Journal Title : International Journal of Modern Trends in Engineering and Science

Author’s Name : C.Poornima  unnamed

Volume 03 Issue 05 2016

ISSN no:  2348-3121

Page no: 43-49 (Print)

Abstract – In Mobile ad-hoc networks (MANETs) assume that mobile nodes voluntary cooperate in order to work properly. This cooperation based cost-intensive activity and some nodes refuse to cooperate, leading to selfish node behavior. The overall network performance will be seriously affected. Thus use of watchdogs is a well-known mechanism to detect selfish nodes. Therefore the detection process performed by the watchdogs can fail, generating false positives and false negatives that leads to wrong operations. Moreover, relying on the local watchdogs alone can lead to a poor performance when detecting selfish nodes, in provisions of speed and accuracy. In ad hoc network, the selfish nodes deviating from the standard MAC (Medium Access Control) protocol can significantly degrade the normal nodes’ performance and it is difficult to detect. In this paper, we propose the detection and defense schemes to identify and protect against MAC-layer selfish misbehavior, respectively, in IEEE 802.11 multi-hop ad hoc networks.

Keywords— Adhoc Networks; Selfish Node; Watchdog Method 


  1. Enrique Hern_andez-Orallo, CoCoWa: “A Collaborative Contact-Based Watchdog for Detecting Selfish Nodes” Member, IEEE, Manuel David Serrat Olmos, Juan-Carlos Cano, Carlos T. Calafate, and Pietro Manzoni, Member, Jun 2015.
  2. Abbas.S, M. Merabti, D. Llewellyn-Jones, and K. Kifayat, “Lightweight sybil attack detection in manets,” IEEE Syst. J., vol. 7, no. 2, pp. 236–248, Jun. 2013.
  3. Bansal.S and M. Baker, “Observation-based cooperation enforcement in ad hoc networks” arXiv:cs.NI/0307012, 2003.
  4. Buttyan.L and J.-P. Hubaux, “Enforcing service availability in mobile ad-hoc WANs,” in Proc. 1st Annu. Workshop Mobile Ad Hoc Netw. Comput., 2000, pp. 87–[5] Buttyan.L and J.-P. Hubaux, “Stimulating cooperation in self-organizing mobile ad hoc networks,” Mobile Netw. Appl., vol. 8, pp. 579–592, 2003.
  5. Cai.H and Eun.D.Y, “Crossing over the bounded domain: From exponential to power-law intermeeting time in mobile ad hoc networks,” IEEE/ACM Trans. Netw., vol. 17, no. 5, pp. 1578–1591, Oct. 2009.
  6. Chaintreau.A, P. Hui, Crowcroft.J, C. Diot, R. Gass, and J. Scott, “Impact of human mobility on opportunistic forwarding algorithms,” IEEE Trans. Mobile Comput., vol. 6, no. 6, pp. 606–620, Jun. 2007.
  7. Douceur.J.R, “The sybil attack,” in Proc. Revised Papers 1st Int. Workshop Peer-to-Peer Syst., 2002, pp. 251–26[0.
  8. Eidenbenz.S, G. Resta, and P. Santi, “The COMMIT protocol for truthful and cost-efficient routing in ad hoc networks with selfish nodes,” IEEE Trans. Mobile Comput., vol. 7, no. 1, pp. 19–33, Jan. 2008.
  9. Gao.W, Q. Li, B. Zhao, and G. Cao, “Multicasting in delay tolerant networks: A social network perspective,” in Proc. 10th ACM Int. Symp. Mobile Ad Hoc Netw. Compute., 2009, pp. 299–308.
  10. Groenevelt.R, P. Nain, and G. Koole, “The message delay in mobile ad hoc networks,” Perform. Eval., vol. 62, pp. 210–228, Oct. 2005.
  11. Hernandez-Orallo.E, M. D. Serrat, J.-C. Cano, C. M. T. Calafate, and P. Manzoni, “Improving selfish node detection in MANETs using a collaborative watchdog,” IEEE Comm. Lett., vol. 16, no. 5, pp. 642–645, May 2012.
  12. Buchegger.S and Le BoudeeJ.Y, “Self-policing mobile ad hoc networks by reputation systems,” IEEE Commun. Mag., vol. 43, no. 7, pp. 101–107, Jul. 2005.
Scroll Up