Uneingeschränkter Zugang

A Credit-based Method to Selfish Node Detection in Mobile Ad-hoc Network


Zitieren

[1] K. Patel and J. M. Rathod, “Effective Utilization of Bandwidth for Mobile Ad Hoc Network,” Indian J. Sci. Technol., vol. 9, no. 27, 2016. https://doi.org/10.17485/ijst/2016/v9i27/9242910.17485/ijst/2016/v9i27/92429Search in Google Scholar

[2] S. Stieglitz and C. Fuchß, “Challenges of MANET for mobile social networks,” Procedia Comput. Sci., vol. 5, pp. 820–825, 2011. https://doi.org/10.1016/j.procs.2011.07.11210.1016/j.procs.2011.07.112Search in Google Scholar

[3] N. Raza, M. U. Aftab, M. Qasim Akbar, O. Ashraf, and M. Irfan, “Mobile Ad-Hoc Networks Applications and Its Challenges,” Commun. Netw., vol. 8, no. 8, pp. 131–136, 2016. https://doi.org/10.4236/cn.2016.8301310.4236/cn.2016.83013Search in Google Scholar

[4] D. Helen and D. Arivazhagan, “Applications, Advantages, and Challenges of Ad Hoc Networks,” J. Acad. Ind. Res., vol. 2, no. 8, pp. 453–457, 2014.Search in Google Scholar

[5] N. Mohammed, H. Otrok, L. Wang, M. Debbabi, and P. Bhattacharya, “Mechanism design-based secure leader election model for intrusion detection in MANET,” IEEE Trans. Dependable Secur. Comput., vol. 8, no. 1, pp. 89–103, 2011. https://doi.org/10.1109/TDSC.2009.2210.1109/TDSC.2009.22Search in Google Scholar

[6] C. Chakrabarti, A. Banerjee and S. Roy, “An observer-based distributed scheme for selfish-node detection in a post-disaster communication environment using delay tolerant network,” in 2014 Applications and Innovations in Mobile Computing (AIMoC), 2014, pp. 151–156. https://doi.org/10.1109/AIMOC.2014.678553410.1109/AIMOC.2014.6785534Search in Google Scholar

[7] U. Shevade, H. H. Song, L. Qiu, and Y. Zhang, “Incentive-aware routing in DTNs,” Proc. Int. Conf. Netw. Protoc. ICNP, pp. 238–247, 2008. https://doi.org/10.1109/ICNP.2008.469704210.1109/ICNP.2008.4697042Search in Google Scholar

[8] D. Das, K. Majumder, and A. Dasgupta, “Selfish Node Detection and Low Cost Data Transmission in MANET using Game Theory,” Procedia Comput. Sci., vol. 54, pp. 92–101, 2015. https://doi.org/10.1016/j.procs.2015.06.01110.1016/j.procs.2015.06.011Search in Google Scholar

[9] R. I. Ciobanu, C. Dobre, M. Dascǎlu, Ş. Trǎuşan-Matu, and V. Cristea, “SENSE: A collaborative selfish node detection and incentive mechanism for opportunistic networks,” J. Netw. Comput. Appl., vol. 41, no. 1, pp. 240–249, 2014. https://doi.org/10.1016/j.jnca.2014.01.00910.1016/j.jnca.2014.01.009Search in Google Scholar

[10] M. Schütte, “Detecting Selfish and Malicious Nodes in MANETs,” pp. 1–7, 2006.Search in Google Scholar

[11] S. Bama B, and Indira K., “Detection of Selfish and Malicious Node in Mobile Ad-Hoc Network with NS-2 Using Chord Algorithm,” Int. J. Eng. Technol., vol. 9, no. 2, pp. 466–471, 2017. https://doi.org/10.21817/ijet/2017/v9i2/17090232610.21817/ijet/2017/v9i2/170902326Search in Google Scholar

[12] S. Mittal, and S. Dahiya, “Identification Technique for All Passive Selfish Node Attacks In a Mobile Network,” 2015. [Online]. Available: http://www.ijarcsms.com/docs/paper/volume3/issue4/V3I4-0011.pdf [Accessed: December 13, 2018].Search in Google Scholar

[13] D. Li, Y. Xu, and J. Liu, “Distributed relay selection over multi-source and multi-relay wireless cooperative networks with selfish nodes,” Comput. Commun., vol. 33, no. 17, pp. 2145–2153, 2010. https://doi.org/10.1016/j.comcom.2010.07.01710.1016/j.comcom.2010.07.017Search in Google Scholar

[14] P. P. Patel and R. H. Jhaveri, “Various schemes to detect selfishness in wireless ad-hoc networks: A survey,” Proc. 2015 Int. Conf. Green Comput. Internet Things, ICGCIoT 2015, pp. 881–886, 2016. https://doi.org/10.1109/icgciot.2015.738058710.1109/ICGCIoT.2015.7380587Search in Google Scholar

[15] S. Zhong, J. Chen, and Y. R. Yang, “Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks,” in IEEE INFOCOM 2003, Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies, pp. 1987–1997, 2003. https://doi.org/10.1109/INFCOM.2003.120922010.1109/INFCOM.2003.1209220Search in Google Scholar

[16] R. Kaushik et. al., “Enhanced node cooperation technique for outwitting selfish nodes in an ad hoc network,” IET Networks, vol. 4, no. 2, pp. 148–157, 2015. https://doi.org/10.1049/iet-net.2013.010310.1049/iet-net.2013.0103Search in Google Scholar

[17] F. Wang, F. Wang, B. Huang, and L. T. Yang, “COSR: A reputation-based secure route protocol in MANET,” Eurasip J. Wirel. Commun. Netw., vol. 2010:258935, July 2010. https://doi.org/10.1155/2010/25893510.1155/2010/258935Search in Google Scholar

[18] N. Samian, Z. A. Zukarnain, W. K. G. Seah, A. Abdullah, and Z. M. Hanapi, “Cooperation stimulation mechanisms for wireless multihop networks: A survey,” Int. J. Adv. Res. Comp. Sc. Soft. Eng., vol. 5, no. 8, pp. 306–106, 2015. https://doi.org/10.1016/j.jnca.2015.04.01210.1016/j.jnca.2015.04.012Search in Google Scholar

[19] S. S. Shinde, B. D. Phulpagar, “A Comparative Study of Selfish Node Detection Methods in Manet,” Int. J. Adv. Res. Comput. Sci. Softw. Eng., vol. 5, no. 8, pp. 306–310, 2015.Search in Google Scholar

[20] Z. Li and H. Shen, “Game-theoretic analysis of cooperation incentive strategies in mobile ad hoc networks,” IEEE Trans. Mob. Comput., vol. 11, no. 8, pp. 1287–1303, 2012. https://doi.org/10.1109/TMC.2011.15110.1109/TMC.2011.151Search in Google Scholar

[21] K. Komathy and P. Narayanasamy, “Best neighbor strategy to enforce cooperation among selfish nodes in wireless ad hoc network,” Comput. Commun., vol. 30, no. 18, pp. 3721–3735, 2007. https://doi.org/10.1016/j.comcom.2007.07.00410.1016/j.comcom.2007.07.004Search in Google Scholar

[22] M. Touati, R. El-Azouzi, M. Coupechoux, E. Altman, and J. M. Kelif, “A Controlled Matching Game for WLANs,” IEEE J. Sel. Areas Commun., vol. 35, no. 3, pp. 707–720, 2017. https://doi.org/10.1109/JSAC.2017.267225810.1109/JSAC.2017.2672258Search in Google Scholar

[23] Z. Ullah, M. S. Khan, I. Ahmed, N. Javaid, and M. I. Khan, “Fuzzy-based trust model for detection of selfish nodes in MANETs,” Proc. IEEE 30th Int. Conf. Adv. Inf. Netw. Appl. AINA, pp. 965–972, 2016. https://doi.org/10.1109/AINA.2016.14210.1109/AINA.2016.142Search in Google Scholar

[24] J. Sengathir and R. Manoharan, “A futuristic trust coefficient-based semi-Markov prediction model for mitigating selfish nodes in MANETs,” EURASIP J. Wirel. Commun. Netw., vol. 2015:158, 2015. https://doi.org/10.1186/s13638-015-0384-410.1186/s13638-015-0384-4Search in Google Scholar

[25] K. Komathy and P. Narayanasamy, “A Probabilistic Behavioral Model for Selfish Neighbors in a Wireless Ad Hoc Network,” IJCSNS International Journal of Computer Science and Network Security, vol. 7, no. 7, July 2007.Search in Google Scholar

[26] A. Azni, R. Ahmad, Z. Noh, and A. Basari, “Correlated Node Behavior Model based on Semi Markov Process for MANETS,” J. Comput. Sci. Issues, vol. 9, no. 1, pp. 50–59, 2012.Search in Google Scholar

[27] A. H. Azni, A. Rabiah, and M. N. Zul Azri, “Epidemic Modeling for Correlated Node Behavior in Ad Hoc Networks Center for Advanced Computing Technology,” vol. 2, no. 1, pp. 22–30, 2013.10.20533/ijcc.2046.3359.2013.0003Search in Google Scholar

[28] O. A. Wahab, H. Otrok, and A. Mourad, “A cooperative watchdog model based on Dempster-Shafer for detecting misbehaving vehicles,” Comput. Commun., vol. 41, pp. 43–54, 2014. https://doi.org/10.1016/j.comcom.2013.12.00510.1016/j.comcom.2013.12.005Search in Google Scholar

[29] A. Jesudoss, S. V. Kasmir Raja, and A. Sulaiman, “Stimulating truth-telling and cooperation among nodes in VANETs through payment and punishment scheme,” Ad Hoc Networks, vol. 24, Part A, pp. 250–253, 2015. https://doi.org/10.1016/j.adhoc.2014.08.01810.1016/j.adhoc.2014.08.018Search in Google Scholar

[30] T. Hayajneh, G. Almashaqbeh, and S. Ullah, “A Green Approach for Selfish Misbehavior Detection in 802.11-Based Wireless Networks,” Mob. Networks Appl., vol. 20, no. 5, pp. 623–635, 2015. https://doi.org/10.1007/s11036-015-0605-4 D. Djenouri, N. Ouali, and A. Mahmoudi, “Random Two-hop ACK to Detect Uncooperative Nodes in MANETs,” Security, vol. 2, no. 7, pp. 165–175, 2017.10.1007/s11036-015-0605-4Search in Google Scholar

[31] D. AbdelMohsen, and T. Abdelkader, “Detecting selfish nodes and motivating cooperation, Mobile Ad-hoc Networks,” Computer Engineering & Systems (ICCES), 2015 IEEE Tenth International Conference, pp. 301–306, 2015. https://doi.org/10.1109/icces.2015.739306410.1109/ICCES.2015.7393064Search in Google Scholar

[32] Z. Ullah et. al., “Fuzzy-Based Trust Model for Detection of Selfish Nodes in MANETs,” 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA), 2016. https://doi.org/10.1109/AINA.2016.14210.1109/AINA.2016.142Search in Google Scholar

[33] K. Chaker, A.Lakas, and N. Lagraa. “Detection of intelligent malicious and selfish nodes in VANET using threshold adaptive control,” 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), 2016. https://doi.org/10.1109/icedsa.2016.781849210.1109/ICEDSA.2016.7818492Search in Google Scholar

[34] C. Nimje, and P. Junghare, “A review on node activity detection, selfish & malicious behavioral patterns using watchdog algorithm,” 2017 International Conference Inventive Systems and Control (ICISC), 2017. https://doi.org/10.1109/icisc.2017.806866310.1109/ICISC.2017.8068663Search in Google Scholar

[35] A. Lupia, “TEEM: Trust-based Energy-Efficient Distributed Monitoring for Mobile Ad-hoc Networks,” 2017 Wireless Days, IEEE, pp. 133–136, 2017. https://doi.org/10.1109/WD.2017.791812810.1109/WD.2017.7918128Search in Google Scholar

[36] S. Adabi, S. Jabbehdari, A. Rahmani, and S. Adabi, “A novel distributed clustering algorithm for mobile ad-hoc networks,” J. Comput. Sci., vol. 4, no. 2, pp. 161–166, 2008. https://doi.org/10.3844/jcssp.2008.161.16610.3844/jcssp.2008.161.166Search in Google Scholar

eISSN:
2255-8691
Sprache:
Englisch
Zeitrahmen der Veröffentlichung:
2 Hefte pro Jahr
Fachgebiete der Zeitschrift:
Informatik, Informationstechnik, Projektmanagement, Softwareentwicklung, Künstliche Intelligenz