Open Access Open Access  Restricted Access Subscription or Fee Access

Detection and Prevention of Selfish Node Attack in MANET

Puneet Garg

Abstract


Mobile ad hoc network is self-designing, autonomous, without any centralize node and lacking of the fixed infrastructure network. Mobile nodes are depending on other nodes for transmitting data. Mobile ad hoc network has expected that all nodes are cooperating with each other. Anyhow, some nodes are not cooperating and saving their resources for own use, these nodes are termed as a selfish node. Behaviour of selfishness performance of network reduces. In this paper, define behaviour of selfish node, different techniques are used to identify selfish node attack and prevention of a selfish node attack in MANET. With the help of watchdog technique selfish node attack can detect and using proposed approach prevention of a selfish node attack is possible and network performance improves.

Keywords: AODV, MANET, NS2

Full Text:

PDF

References


Hinds A., Ngulube M., Zhu S., et al. A review of routing protocols for MobileAd-Hoc NETworks (MANET), IJIET. 2013; 3(1).

Gupta A.K., Sadawarti H., Verma A.K. Review of various routing protocols for MANETs, Int J Inform Electr Eng. 2011; 1(3).

Prasanna venkatesan T., Rajakumar P., Pitchaikkannu A. Overview of proactive routing protocols in MANET international conference on communication systems and network technologies, IEEE. 2014.

Nayyar A. Simulation based evaluation of reactive routing protocol for MANET international conference on advanced computing & communication technologies, IEEE. 2012.

Biradar S.R., Sarma H.D., Sarakar S.K., et al. Hybrid (day- night) routing protocol for mobile Ad-Hoc networks international conference on microwave theory and applications, IEEE. November 2008.

Sankareswary P., Suganthi R., Sumathi G. Impact of selfish nodes in multicast ad hoc on demand distance vector protocol international conference on wireless communication and sensor computing, IEEE. 2010.

Butty´an L., Hubaux J.-P. Enforcing service availability in mobile ad-hoc WAN 1st workshop on mobile ad hoc networking and computing, IEEE. 2000.

Zhang L., Sooriyabandara M., Fan Z. A simple and reliable credit-balanced incentive scheme for wireless ad-hoc networks, IEEE. 2011.

Hortelano J., Cano J.C., Calafate C.T., et al. Watchdog intrusion detection systems: are they feasible in MANETs? XXI Jornadas de Paralelismo. CEDI, Valencia, Spain, September 2010.

Marti S., Giuli T.J., Lai K., et al. Mitigating Routing Misbehavior in Mobile Ad Hoc Networks international Conference on Mobile Computing and Networking. Boston, USA, 2000.

Balakrishnan K., Deng J., Varshney P.K. TWOACK: preventing selfishness in mobile ad hoc networks wireless communications and networking conference, IEEE. 2005.

Miranda H., Rodrigues L. Friends and foes: preventing selfishness in open mobile ad hoc networks international conference on distributed computing systems workshops, IEEE. 2003.

Buchegger S., Yves Le Boudec J. Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes: Fairness In Dynamic Adhoc NeTworks) International Symposium on Mobile Ad Hoc Networking and Computing. Lausanne, Switzerland, 2002.

The Network Simulator, nshttp://www.isi.edu/nsnam/ns




DOI: https://doi.org/10.37628/jbcc.v2i1.293

Refbacks

  • There are currently no refbacks.