Evaluating network layer selfish behavior and a method to detect and mitigate its effect in MANETs

A Mobile Ad Hoc Network (MANET) is an infrastructureless network of autonomous devices formed dynamically. At network layer routing protocols in MANETs expect every node to cooperate in routing and data forwarding tasks. However, this cooperation leads towards a state in which nodes consumes their scarce resources for example battery power. Resource constraints of MANET nodes can derive dynamic selfish behavior in terms of not forwarding packets & not cooperating in routing operations. This can lead to degradation in network performance. In this paper, we first perform a simulation based study to evaluate the effects of selfish nodes on network performance. Then in contrast with most of the selfish node detection approaches in literature which are based on fully watchdog methods using promiscuous monitoring. We propose a proactive mechanism that first detects nodes that are exhibiting selfish behavior based on the factors which derives selfish behavior and then mitigate its effect on network performance. Initial simulation results of a case study shows that our method can detect & mitigate the effect of selfish behavior with an affordable overhead on the network.

[1]  George Pavlou,et al.  Detection of Packet Forwarding Misbehavior in Mobile Ad-Hoc Networks , 2007, WWIC.

[2]  Nitin H. Vaidya,et al.  Detection and handling of MAC layer misbehavior in wireless networks , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..

[3]  Nitin H. Vaidya,et al.  Selfish MAC layer misbehavior in wireless networks , 2005, IEEE Transactions on Mobile Computing.

[4]  Hugo M. Miranda Preventing selfishness in open mobile ad hoc networks , 2002 .

[5]  Jean-Pierre Hubaux,et al.  Security and Cooperation in Wireless Networks , 2007, ESAS.

[6]  Laura Marie Feeney,et al.  An Energy Consumption Model for Performance Analysis of Routing Protocols for Mobile Ad Hoc Networks , 2001, Mob. Networks Appl..

[7]  Michael P. Howarth,et al.  A generalized intrusion detection & prevention mechanism for securing MANETs , 2009, 2009 International Conference on Ultra Modern Telecommunications & Workshops.

[8]  Stefan Schlott,et al.  Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks , 2004, ESAS.

[9]  J.-P. Hubaux,et al.  Enforcing service availability in mobile ad-hoc WANs , 2000, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444).

[10]  R. Srikant,et al.  DARWIN: distributed and adaptive reputation mechanism for wireless ad-hoc networks , 2007, MobiCom '07.

[11]  Mukesh Singhal,et al.  A light-weight solution for selfish nodes problem considering battery status in wireless ad-hoc networks , 2005, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005..

[12]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[13]  Juan-Carlos Cano,et al.  Improving Selfish Node Detection in MANETs Using a Collaborative Watchdog , 2012, IEEE Communications Letters.

[14]  D. Djenouri,et al.  New approach for selfish nodes detection in mobile ad hoc networks , 2005, Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005..

[15]  Yongwei Wang,et al.  Enhancing Node Cooperation in Mobile Wireless Ad Hoc Networks with Selfish Nodes , 2008 .

[16]  Levente Buttyán,et al.  Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing , 2007 .

[17]  Michael P. Howarth,et al.  Protection of MANETs from a range of attacks using an intrusion detection and prevention system , 2013, Telecommun. Syst..

[18]  Luiz A. DaSilva,et al.  A reputation-based mechanism for isolating selfish nodes in ad hoc networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[19]  Kang G. Shin,et al.  A Lightweight Passive Online Detection Method for Pinpointing Misbehavior in WLANs , 2011, IEEE Transactions on Mobile Computing.