Detection of selfish & malicious behavior using DTN-chord monitoring in mobile networks

In mobile network, data nodes are distributed among the clusters. Mobile ad-hoc networks (MANETs) are an encouraging solution to establish communication for emergency response action, which impose some challenges especially on routing. In MANET, the mobile nodes are non-compulsorily cooperating in order to work properly. This cooperation of mobile nodes is a cost-intensive activity and some nodes cannot cooperate in proper way that leads to selfish node and malicious node behaviors. Thus, novel and efficient method has been proposed to identify the selfish and malicious node in the network. The main aim of this paper is to identify and correct the selfish and malicious behavior of nodes and enhance the cooperation among nodes. It uses Delay Tolerant Network (DTN) to finds the selfish and malicious node by recording its negative response of transmission by destination node. Proposed model improves the security and efficiency of the overall network performance.

[1]  Jean-Yves Le Boudec,et al.  Self-policing mobile ad hoc networks by reputation systems , 2005, IEEE Communications Magazine.

[2]  Levente Buttyán,et al.  Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..

[3]  Qinghua Li,et al.  Routing in Socially Selfish Delay Tolerant Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[4]  Ralf Steinmetz,et al.  On the effect of node misbehavior in ad hoc networks , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).

[5]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[6]  Lieguang Zeng,et al.  The Impact of Node Selfishness on Multicasting in Delay Tolerant Networks , 2011, IEEE Transactions on Vehicular Technology.

[7]  Juan-Carlos Cano,et al.  CoCoWa: A Collaborative Contact-Based Watchdog for Detecting Selfish Nodes , 2015, IEEE Transactions on Mobile Computing.

[8]  Shailender Gupta,et al.  IMPACT OF SELFISH NODE CONCENTRATION IN MANET S , 2011 .

[9]  David R. Karger,et al.  Consistent hashing and random trees: distributed caching protocols for relieving hot spots on the World Wide Web , 1997, STOC '97.

[10]  Xuemin Shen,et al.  ESIP: Secure Incentive Protocol with Limited Use of Public-Key Cryptography for Multihop Wireless Networks , 2011, IEEE Transactions on Mobile Computing.

[11]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[12]  Yu Zhang,et al.  AMD: Audit-Based Misbehavior Detection in Wireless Ad Hoc Networks , 2016, IEEE Transactions on Mobile Computing.

[13]  Daniel M. Lewin,et al.  Consistent hashing and random trees : algorithms for caching in distributed networks , 1998 .

[14]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[15]  Levente Buttyán,et al.  Enforcing service availability in mobile ad-hoc WANs , 2000, MobiHoc.

[16]  Hongseok Yoo,et al.  The controversy of Selfish nodes in ad hoc networks , 2010, 2010 The 12th International Conference on Advanced Communication Technology (ICACT).

[17]  Lien-Wen Wu,et al.  A threshold-based method for selfish nodes detection in MANET , 2010, 2010 International Computer Symposium (ICS2010).

[18]  Merkourios Karaliopoulos,et al.  Assessing the vulnerability of DTN data relaying schemes to node selfishness , 2009, IEEE Communications Letters.

[19]  M. Weber,et al.  Sensors for Detection of Misbehaving Nodes in MANETs , 2004, PIK Prax. Informationsverarbeitung Kommun..

[20]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[21]  Paolo Santi,et al.  The COMMIT Protocol for Truthful and Cost-Efficient Routing in Ad Hoc Networks with Selfish Nodes , 2008, IEEE Transactions on Mobile Computing.

[22]  Shadab Ahmed Ad_Hoc on Demand Distance Vector Routing using MANET , 2017 .

[23]  Younghwan Yoo,et al.  A credit-payment scheme for packet forwarding fairness in mobile ad hoc networks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.

[24]  Dirk Westhoff,et al.  Context aware detection of selfish nodes in DSR based ad-hoc networks , 2002, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE.

[25]  Pietro Manzoni,et al.  Evaluating the Usefulness of Watchdogs for Intrusion Detection in VANETs , 2010, 2010 IEEE International Conference on Communications Workshops.