Selfish Node Detection Scheme based on Bates Distribution Inspired Trust Factor for MANETs
DOI:
https://doi.org/10.4108/ew.v9i6.3065Keywords:
Bates Distribution, Selfish behaviour, Trust Factor, Mean Packet Deviation, Variance, Standard DeviationAbstract
The trustworthiness of mobile nodes is considered as the principal parameter for ensuring significant data dissemination in a Mobile Ad hoc NETwork (MANET). However, the selfish behaviour of nodes minimizes the trust by dropping a considerable amount of data packets in the network. The significant dropping of data packets by the selfish node introduces huge data overhead with increased latency and energy consumption, thus increasing the number of retransmissions. In this paper, Selfish Node Detection Scheme based on Bates Distribution Inspired Trust Factor (SNDS-BDITF) is propounded for predominant detection of selfish behaviour by investigating multiple levels of factors that contribute towards effective selfishness detection. The proposed SNDS-BDITF approach is also potent in enhancing the detection rate of selfishness by multi-perspective analysis of each monitored node’s forwarding characteristics considering the benefits of other cooperating mobile nodes. The simulation results of the propounded SNDS-BDITF method are enhanced on an average by 16% and 14% when compared to the existing selfish node segregation mechanisms prevalent in the literature.
Downloads
References
Wu LW, Yu RF. A threshold-based method for selfish nodes detection in MANET. In: Institute of Electrical and Electronics Engineers (IEEE). Proceedings of the International Computer Symposium (ICS2010); 16-18 Dec; Tainan: IEEE; 2010. p. 875-882. DOI: https://doi.org/10.1109/COMPSYM.2010.5685389
Crepeau C, Davis CR, Maheswaran M. A secure MANET routing protocol with resilience against byzantine behaviours of malicious or selfish nodes. In: IEEE Computer Society. Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07); 21-23 May; Niagara Falls, Ont., Canada: IEEE; 2007. Vol. 2, p. 19-26. DOI: https://doi.org/10.1109/AINAW.2007.54
Lakshmi S, Radha S. Selfish aware queue scheduler for packet scheduling in MANET. In: Institute of Electrical and Electronics Engineers (IEEE). Proceedings of the International Conference on Recent Trends in Information Technology (ICRTIT ’12); 19-21April; Chennai, Tamil Nadu, India: IEEE. 2012. p. 343-348. DOI: https://doi.org/10.1109/ICRTIT.2012.6206808
Kurkure AM, Chaudhari B. Analysing credit-based ARAN to detect selfish nodes in MANET. In: Proceedings of the International Conference on Advances in Engineering & Technology Research (ICAETR-2014); 1-2 August; Unnao, Kanpur, India: IEEE; 2014. p. 1-5. DOI: https://doi.org/10.1109/ICAETR.2014.7012851
Sengathir J, Manoharan R. Co-operation enforcing reputation-based detection techniques and frameworks for handling selfish node behaviour in MANETs: A review. Wireless Personal Communications. 2017; 97(3): 3427-3447. DOI: https://doi.org/10.1007/s11277-017-4677-2
Gupta AK, Mandal JK, Bhattacharya. Mitigating selfish, blackhole and wormhole attacks in DTN in a secure, cooperative way. IJICS. 2017; 9(1/2):130-155. DOI: https://doi.org/10.1504/IJICS.2017.10003609
Valarmathi ML, Meenakowshalya A, Bharathi A. Robust Sybil attack detection mechanism for Social Networks-a survey. In: Proceedings of the 3rd International Conference on Advanced Computing and Communication Systems (ICACCS); 22-23 Jan; Coimbatore: IEEE. 2016. Vol. 1, p. DOI: https://doi.org/10.1109/ICACCS.2016.7586399
- 5.
Konorski J. An idea bag strategy to discourage selfish behavior under random token MAC protocols for wireless LANs. In: In: Chaudhuri S., Das S.R., Paul H.S., Tirthapura S. (eds). Distributed Computing and Networking. Proceedings of the International Conference on Distributed Computing and Networking; 27-30 December; Guwahati, India: Springer, Berlin, Heidelberg. Lecture Notes in Computer Science; 2006. p. 582-593. DOI: https://doi.org/10.1007/11947950_63
Ramya N, Rathi S. Detection of selfish Nodes in MANET-a survey. In: Proceedings of the 3rd International Conference on Advanced Computing and Communication Systems (ICACCS); 22-23 Jan; Coimbatore: IEEE. 2016. Vol. 1, p. 1-5.
Gupta AK, Bhattacharya I, Banerjee PS, Mandal JK. A co-operative approach to thwart selfish and black-hole attacks in DTN for post disaster scenario. In: Proceedings of the 4th International Conference of Emerging Applications of Information Technology; 19-21 December; Indian Statistical Institute, Kolkata. IEEE Computer Society1730 Massachusetts Ave., NW Washington, DC, United States: IEEE. 2014. p. 113-118.
Sengathir J, Manoharan R. A futuristic trust coefficient-based semi-Markov prediction model for mitigating selfish nodes in MANETs. EURASIP Journal on Wireless Communications and Networking. 2015; 2015(1): 158. DOI: https://doi.org/10.1186/s13638-015-0384-4
Gopal DG, Saravanan R. Selfish node detection based on evidence by trust authority and selfish replica allocation in DANET. International Journal of Information and Communication Technology. 2016; 9(4): 473-491. DOI: https://doi.org/10.1504/IJICT.2016.079961
Manoharan R, Sengathir J. Erlang coefficient based conditional probabilistic model for reliable data dissemination in MANETs. Journal of King Saud University-Computer and Information Sciences. 2016; 28(3): 289-302. DOI: https://doi.org/10.1016/j.jksuci.2014.10.008
Wang W, Huang K, Zou Y. Cooperation incentive mechanism for selfish users based on trust degree. In: Zdravković M, Trajanović M, Konjović Z. Proceedings of the 6th International Conference on Information Science and Technology (ICIST); Society for Information Systems and Computer Networks; Belgrade, Serbia: IEEE. 2016. p. 204-209. DOI: https://doi.org/10.1109/ICIST.2016.7483411
Kariya SL, Panchal BB. Selfish nodes detection in MANETs: acknowledgement based approach. Int. J. Sci. Res. 2012; 2(5): 216-217.
Sengathir J, Manoharan R. Security algorithms for mitigating selfish and shared root node attacks in MANETs. International Journal of Computer Network and Information Security. 2013; 5(10): 1. DOI: https://doi.org/10.5815/ijcnis.2013.10.01
Sivashankari S, Raseen MM. A framework of location privacy and minimum average communication under the global eavesdropper. In: Proceedings of the International Conference on Current Trends in Engineering and Technology (ICCTET); 8 December; Ernakulam, India: IEEE. 2013. p. 392-395. DOI: https://doi.org/10.1109/ICCTET.2013.6675994
Muthumalathi N, Raseen MM. Fully selfish node detection, deletion and secure replica allocation over MANET. In: Proceedings of the International Conference on Current Trends in Engineering and Technology (ICCTET); 8 December; Ernakulam, India: IEEE. 2013. p. 413- 415. DOI: https://doi.org/10.1109/ICCTET.2013.6676000
Tarannum R, Pandey Y. Detection and deletion of selfish MANET nodes-a distributed approach. In: Proceedings of the 1st International Conference on Recent Advances in Information Technology (RAIT); 15-16 March; Dhanbad, India: IEEE. 2012. p. 152-156. DOI: https://doi.org/10.1109/RAIT.2012.6194497
Sengathir J, Manoharan R. Exponential reliability factor based mitigation mechanism for selfish nodes in MANETs. Journal of Engineering Research. 2016; 1(4): 1- 22. DOI: https://doi.org/10.7603/s40632-016-0003-5
Yamini, K. A., Stephy, J., Suthendran, K., & Ravi, V.(2022). Improving routing disruption attack detection in MANETs using efficient trust establishment. Transactions on Emerging Telecommunications Technologies, 33(5). DOI: https://doi.org/10.1002/ett.4446
Fayaz, M., Mehmood, G., Khan, A., Abbas, S., Fayaz, M., & Gwak, J. (2022). Counteracting selfish nodes using reputation based system in mobile ad hoc networks. Electronics, 11(2), 185. DOI: https://doi.org/10.3390/electronics11020185
Chiejina, E., Xiao, H., Christianson, B., Mylonas, A., & Chiejina, C. (2022). A robust Dirichlet reputation and trust evaluation of nodes in mobile ad hoc networks. Sensors, 22(2), 571. DOI: https://doi.org/10.3390/s22020571
Sharma, R., & Dinkar, S. K. (2022). Selfish node detection by modularized deep NMF Autoencoder based Incentivized reputation scheme. Cybernetics and Systems, 3(4), 1-27. DOI: https://doi.org/10.1080/01969722.2022.2137644
Rama Abirami, K., & Sumithra, M. G. (2018). Preventing the impact of selfish behavior under MANET using neighbor credit value based AODV routing algorithm. Sādhanā, 43(4), 12-24. DOI: https://doi.org/10.1007/s12046-018-0803-4
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 EAI Endorsed Transactions on Energy Web
This work is licensed under a Creative Commons Attribution 3.0 Unported License.
This is an open-access article distributed under the terms of the Creative Commons Attribution CC BY 3.0 license, which permits unlimited use, distribution, and reproduction in any medium so long as the original work is properly cited.