Survey of different techniques for detecting selfish nodes in MANETs

Document Type : Research Paper

Authors

Department of Computer Science, Shahid Bahonar University of Kerman, Kerman, Iran

Abstract

In Mobile Ad-hoc Networks (MANETs), each node is free to move and connect with another over a wireless connection, without the requirement for a centralized controller or base station. These features make MANET useful and functional in a variety of areas, including tactical situations, sensor networks, and rescue operations. However, this type of network also has a range of issues such as security, Quality of Service, dynamic topology, scalability, the absence of central management, and energy consumption. In MANETs, some of the nodes do not take part in forwarding packets to other nodes to conserve their resources such as energy, bandwidth, and power. The nodes which act selfishly to conserve their resources are called selfish nodes. In recent years, mobile ad hoc networks have become a very popular research topic. In this paper, we classified techniques for detecting selfish nodes in 4 categories namely reputation-based scheme, credit-based scheme, acknowledgment-based scheme, and game-theoretic scheme. Then we mentioned different methods available for reducing the effect of selfish nodes in mobile ad hoc networks. Finally tables 1 and 2 show the comparison of techniques for detecting selfish nodes.

Keywords

Main Subjects


[1] K. Susan, K. C., J.-O. A. M., and M. E. S., An Improved Token-Based Umpiring Technique for Detecting and Eliminating Sel sh Nodes in Mobile Ad-hoc Networks, Egypt. Comput. Sci. J., vol. 44, no. 2 (2020) 74{85.
[2] J. S. Raja. and I. J. Raja, Survey on Sel shness Handling In Mobile Ad Hoc Network, A International Journal of Emerging Technology and Advanced Engineering vol. 2, no. 11 (2012) 688{692.
[3] H. Yadav and H. K. Pati, A Survey on Sel sh Node Detection in MANET, Proceedings of International Conference on Advances in Computing, Communication Control and Networking, ICACCCN, (2018), 217|221.
[4] S. Aifa and T. Thomas, Review on Di erent Techniques Used in Sel sh Node Detection, Proceedings of the IEEE International Conference on Circuits and Systems in Digital Enterprise Technology (ICCSDET), ( Kottayam, India, 2018), 1|4.
[5] S.J.H. Al-Shakarchi and R. Alubady, A Survey of Sel sh Nodes Detection in MANET: Solutions and Opportunities of Research, Proceedings of the 1st. Babylon International Conference on Information Technology and Science 2021 (BICITS 2021), (Babil, IRAQ, 2021), 178{184.
[6] J. H. Choi, K. S. Shim, S. Lee, and K. L. Wu, Handling Sel shness in Replica Allocation over a Mobile Ad Hoc Network, IEEE Transactions on Mobile Computing vol. 11, no. 2 (2012) 278{291.
[7] N. K. Gupta, A. K. Sharma, and A. Gupta, Sel sh Behaviour Prevention and Detection in Mobile Ad-Hoc Network Using Intrusion Prevention System (IPS), International Journal of Research Review in Engineering Science and Technology  (IJRREST) vol. 1, no. 2 (2012) 31{34.
[8] S. Marti, T.J. Giuli, K. Lai, and M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, Proceedings of the 6th annual international conference on Mobile computing and networking (New York, NY, United States, 2000), 255-{265.
[9] R. kaushikand J. Singhai, Detection, and Isolation of Reluctant Nodes Using Reputation Based Scheme in an Ad-hoc Network, International Journal of Computer Networks & Communications (IJCNC) vol. 3, no. 2 (2011) 95{105.
[10] M. Ponnusamy, Dr. A. Senthilkumar, Dr.R.Manikandan, Detection of Sel sh Nodes Through Reputation Model In Mobile Adhoc Network { MANET, Turkish Journal of Computer and Mathematics Education vol. 12, no. 9 (2021) 2404{2410.
[11] T. H. Lacey, R.F. Mills, B.E. Mullins, R.A. Raines, M. E. Oxley, and S.K. Rogers, RIPsece- Using Reputation-based Multilayer Security to Protect MANETs, Computers and Security vol. 31 (2012) 122{136.
[12] B.V. Sherif and P. Salini, Detection and Isolation of Sel sh nodes in Manet using Collaborative Contact-Based Watchdog with Chimp-AODV, Research Square, springer (2021)DOI: https://doi.org/10.21203/rs.3.rs-754829/v1.
[13] L. Buttyan, J.P. Hubaux, Stimulating cooperation in self-organizing mobile ad hoc networks, ACM/Kluwer Mobile Networks and Applications vol. 5, no. 8 (2003) 579|592.
[14] L. Buttyan and J.P. Hubaux, Enforcing Service Availability in Mobile Ad-Hoc WANs,Proceedings of 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444), (Boston, MA, USA, 2000), 87{96.
[15] S. Mubeen and S. Johar, Detection and Elimination of the Sel sh Node in Ad-Hoc Network Using Energy Credit Based System, J. Netw. Inf. Secure. vol. 7, no. 2 (2019) 18{22.
[16] K. Rama Abirami and M. G. Sumithra, Evaluation of Neighbor Credit Value-Based AODV Routing Algorithms for Sel sh Node Behavior Detection, Cluster Computing vol. 22 (2018) 1{10.
[17] M. Bounouni and L. Bouallouche-Medjkoune, Adaptive Credit-Based Stimulation Scheme for Dealing with Smart Sel sh Nodes in Mobile Ad Hoc Network, Proceeding of the 2018 International Symposium on Programming and Systems (ISPS), (Algiers,Algeria, 2018), 1{5.
[18] K. Balakrishnan, J. Deng, and P. K. Varshney, TWOACK: Preventing Sel shness in Mobile Ad Hoc Networks, Proceeding of the IEEE Wireless Communications and Networking Conference, WCNC, (New Orleans, LA, USA, 2005), 2137|2142.
[19] K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, An Acknowledgment-based Approach for the Detection of Routing Misbehavior in MANETs, IEEE Transactions on Mobile Computing vol. 6, no. 5 (2007) 536{550.
[20] H. M. Sun, Ch. H. Chen and Y. F. Ku, A Novel Acknowledgment-based Approach Against Collude Attacks in MANET, Expert Systems with Applications vol. 39 (2012) 7968{7975.
[21] S. Sayyar, A. Khan, F. Ullah, H. Anwar, and Z. Kaleem, Enhanced TWOACK Based AODV Protocol for Intrusion Detection System, Proceeding of the 2018 International Conference on Computing, Mathematics and Engineering Technologies, (Sukkur, Pakistan, 2018), 1-{4.
[22] A. Srivastsva, S.K. Gupta, M. Najim, N. Sahu, G. Aggarwal, and B.D. Mazumdar, DSSAM: digitally signed secure acknowledgment method for mobile ad hoc network, EURASIP Journal on Wireless Communications and Networkingvol. 12 (2021) https://doi.org/10.1186/s13638-021-01894-7.
[23] D. B. Roy and R. Chaki, MADSN: Mobile Agent-Based Detection of Sel sh Node in MANET, International Journal of Wireless & Mobile Networks(IJWMN) vol. 3, no. 4 (2011) 225-235.
[24] J. H. Cho and I. R. Chen, On the Tradeo  Between Altruism and Sel shnessin MANET Trust Management, Ad Hoc Networks vol. 11 (2013) 2217{2234.
[25] L. Zhao, J. Zhang, K. Yang, and H. Zhang, Using Incompletely Cooperative Game Theory in Mobile Ad Hoc Networks, Proceedings of the 2007 IEEE International Conference on Communications, (Glasgow, UK, 2007), 3401{3406.
[26] A.A. Sharah, M. Alhaj, and M. Hassan, Sel sh Dynamic Punishment Scheme: Misbehavior Detection in MANETs Using Cooperative Repeated Game, International Journal of Computer Science and Network Security (IJCSNS) vol. 20, no. 3 (2020) 168{173.
[27] D. Hales, From Sel sh Nodes to Cooperative Networks { Emergent Link-based incentives in Peer-to-Peer Networks, Proceedings of the Fourth International Conference on Peer-to-Peer Computing (P2P'04), (Zurich, Switzerland, 2004), 151{158.
[28] V. Srinivasan, P. Nuggehalli, C.F. Chiasserini, and R.R. Rao, Cooperation in Wireless Ad Hoc Networks, Proceedings of the IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat.No.03CH37428), (San Francisco, CA, USA, 2003), 808{817.
[29] A. Gupta and A. Saxena, Detection and Prevention of Sel sh Node in MANET using Innovative Brain Mapping Function: Theoretical Model, International Journal of Computer Applications vol. 57, no. 12 (2012) 17{20.
[30] D. E. Charles, K. D. Georgilakis and A. D. Panagopoulos, ICARUS: Hybrid Incentive Mechanism for Cooperation Stimulation in Ad hoc Networks, Ad Hoc Networks vol. 10 (2012) 976{989.
[31] http://www.universalteacherpublications.com/univ/ebooks/or/Ch9/limit.htm (Avail-able at March 15, 2010).