 2004, Sixth IEEE Workshop on Mobile Computing Systems and Applications.

[11]  Younghwan Yoo,et al.  Why does it pay to be selfish in a MANET? , 2006, IEEE Wireless Communications.

[12]  Vijay Varadharajan,et al.  Packet Drop Attack: A Serious Threat to Operational Mobile Ad hoc Networks , 2005 .

[13]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[14]  Vidya Kadam,et al.  An Acknowledgement-Based Approach for the Detection of Routing Misbehaviour in MANETS , 2011 .

[15]  Pramod K. Varshney,et al.  TWOACK: preventing selfishness in mobile ad hoc networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[16]  Martin Nilsson,et al.  Investigating the energy consumption of a wireless network interface in an ad hoc networking environment , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[17]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[18]  Stephan Eidenbenz,et al.  Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents , 2003, MobiCom '03.

[19]  Yacine Rebahi,et al.  A reputation-based trust mechanism for ad hoc networks , 2005, 10th IEEE Symposium on Computers and Communications (ISCC'05).

[20]  Yih-Chun Hu,et al.  A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.

[21]  Vikram Srinivasan,et al.  Cooperation in wireless ad hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[22]  Hung-Yu Wei,et al.  Incentive Mechanism Design for Selfish Hybrid Wireless Relay Networks , 2005, Mob. Networks Appl..

[23]  W. J. Adams,et al.  Calculating a node's reputation in a mobile ad hoc network , 2005, PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005..

[24]  C. Siva Ram Murthy,et al.  Ad Hoc Wireless Networks: Architectures and Protocols , 2004 .