Approach for Detection of Selfish Nodes in MANET
-
2018-12-13 https://doi.org/10.14419/ijet.v7i4.39.23932 -
MANET, mobile wireless nodes, Selfish nodes, data packet, -
Abstract
MANET (Mobile Ad-hoc Network) is self-arranging framework using more than one mobile wireless node. The misbehaving of nodes is due to the selfish motives that appreciably decline the performance of MANET. So, it’s essential to detect the selfish nodes to improve the overall potential of transmitting the data packet. Therefore, this paper basically deals with an approach on detection of selfish nodes in MANETs that further simulated in NS-2.
Â
Â
-
References
[1] K. Azmi, A. Bakar and J. Irvine, “A Scheme for Detecting Selfish Nodes in MANETs using OMNET++â€, in 6th ICWMC, 2010.
[2] J. Kaur, P. Singh, “Designing a Distributed Framework to Detect a Selfish Node in MANET by using a Collaborative Approachâ€, IJCST, Volume 4, Issue 4, August 2016.
[3] S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in MANETâ€, in 6th Annual ICMCN, August 2000.
[4] Kejan Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, “An Acknowledgment-based Approach for the Detection of Routing Misbehavior in MANETsâ€, IEEE Transactions on Mobile Computing, Volume 6, Issue 5, 2007.
[5] T. R. Sheltami, A. Basabaa, and E. M. Shakshuki, “A3acks: Adaptive Three Acknowledgments Intrusion Detection system for MANETsâ€, JAIHC, Volume 5, Issue 4, 2014.
[6] E. M. Shakshuki, N. Kang, and T. R. Sheltami, “EAACK— A Secure Intrusion-DetectionSystem for MANETsâ€, IEEE Transactions on Industrial Electronics, Volume 60, Issue 3, March 2013.
[7] B. Shebaro, D. Midi, and E. Bertino, “Fine-Grained Analysis of Packet Losses in Wireless Sensor Networksâ€, in 11th IEEE International Conference on SECON, 2014.
[8] S. Buchegger, Jean-Yves Le Boudec, “Performance Analysis of the CONFIDANT Protocolâ€, in 3rd ACM MobiHoc, 2002.
[9] Osman Khalid, S. U. Khan, “Comparative study of trust and reputation systems for wireless sensor networksâ€, Journal of Security and Communication Networks, volume 6, Issue 6, 2013.
[10] A. M. Shabut, K. P. Dahal, S. K. Bista, I. U. Awan, “Recommendation Based Trust Model with an Effective Defence Scheme for MANETsâ€, IEEE Transactions on Mobile Computing, Volume 14, Issue 10, October 2015.
[11] P. Michiardi, R. Molva, “Core: a collaborative reputation mechanism to enforce node cooperation in MANETâ€, 6th ACMS, pp. 107-121, Septembeer 2002.
[12] Y. Sun, Z. Han, and K. J. Ray Liu, “Defense of Trust Management Vulnerabilities in Distributed Networksâ€, IEEE Communications, Volume 46, Issue 2, Februray 2008.
[13] L. Raja, Dr. S. S. Baboo, “An Overview of MANET: Applications, Attacks and Challengesâ€, IJCSMC, Volume 3, no. 1, pp. 408-417, 2014.
-
Downloads
-
How to Cite
Varshney, I., Ali, S., & Singh, B. (2018). Approach for Detection of Selfish Nodes in MANET. International Journal of Engineering & Technology, 7(4.39), 206-209. https://doi.org/10.14419/ijet.v7i4.39.23932Received date: 2018-12-14
Accepted date: 2018-12-14
Published date: 2018-12-13