Selfishness Detection and Prevention Schemes for MANETs: A survey

Shyam Sunder Reddy K*, Shoba Bindu C**
*,** Department of Computer Science, JNTU College of Engineering, Anantapur.
Periodicity:July - September'2009
DOI : https://doi.org/10.26634/jse.4.1.476

Abstract

A Mobile Ad Hoc Network (MANET) is a temporary infrastructureless network, formed by a set of mobile hosts that dynamically establish their own network without relying on any central administration. Mobile ad hoc networking works properly only if the participating nodes cooperate in routing and forwarding. However, performing network functions consumes energy and other resources. To save its energy a node may behave selfishly and uses the forwarding service of other nodes without correctly forwarding packets for them. These nodes must be identified and excluded from the cooperative part of the network, as they only consume resources and don’t contribute to the infrastructure. In MANET’s routing misbehavior can severely degrade the performance at the routing layer. Specifically, nodes may participate in the route discovery and maintenance process but refuse to forward data packets.

This paper surveys the most important selfishness detection and prevention methods that have been introduced, providing a comprehensive comparison between the different proposed schemes.

Keywords

Mobile Ad Hoc Networks, Routing Misbehavior, Selfishness, Network Security

How to Cite this Article?

Shyam Sunder Reddy K and Shoba Bindu C (2009). Selfishness Detection and Prevention Schemes for MANETs: A survey,i-manager’s Journal on Software Engineering, 4(1),27-40. https://doi.org/10.26634/jse.4.1.476

References

[1]. H. Miranda and L. Rodrigues, (2002). .Preventing selfishness in open mobile ad hoc networks,. in Proc. of the Seventh CaberNet Radicals Workshop, October 2002.
[2]. L. Buttyan and J-P. Hubaux, .Security and Cooperation in wireless networks, available at http://secowinet.ep_.ch/
[3] L. M. Feeney and M. Nilsson, (2001). Investigating the energy consumption of a wireless network interface in an ad hoc networking environment,. in IEEE INFOCOM 2001.
[4]. S. Buchegger and J.-Y. Le Boudec, (2000). “Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes, Fairness in Dynamic Ad-Hoc Networks,” Proc.MobiHoc, June 2000.
[5]. Michiardi P, Molva R. CORE : (2002). A Collaborative Reputation Mechanism to Enforce Node Cooperation in th Mobile Ad Hoc Networks. In Proceedings of 6 IFIP Communication and Multimedia Security Conference, September 2002.
[6]. Liu J, Issarny V. (2004). Enhanced Reputation Mechanism for Mobile Ad Hoc Networks. In Proceedings of 2nd International Conference on Trust Management, March 2004.
[7]. Bansal S, Baker M., OCEAN: (2003). Observation- Based Cooperation Enforcement in Ad-Hoc networks. Technical Report, Stanford University, 2003.
[8]. He Q, Wu D, Khosla P. SORI: (2004). A secure and objective reputation based incentive scheme for ad-hoc networks. In Proceedings of IEEE WCNC2004, March.
[9]. Kejun Liu,Jing Deng, (2007). ”An Acknowledgement- Based Approach for the Detection of Routing Misbehavior in MANETs”, IEEE Transactions on Mobile Computing, Vol.6, No.5, May.
[10] Levente Buttyan and Hubaux: (2001). “Nuglets: A Virtual Currency to Simulate Cooperation in Self- Organized Mobile Ad Hoc Networks” 18 January 2001.
[11]. Zhong S, Chen J, Yang R. Sprite: (2003). A simple, cheat-proof, credit based system for mobile ad-hoc networks. In Proceedings of IEEE INFOCOM2003, April.
[12]. Yang H, Meng X, Lu S. (2002). Self-organized network-layer security in mobile ad hoc networks. In Proceedings of ACM WiSe02, September 2002.
[13]. Shamir A. (1979).How to share a secret Communications, ACM 1979; 22(11): pp. 612-613.
[14]. Kong J, Zerfos P, Luo H, et al. (2001).Providing robust and ubiquitous security support for mobile ad-hoc networks. In Proceedings of International Conference on Network Protocols (ICNP), November 2001.
[15]. Anderegg L, Eidenbenz S. Ad-hoc-VCG: (2003). A truthful and costefficient routing protocol for mobile adhoc networks with selfish agents. In Proceedings of 9th Annual International Conference on Mobile Computing and Networking, September 2003.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.