DSNAODV: Detecting Selfish Nodes based on Ad hoc On-demand Distance Vector routing protocol

Document Type : Research Paper

Authors

Department of Computer Science, Shahid Bahonar University of Kerman, Kerman, Iran

Abstract

In mobile ad hoc networks (MANETs), innumerable intermediate nodes interchange information without the need for infrastructure. In these networks, nodes depend upon each other for routing and forwarding packets, and communication among them is very important. Forwarding packets consumes network bandwidth, local CPU time, memory, and energy. Therefore, some nodes might intend not to forward packets to save resources for their use that called selfish nodes. The destruction of basic action of the network can occur due to this selfish behavior of the node. So, in this paper, we focused on dropper misbehavior for data packets and route request packets. For detecting this kind of nodes in this paper, we improved the ad hoc on-demand distance vector (AODV) routing protocol and proposed a new routing protocol for detecting selfish nodes. The performance analysis shows that the DSNAODV (Detecting Selfish Node based on Ad hoc On-demand Distance Vector routing protocol) protocol can improve the packet delivery ratio and use less energy compared to AODV and EBTS protocols.

Keywords


[1] S. J. Al-Shakarchi and R. Alubady, A Survey of Sel sh Nodes Detection in MANET: Solutions and Opportunities of Research, Proceedings of the 1st IEEE Babylon International Conference on Information Technology and Science (BICITS)(2021),178-184.
[2] M. M. Musthafa, K. Vanitha, A.M.J.MD. Zubair Rahman, K. Anitha,An Ecient Approach to Identify Sel sh Node in MANET, Proceedings of the International Conference on Computer Communication and Informatics (ICCCI)(2020).
[3] D. Das, K. Majumder, A. Dasgupta, Sel sh Node Detection and Low-Cost Data Transmission in MANET using Game Theory, Procedia Computer Science vol.54 (2015) 92-101.
[4] T. Fahad, R. Askwith, A Node Misbehavior Detection Mechanism for Mobile Ad-hoc Networks, (2006).
[5] K. Santhi, B. Parvathavarthini, Performance analysis of randomized rever ad hoc on-demand distance vector routing protocol in MANET, Journal of Computer Science vol .10, no. 11 (2014) 1850-1858.
[6] G. Ghalavand, A. Dana, A. Ghalavand and M. Rezahosieni, Reliable routing algorithm based on fuzzy logic for Mobile Adhoc Network, Proceedings of the 3rd International Conference on Advanced Computer Theory and Engineering(2010), V5-606-V5-609.
[7] M. Vanday. Baseri, H. Fatemidokht, Survey of di erent techniques for detecting sel sh nodes in MANETs, Journal of Mahani Mathematical Research Center (JMMRC) vol.11, no. 2 (2022) 45-59.
[8] A. Babakhouya, Y. Challal, and A. Bouabdallah, A Simulation Analysis of Routing Misbehavior in Mobile Ad Hoc Networks, Proceedings of the Second International Conference on Next Generation Mobile Applications, Services, and Technologies (2008),592-597.
[9] T. Fahad, D. Djenouri and R. Askwith, On detecting packets droppers in MANET: A novel low-cost approach, Proceedings of the Third International Symposium on Information Assurance and Security (2007), 56-64.
[10] D. Djenouri, N. Badache, Two Hops ack, New approach for sel sh nodes detection in mobile ad hoc networks, Proceedings of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, (2005), 288-294.
[11] W. Yu, K. J. Ray Liu, Secure cooperation in autonomous mobile ad-hoc networks under noise and imperfect monitoring, a game-theoretic approach, IEEE transactions on information forensics and security vol. 3, no. 2 (2008) 317-330.
[12] H. J. Kim, J. M. Peha, Detecting sel sh behavior in a cooperative commons, Proceedings of the 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks,(2008), 1-12.
[13] C. E. Perkins and E. M. Royer, Ad-hoc on-demand distance vector routing, Proceedings of the Second IEEE Workshop on Mobile Computing Systems and Applications, (1999),90-100.
[14] A. N. Thakare, M.Y. Joshi, Performance analysis of AODV & DSR routing protocol in mobile ad hoc networks, IJCA Special Issue on Mobile Ad-hoc Networks (2010) 211-218.
[15] L. Buttyan and J.-P. Hubaux, Stimulating cooperation in self-organizing in mobile ad hoc networks, Mobile Networks and Applications vol. 8 (2003) 579-592.
[16] Y. Wang, M. Singhal, On improving the eciency of truthful routing in MANETs with sel sh nodes, Pervasive and Mobile Computing (2007) 537-559.
[17] P. Michiardi and R. Molva, Core, A Collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks, Proceedings of the Communication and Multimedia Security Conference (2002), 107-121.
[18] T. Anantvalee and J. Wu, Reputation-based system for encouraging the cooperation of nodes in mobile ad hoc networks, Proceedings of the IEEE International Conference on Communications, (2007), 3383-3388.
[19] E. H.Orallo, M. D. Serrat, J.C. Cano, C. T. Calafate, and P. Manzoni, Improving sel sh node detection in MANETs using a collaborative watchdog, IEEE Communications Lettersvol. 16, no. 5 (2012) 642-645.
[20] R. Vijian, V. Mareeswari, and K.Ramakrishna, Energy-based trust solution for detecting sel sh nodes in MANET using fozzy logic, International Journal of Research and Reviews in Computer Science(IJRRCS) vol. 2, no. 3 (2011) 647-652.
[21] K. Rama Abirami and M. G. Sumithra, Evaluation of neighbor credit value-based AODV routing algorithms for sel sh node behavior detection, Cluster Computing vol. 22 (2018) 1{10.
[22] R. Mangayarkarasi and R. Manikandan, Cost e ective collaborative anomaly detection system for sel sh node attacks in MANET, Journal of Critical Reviews vol. 7, no. 13 (2020) 148-154.
[23] M. Ponnusamy, A. Senthilkumar, R. Manikandan, Detection of sel sh nodes through reputation model in Mobile Ad hoc Network{MANET, Turkish Journal of Computer and Mathematics Education vol. 12, no. 9 (2021) 2404-2410.
[24] M.A. Gabri, L. I. Chunlin , Y.Zhiyong, A. H. Naji Hasan, and Z. Xiaoqing, Improved the energy of ad hoc on-demand distance vector routing protocol, Proceedings of the International Conference on Future Computer Supported Education, (2012), 355 { 361.
[25] M. Khaeel Ullah Khan and K.S. Rame, E ect on packet delivery ratio (PDR) through-put in wireless sensor networks due to black hole attack, International Journal of Innovative Technology and Exploring Engineering (IJITE) vol. 8, no. 12S (October 2019ar)428-432.
[26] L. W. Wu and R.-F. Yu, A threshold-based method for sel sh nodes detection in MANET, Proceedings of the IEEE International Computer Symposium (ICS2010), (2010), 875-882.
Volume 11, Issue 3 - Serial Number 23
Special Issue dedicated to Prof. Mashaallah Mashinchi.
November 2022
Pages 57-68
  • Receive Date: 04 December 2021
  • Revise Date: 06 May 2022
  • Accept Date: 21 May 2022