Paper 2018' Extended Abstract - Manet
Paper 2018' Extended Abstract - Manet
Networks
1 2 3
Konyeha C. Konyeha S. Mughele E. S.
Department of Electrical/ Department of Computer Department of Computer
Electronic Engineering Science Science
Benson Idahosa University University of Benin, Benin University of Benin, Benin
Benin City, Nigeria City, Nigeria City, Nigeria
[email protected] [email protected]
Abstract
Mobile Ad hoc network (MANET) performance, is dependent on the participation of all network
nodes to forward packets efficiently due to its decentralized authority architecture. A node may refuse
to cooperate in order to save its resources while still using the network to relay its own traffic. This
selfish behaviour, if exhibited by many nodes, degrades network performance and cooperating nodes
become unfairly loaded. Existing detection and quarantining mechanisms have ensured that selfish
nodes do not receive network services, thus penalizing selfish nodes. However, if many nodes become
selfish, network communication itself becomes impossible. In this work, we introduce a hybrid incentive
with tolerance mechanism to the token-based umpiring technique (TBUT), an existing selfish node
detection and quarantining technique, in order to discourage selfishness amongst nodes and reduce the
impact of quarantining selfish nodes on the network performance. The simulation results show that our
method in principle enhances TBUT’ framework performance.
Keywords: MANET, packet forwarding, routing, collaborate, selfish node, misbehave, token based,
umpire, network performance
Enrique et al Proposed a collaborative This approach reduces the This technique is used for just
(2015) watchdog approach (CoCoWa), time and increases the detecting selfish nodes and there is no
which is based on the fast precision of selfish node penalty on such nodes after they are
diffusion of selfish nodes detection. detected.
awareness.
Janakiraman Proposed an Erlang distribution Estimates the impact of Selfish nodes do not participate
and Rajendiran based Conditional Reliability selfish nodes on the further in any network activity and
(2016) Mechanism (ECRCM) that aids in resilience of the network this increases the workload on the
detecting and isolating the selfish and performs well as cooperating nodes.
nodes present in an ad hoc compared with other
environment selfishness
mitigating techniques
Soltanali et al. Proposed a scheme to encourage It does not require a Selfish nodes do not participate further
(2007) packet forwarding and discipline tamper resistant hardware in any network activity and this
selfish behavior in a non- in contrast to the tamper increases the workload on the
cooperative ad hoc network. A resistant hardware, which cooperating nodes. This scheme
punishment scheme is designed to is not applicable for a pure requires beaconing which may incur
punish selfish nodes. ad hoc network quite a bit of overhead
Kumar et al. Proposed a token-based umpiring It is very efficient with Selfish nodes do not participate
(2015) technique (TBUT) in which every reduced detection time and further in any network activity and
node needs a token to participate less overhead. It is this increases the workload on the
in the network activities and the predominant in enhancing cooperating nodes.
neighboring nodes acts as an the network performance
umpire. Umpire nodes will and improving the security
monitor the behavior of the nodes of most of the real
and detect if any node is application
misbehaving.
This work is based on the technique proposed by Kumar et al. (2015), the system employed the use
of tokens in its analysis to accelerate the detection and elimination of selfish nodes. Each node is issued
with a token at its inception. The token consists of three fields: NodeID, status, and reputation. NodeID
is assumed to be unique and deemed to be beyond manipulation; status is a single-bit flag. The status bit
and the reputation value are initialized to zero. The token with a green flag and positive reputation is a
permit issued to each node, which confers it the freedom to participate in all network activities. Each
node in order to participate in any network activity, has to announce its token status bit and reputation
value. If token status bit and reputation value are “1” and “-1” respectively, the protocol does not allow
the node to participate in any network activity. The simulation results for TBUT has shown that the
technique is efficient for packet routing but can give improved performance by minimizing the penalty
to innocent node.
As a result of the aforementioned, this research therefore faults TBUT on its unfair quarantining of
selfish nodes immediately they are detected. Also, if all the nodes in a MANET are quarantined, then
we might at some point not have a network communication as all nodes have the tendency to be selfish.
Therefore, this work aims to improve the performance of TBUT by employing an incentive
mechanism, in order to encourage cooperation and discourage selfishness among nodes in a MANET,
and modifying TBUT by introducing a tolerance technique in order to reduce the impact of selfish node
quarantining on the network, thus leading to a more robust and reliable network performance.
3.0 Methodology
The benefit of an efficient MANET can only be obtained by nodes if they cooperate, if a node refuses
to forward other nodes’ packets, this results in the node packets being forwarded to destination node
while refusing to forward packets from other nodes to their destination nodes, if all nodes refuse to
forward data packets then no network is formed.
Figure 1: A representation of TBUT model (Kumar et al, 2015)
Figure 6: Packet delivery rates, for 30% selfish node with node mobility varying between 0 - 20 m/s.
References
Aarti, D. S. (2013). Study of MANET: Characteristics, Challenges, Application and Security Attacks.
International Journal of Advanced Research in Computer Science and Software Engineering.
Bhuvaneshwari, R. K. (2016). Improving Selfish Node Detection n MANET Using A Collaborative
Watchdog. International Journal of Advanced Research Trends in Engineering and Technology
(IJARTET), Vol. 3, No. 2, pages 125-134.
Ciobanu, R., Dobre, C., Dascăl, M., Trăuşan-Matu, S., and Cristea, V. (2014). SENSE: A Collaborative
Selfish Node Detection and Journal of Network and Computer Applications. Journal of Network and
Computer Applications, Volume 41, May 2014, Pages 240-249
Enrique H., Olmos, M. D. S., Cano, J., Calafate, C. T., and Manzoni, P. (2015). CoCoWa: A
Collaborative Contact-Based Watchdog for Detecting Selfish Nodes. IEEE Transactions on Mobile
Computing (Volume: 14, Issue: 6 , June, 2015, pp. 37 - 42
Gupta, S. (2011). Impact of Selfish Node Concentration in MANETs. International Journal of Wireless
& Mobile Networks (IJWMN).
Janakiraman, S., and Rajendiran M. (2016). An Erlang Factor-Based Conditional Reliability Mechanism
for Enforcing Co-operation in MANETs. Serbian Journal of Electrical Engineering, Vol. 13, No. 2,
June 2016, 265-284
Kashif, M., and Kadam, P. V. (2016). Improved collaborative watchdog system for detection of selfish
node in MANET. International Journal of Science, Engineering and Technology Research (IJSETR).
Kumar, A. K., Jebakumar, M., and Singh, P. J. (2015). A unified approach for detecting and eliminating
selfish nodes in MANETs using TBUT. EURASIP Journal on Wireless Communications and
Networking, Volume 10, No. 30, June 2016, pages 32–37.
Sandhini, S. S. (2016). False Alarm Method for Detecting Selfish Node in Manet. International Journal
of Future Generation Communication and Networking.
Soltanali, S. (2007). In Proceedings of the Third International Conference on Networking and Services.
In Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC07), (pp. 37
- 42).
Zhang, Y. (2011). Detection and Isolation of Packet Droppers in Wireless Ad-Hoc Networks. IEEE
Transactions on Wireless and Cellular Networks, VOL. 51, NO. 4, April 2011, 1 - 37.