In the existing system, the node may sometimes behave selfishly. To act selfishly means that nod sometimes is unwilling to forward the packets to the further node as prescribed in route from source to destination in order to save their resources and this may seriously affect the performance of the network. In the proposed system, the network is distributed into clusters and every cluster has their own cluster head that helps the nodes to transmit and receive the packets more prominently. Every node in the cluster assigns themselves with the set of friends and enemies. Basically, the cluster is a combination of both nodes (i.e., selfish nodes and normal nodes). As described above, every node has a set of friend nodes and enemy nodes so if the node is selfish node then it will transmit the packet to the friend list node. Selfish node doesn't send a packet to the enemy nodes and this shows that selfish node always takes the greedy decisions. However, the detection of selfish node done by the watchdog process and sometimes it may fail in the complex network, by generating false negative and false positive decision and that leads in performing wrong operations. To make the process more complex we add up another group of nodes known as malicious nodes. Malicious nodes by nature will accept a packet from all the nodes but transmit those packet to wrong nodes that leads to losing of resources of many nodes in the network. Malicious node sometimes alters the data in the packet or corrupt the data. To identify the behavior pattern of a node by two neighborhood node we thought of applying chord algorithm.
[1]
Pietro Manzoni,et al.
Evaluating the Usefulness of Watchdogs for Intrusion Detection in VANETs
,
2010,
2010 IEEE International Conference on Communications Workshops.
[2]
Reza Curtmola,et al.
Provable data possession at untrusted stores
,
2007,
CCS '07.
[3]
Reza Curtmola,et al.
ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks
,
2008,
TSEC.
[4]
Jean-Yves Le Boudec,et al.
Performance analysis of the CONFIDANT protocol
,
2002,
MobiHoc '02.
[5]
Jonathan Katz,et al.
Proofs of Storage from Homomorphic Identification Protocols
,
2009,
ASIACRYPT.
[6]
Pramod K. Varshney,et al.
TWOACK: preventing selfishness in mobile ad hoc networks
,
2005,
IEEE Wireless Communications and Networking Conference, 2005.
[7]
Juan-Carlos Cano,et al.
Black-Hole Attacks in P2P Mobile Networks Discovered through Bayesian Filters
,
2010,
OTM Workshops.
[8]
Hugo M. Miranda.
Preventing selfishness in open mobile ad hoc networks
,
2002
.
[9]
Levente Buttyán,et al.
Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks
,
2003,
Mob. Networks Appl..
[10]
Madjid Merabti,et al.
Lightweight Sybil Attack Detection in MANETs
,
2013,
IEEE Systems Journal.
[11]
D. Boneh,et al.
Short Signatures from the Weil Pairing
,
2001,
Journal of Cryptology.