Selfish Node Detection Scheme based on Bates Distribution Inspired Trust Factor for MANETs

Authors

  • Sengathir Janakiraman Department of Information Technology, CVR College of Engineering, Mangalpally, Vastunagar, Hyderabad, Telangana, India
  • M. Deva Priya Department of Computer Science & Engineering, Sri Eshwar College of Engineering, Coimbatore, Tamilnadu, India

DOI:

https://doi.org/10.4108/ew.v9i6.3065

Keywords:

Bates Distribution, Selfish behaviour, Trust Factor, Mean Packet Deviation, Variance, Standard Deviation

Abstract

The trustworthiness of mobile nodes is considered as the principal parameter for ensuring significant data dissemination in a Mobile Ad hoc NETwork (MANET). However, the selfish behaviour of nodes minimizes the trust by dropping a considerable amount of data packets in the network. The significant dropping of data packets by the selfish node introduces huge data overhead with increased latency and energy consumption, thus increasing the number of retransmissions. In this paper, Selfish Node Detection Scheme based on Bates Distribution Inspired Trust Factor (SNDS-BDITF) is propounded for predominant detection of selfish behaviour by investigating multiple levels of factors that contribute towards effective selfishness detection. The proposed SNDS-BDITF approach is also potent in enhancing the detection rate of selfishness by multi-perspective analysis of each monitored node’s forwarding characteristics considering the benefits of other cooperating mobile nodes. The simulation results of the propounded SNDS-BDITF method are enhanced on an average by 16% and 14% when compared to the existing selfish node segregation mechanisms prevalent in the literature. 

Downloads

Download data is not yet available.

References

Wu LW, Yu RF. A threshold-based method for selfish nodes detection in MANET. In: Institute of Electrical and Electronics Engineers (IEEE). Proceedings of the International Computer Symposium (ICS2010); 16-18 Dec; Tainan: IEEE; 2010. p. 875-882. DOI: https://doi.org/10.1109/COMPSYM.2010.5685389

Crepeau C, Davis CR, Maheswaran M. A secure MANET routing protocol with resilience against byzantine behaviours of malicious or selfish nodes. In: IEEE Computer Society. Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07); 21-23 May; Niagara Falls, Ont., Canada: IEEE; 2007. Vol. 2, p. 19-26. DOI: https://doi.org/10.1109/AINAW.2007.54

Lakshmi S, Radha S. Selfish aware queue scheduler for packet scheduling in MANET. In: Institute of Electrical and Electronics Engineers (IEEE). Proceedings of the International Conference on Recent Trends in Information Technology (ICRTIT ’12); 19-21April; Chennai, Tamil Nadu, India: IEEE. 2012. p. 343-348. DOI: https://doi.org/10.1109/ICRTIT.2012.6206808

Kurkure AM, Chaudhari B. Analysing credit-based ARAN to detect selfish nodes in MANET. In: Proceedings of the International Conference on Advances in Engineering & Technology Research (ICAETR-2014); 1-2 August; Unnao, Kanpur, India: IEEE; 2014. p. 1-5. DOI: https://doi.org/10.1109/ICAETR.2014.7012851

Sengathir J, Manoharan R. Co-operation enforcing reputation-based detection techniques and frameworks for handling selfish node behaviour in MANETs: A review. Wireless Personal Communications. 2017; 97(3): 3427-3447. DOI: https://doi.org/10.1007/s11277-017-4677-2

Gupta AK, Mandal JK, Bhattacharya. Mitigating selfish, blackhole and wormhole attacks in DTN in a secure, cooperative way. IJICS. 2017; 9(1/2):130-155. DOI: https://doi.org/10.1504/IJICS.2017.10003609

Valarmathi ML, Meenakowshalya A, Bharathi A. Robust Sybil attack detection mechanism for Social Networks-a survey. In: Proceedings of the 3rd International Conference on Advanced Computing and Communication Systems (ICACCS); 22-23 Jan; Coimbatore: IEEE. 2016. Vol. 1, p. DOI: https://doi.org/10.1109/ICACCS.2016.7586399

- 5.

Konorski J. An idea bag strategy to discourage selfish behavior under random token MAC protocols for wireless LANs. In: In: Chaudhuri S., Das S.R., Paul H.S., Tirthapura S. (eds). Distributed Computing and Networking. Proceedings of the International Conference on Distributed Computing and Networking; 27-30 December; Guwahati, India: Springer, Berlin, Heidelberg. Lecture Notes in Computer Science; 2006. p. 582-593. DOI: https://doi.org/10.1007/11947950_63

Ramya N, Rathi S. Detection of selfish Nodes in MANET-a survey. In: Proceedings of the 3rd International Conference on Advanced Computing and Communication Systems (ICACCS); 22-23 Jan; Coimbatore: IEEE. 2016. Vol. 1, p. 1-5.

Gupta AK, Bhattacharya I, Banerjee PS, Mandal JK. A co-operative approach to thwart selfish and black-hole attacks in DTN for post disaster scenario. In: Proceedings of the 4th International Conference of Emerging Applications of Information Technology; 19-21 December; Indian Statistical Institute, Kolkata. IEEE Computer Society1730 Massachusetts Ave., NW Washington, DC, United States: IEEE. 2014. p. 113-118.

Sengathir J, Manoharan R. A futuristic trust coefficient-based semi-Markov prediction model for mitigating selfish nodes in MANETs. EURASIP Journal on Wireless Communications and Networking. 2015; 2015(1): 158. DOI: https://doi.org/10.1186/s13638-015-0384-4

Gopal DG, Saravanan R. Selfish node detection based on evidence by trust authority and selfish replica allocation in DANET. International Journal of Information and Communication Technology. 2016; 9(4): 473-491. DOI: https://doi.org/10.1504/IJICT.2016.079961

Manoharan R, Sengathir J. Erlang coefficient based conditional probabilistic model for reliable data dissemination in MANETs. Journal of King Saud University-Computer and Information Sciences. 2016; 28(3): 289-302. DOI: https://doi.org/10.1016/j.jksuci.2014.10.008

Wang W, Huang K, Zou Y. Cooperation incentive mechanism for selfish users based on trust degree. In: Zdravković M, Trajanović M, Konjović Z. Proceedings of the 6th International Conference on Information Science and Technology (ICIST); Society for Information Systems and Computer Networks; Belgrade, Serbia: IEEE. 2016. p. 204-209. DOI: https://doi.org/10.1109/ICIST.2016.7483411

Kariya SL, Panchal BB. Selfish nodes detection in MANETs: acknowledgement based approach. Int. J. Sci. Res. 2012; 2(5): 216-217.

Sengathir J, Manoharan R. Security algorithms for mitigating selfish and shared root node attacks in MANETs. International Journal of Computer Network and Information Security. 2013; 5(10): 1. DOI: https://doi.org/10.5815/ijcnis.2013.10.01

Sivashankari S, Raseen MM. A framework of location privacy and minimum average communication under the global eavesdropper. In: Proceedings of the International Conference on Current Trends in Engineering and Technology (ICCTET); 8 December; Ernakulam, India: IEEE. 2013. p. 392-395. DOI: https://doi.org/10.1109/ICCTET.2013.6675994

Muthumalathi N, Raseen MM. Fully selfish node detection, deletion and secure replica allocation over MANET. In: Proceedings of the International Conference on Current Trends in Engineering and Technology (ICCTET); 8 December; Ernakulam, India: IEEE. 2013. p. 413- 415. DOI: https://doi.org/10.1109/ICCTET.2013.6676000

Tarannum R, Pandey Y. Detection and deletion of selfish MANET nodes-a distributed approach. In: Proceedings of the 1st International Conference on Recent Advances in Information Technology (RAIT); 15-16 March; Dhanbad, India: IEEE. 2012. p. 152-156. DOI: https://doi.org/10.1109/RAIT.2012.6194497

Sengathir J, Manoharan R. Exponential reliability factor based mitigation mechanism for selfish nodes in MANETs. Journal of Engineering Research. 2016; 1(4): 1- 22. DOI: https://doi.org/10.7603/s40632-016-0003-5

Yamini, K. A., Stephy, J., Suthendran, K., & Ravi, V.(2022). Improving routing disruption attack detection in MANETs using efficient trust establishment. Transactions on Emerging Telecommunications Technologies, 33(5). DOI: https://doi.org/10.1002/ett.4446

Fayaz, M., Mehmood, G., Khan, A., Abbas, S., Fayaz, M., & Gwak, J. (2022). Counteracting selfish nodes using reputation based system in mobile ad hoc networks. Electronics, 11(2), 185. DOI: https://doi.org/10.3390/electronics11020185

Chiejina, E., Xiao, H., Christianson, B., Mylonas, A., & Chiejina, C. (2022). A robust Dirichlet reputation and trust evaluation of nodes in mobile ad hoc networks. Sensors, 22(2), 571. DOI: https://doi.org/10.3390/s22020571

Sharma, R., & Dinkar, S. K. (2022). Selfish node detection by modularized deep NMF Autoencoder based Incentivized reputation scheme. Cybernetics and Systems, 3(4), 1-27. DOI: https://doi.org/10.1080/01969722.2022.2137644

Rama Abirami, K., & Sumithra, M. G. (2018). Preventing the impact of selfish behavior under MANET using neighbor credit value based AODV routing algorithm. Sādhanā, 43(4), 12-24. DOI: https://doi.org/10.1007/s12046-018-0803-4

Downloads

Published

22-02-2023

How to Cite

1.
Janakiraman S, Priya MD. Selfish Node Detection Scheme based on Bates Distribution Inspired Trust Factor for MANETs. EAI Endorsed Trans Energy Web [Internet]. 2023 Feb. 22 [cited 2024 Nov. 20];9(6):e1. Available from: https://publications.eai.eu/index.php/ew/article/view/3065