Exponential reliability factor based mitigation mechanism for selfish nodes in MANETs

Reliable dissemination of data in mobile ad hoc networks mainly depends on the cooperation among all the active mobile nodes present in the network. However, enforcing a node to cooperate with all the other mobile nodes is a difficult task. Moreover, the mobile nodes in an ad hoc network have limited battery power and hence they refuse to forward their neighbor nodes’ packets so as to conserve their energy. This intentional selfish behavior of mobile nodes reduces the degree of cooperation between active mobile nodes which in turn affects the network performance. Hence, a need arises for formulating a reputation mechanism which helps in isolating selfish nodes in MANETs. In this paper, we propose an Exponential Reliability Factor Based Mitigation Mechanism (ERFBM) for detecting and isolating selfish nodes. This ERFBM efficiently isolates selfish nodes with the aid of Exponential Reliability Factor (ERF) computed based on the first and second hand information obtained from the mobile nodes. The effective performance of ERFBM is extensively studied through ns-2 simulations and the results obtained clearly portray that the proposed ERFBM isolates selfish nodes at a faster rate of 36% than the considered benchmark mitigation mechanisms such as Record and Trust-Based Detection (RTBD), Reliability Factor Based Mitigation Mechanism (RFBMM) and Packet Monitoring Conservation Algorithm (PCMA). The simulation study also depicts that ERFBM on an average, improves the performance of the network by reducing the communication overhead by 21%, 29% and 34% more than the three benchmark mitigation mechanisms considered for investigation.

[1]  Pang-Ning Tan,et al.  Local detection of selfish routing behavior in ad hoc networks , 2005, 8th International Symposium on Parallel Architectures,Algorithms and Networks (ISPAN'05).

[2]  Juan-Carlos Cano,et al.  Improving Selfish Node Detection in MANETs Using a Collaborative Watchdog , 2012, IEEE Communications Letters.

[3]  M. Pushpalatha,et al.  Trust Based Energy Aware Reliable Reactive Protocol in Mobile Ad Hoc Networks , 2009 .

[4]  Zhiping Jia,et al.  Trust-based on-demand multipath routing in mobile ad hoc networks , 2010, IET Inf. Secur..

[5]  Iosr Journals,et al.  Selfish Node Detection in Replica Allocation over MANETs , 2013 .

[6]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[7]  Ayyaswamy Kathirvel,et al.  A unified approach for detecting and eliminating selfish nodes in MANETs using TBUT , 2015, EURASIP J. Wirel. Commun. Netw..

[8]  G. Sahoo,et al.  Mathematical Model for the Detection of Selfish Nodes in MANETs , 2012 .

[9]  Bruce Christianson,et al.  A Dynamic Reputation Management System for mobile ad hoc networks , 2014, 2014 6th Computer Science and Electronic Engineering Conference (CEEC).

[10]  Juan-Carlos Cano,et al.  A Fast Model for Evaluating the Detection of Selfish Nodes Using a Collaborative Approach in MANETs , 2014, Wirel. Pers. Commun..

[11]  Haiying Shen,et al.  Game-Theoretic Analysis of Cooperation Incentive Strategies in Mobile Ad Hoc Networks , 2012, IEEE Transactions on Mobile Computing.

[12]  Jean-Yves Le Boudec,et al.  Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.

[13]  Janakiraman Sengathir,et al.  Reliability factor-based mathematical model for isolating selfish nodes in MANETs , 2014, Int. J. Inf. Commun. Technol..

[14]  Momin Kashif Mukhtar A COLLABORATIVE CONTACT-BASED WATCHDOG FOR DETECTING SELFISH NODES IN COOPERATIVE MANET , 2014 .

[15]  William Johnson,et al.  A distributed framework for detecting selfish nodes in MANET using Record- and Trust-Based Detection (RTBD) technique , 2014, EURASIP J. Wirel. Commun. Netw..

[16]  Juan-Carlos Cano,et al.  Routing Mechanisms for Mobile Ad Hoc Networks Based on the Energy Drain Rate , 2003, IEEE Trans. Mob. Comput..

[17]  Hai Jiang,et al.  A Cooperation Stimulation Strategy in Wireless Multicast Networks , 2011, IEEE Transactions on Signal Processing.

[18]  Salima Hamma,et al.  Multipath Routing in MANETs Using Multiple Description Coding , 2009, 2009 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[19]  Rituparna Chaki,et al.  Detection of Denial of Service Attack Due to Selfish Node in MANET by Mobile Agent , 2011 .

[20]  Burairah Hussin,et al.  Correlated Node Behavior Model based on Semi Markov Process for MANETS , 2012, ArXiv.

[21]  Juan-Carlos Cano,et al.  Black-Hole Attacks in P2P Mobile Networks Discovered through Bayesian Filters , 2010, OTM Workshops.

[22]  Levente Buttyán,et al.  Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..

[23]  Xiang-Yang Li,et al.  Low-cost routing in selfish and rational wireless ad hoc networks , 2006, IEEE Transactions on Mobile Computing.

[24]  Rituparna Chaki,et al.  MADSN: Mobile Agent Based Detection of Selfish Node in MANET , 2011 .

[25]  Laura Marie Feeney,et al.  An Energy Consumption Model for Performance Analysis of Routing Protocols for Mobile Ad Hoc Networks , 2001, Mob. Networks Appl..

[26]  Carlos Alberto V. Campos,et al.  A Markovian Model Representation of Individual Mobility Scenarios in Ad Hoc Networks and Its Evaluation , 2007, EURASIP J. Wirel. Commun. Netw..

[27]  Stefan Schlott,et al.  Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks , 2004, ESAS.

[28]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[29]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.