Effect of Selfish Nodes in a Mari Topology Based Adhoc Wireless Ndetworks – A Proposed Solution

Subramanyam M.V*, K. Satya Prasad**
*HOD of ECE Dept .R.G.M College of Engg and Tech,Nandyal,Kurnool
**Principal and prof of ECE ,JNTU College of Engg,Kakinada ,Godavari ,India
Periodicity:April - June'2007
DOI : https://doi.org/10.26634/jse.1.4.756

Abstract

A mobile ad hoc network is a self-organizing and rapidly deployable network in which neither a wired backbone nor a centralized control exists, without using any pre-defined topology and pre-defined infrastructure. The goal of an ad-hoc wireless network is to enable communication between any two wireless connected nodes in the network. Using intermediate nodes in the network as forwarding agents enables communication between nodes that are beyond direct communication range. Ad hoc wireless networks are also more prone to security threats and misbehaving nodes. One more problem that we cannot predict in the ad hoc wireless network is misbehaving nodes. Generally a good network must contain all the nodes with cooperative in nature. If any node that has a strong motivation to deny packet forwarding to others, while at the same time using their services to deliver own data, leads more complication and problems in the ad hoc wireless networks. These nodes are some time called as selfish nodes.

In this paper we propose a Path Management Protocol on Ad hoc Wireless Network (PMP-ANT) designed based on the MARI topology, to cope with misbehavior nodes. In this approach we use PMP-ANT protocol to detect misbehaving nodes and to isolate them from the network, so that misbehavior will not pay off but result in denied service and thus cannot continue. PMP-ANT detects misbehaving nodes by means of direct observation and second-hand information about several types of misbehavior and also using the reputation system and Trust records.

Keywords

Misbehavior Nodes, MARI Topology, Monitor, Reputation System, Trust Records

How to Cite this Article?

Subramanyam M.V and K. Satya Prasad (2007). Effect of Selfish Nodes in a Mari Topology Based Adhoc Wireless Ndetworks – A Proposed Solution. i-manager’s Journal on Software Engineering, 1(4),75-80. https://doi.org/10.26634/jse.1.4.756

References

[1]. Andreas. R Birgit. R Schunter. M and Waidner. M., "Trusting mobile user devices and security modules". In Computer, IEEE, pages 6168. February I 997.
[2]. Audun .J and Ismail. R. , "The beta reputation system" . In Proceedings of the l5th Sled Electronic Commerce Conference, Sled, Slovenia, pp- June 2002.
[3]. 8ahl. RLi.L, Walton hater. R and Wang. Y., "Distributed Topology Control For MARI Efficient Operation in Multi hop Wireless Ad Hoc Networks", in Infocomm 2001 . Twentieth Annual Joint Conference Of the IEEE Computer And Communication Societies Proceedings. IEEE, Volume: 3, 22- pp. I 388- I 397, 26 April 2001 .
[4]. goo. L, Garcia-Luna-Aceves J.J, "Topology Management in Ad Hoc Networks", in proceedings of fourth ACM International symposium on Mobile Ad Hoc Networking and Computing, pp,120-140, June 2003.
[5]. glaze. M, Feigenbaum. J and Lacy. J, "Decentralized trust management" , In Proceedings of IEEE Conference on Security and Privacy, Oakland, CA, pp-1996.
[6]. glaze. M, Feigenbaum. J, lonnidis. J and Keromytis.A.D, "The role of trust management in distributed systems security" . In Secure Internet Programming: Security Issues for Mobile and Distributed Objects, ed, Jan Vifek and Christian Jense, Springer Verilag Inc., 1999,
[7]. Chrysanthos. D, "Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior" . In Proceedings of the ACM Conference on Electronic Commerce, pages 150157, 2000.
[8]. Subramanyam.M.V and Satyaprasad.K, "A proposed topology for reducing of power consumption in adhoc wireless networks-i-manager' s Journal on Engineering andTechnology , vol.1, No. 4, pp 19-24.
[9]. Subramanyam.M.V and Satyaprasad.K, "Management of Mobile Computing Networks"-A National conference on Signals and Systems NCSSC- 04,RGMCET, Nandyal, 13h Spt'03,pp26-39
[10] . Subramanyam.M .V and Satyaprasad.K, "Optimization of TCP Performance In Hybrid Model for Wireless Networks" International Conference Systemics, Cybernetics and Informatics (ICSCI) 2006, 4h To 8fh Jan'2006, Volume: I of 2,pp538-54 I .
[11]. Subramanyam.M.V and Satyaprasad.K, "Performance Enhancement in adhoc networks", PCEA IFTOMM International Conference (PICA 2006) on "Recent Trends in Automation & its Adaptation to Industries,July l2th I 4'h, 2006 .
[1 2]. Subramanyam. M .V and Satyaprasad.K, "Quantitative analysis of an adhoc wireless networks, Asian Journal of Information Technology, Vol,5,No.5 PP- 49 I -496"
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.