Abstract
A mobile ad hoc network (MANET) is a temporary infrastructureless network, formed by a set of mobile hosts that dynamically establish their own network on the fly without relying on any central administration. Mobile hosts used in MANET have to ensure the services ensured by the powerful fixed infrastructure in traditional networks, the packet forwarding is one of these services.
Resource limitation of MANET’s nodes, particulary in energy supply, along with the multi-hop nature of these networks may cause a new problem that does not exist in traditional networks. To save its energy a node may behave selfishly(no-cooperatively), thus it misbehaves by not forwarding packets originated from other nodes, while using their resources to forward its own packets to remote recipients. Such a behavior hugely threatens the QoS (Quality of Service), and particulary the packet forwarding service availability. Some solutions for selfish nodes detection have been recently proposed, but almost all these solutions rely on the monitoring in the promiscuous mode technique of the watchdog [1], which suffers from many problems especially when using the power control technique. In this paper we propose a new approach to detect selfish nodes unwilling to participate in packet forwarding, that mitigates some watchdog’s problems. We also assess the performance of our solution by simulation.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: ACM Mobile Computing and Networking, MOBICOM 2000, pp. 255–265 (2000)
Buttyan, L., Hubaux, J.P.: Stimulating cooperation in self-organizing mobile ad hoc networks. ACM/Kluwer Mobile Networks and Applications 8(5) (2003)
David, B., David, A.: Dynamic source routing in ad hoc wireless networks. Mobile Computing, ch. 5, 153–181 (1996)
Djenouri, D., Badache, N.: New power-aware routing for mobile ad hoc networks. Accepted in the International Journal of Ad Hoc and Ubiquitous Computing, Inderscience (2005) (to appear)
Doshi, S., Brown, T.: Minimum energy routing schemes for a wireless ad hoc network. In: IEEE INFOCOM 2002 (2002)
Djenouri, D., Badache, N.: Simulation performance evaluation of an energy efficient routing protocol for mobile ad hoc networks. In: IEEE International Conference on Pervasive Services (ICPS 2004), American University of Beirut (AUB), Lebanon (2004)
Yang, H., Meng, X., Lu, S.: Self-organized network layer security in mobile ad hoc networks. In: ACM MOBICOM Wireless Security Workshop (WiSe 2002), Georgia, Atlanta, USA (2002)
Michiardi, P., Molva, R.: Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Communication and Multimedia Security 2002 Conference, Portoroz, Slovenia (2002)
Buchegger, S., Boudec, J.Y.L.: Performance analysis of the confidant, protocol cooperation of nodes fairness in dynamic ad hoc networks. In: Third ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2002), Lausanne, Switzerland, pp. 80–91 (2002)
Buchegger, S., Le-Boudec, J.Y.: A robust reputation system for p2p and mobile ad-hoc networks. In: Second Workshop on the Economics of Peer-to-Peer Systems (2004)
Buttyan, L., Hubaux, J.P.: Nuglets: a virtual currency to stimulate cooperation in self-organized mobile ad hoc networks. Technical report No. DSC/2001/001, Swiss Federal Institution of Technology, Lausanne, Switzerland (2001)
Srinivasan, V., Nuggehalli, P., F.Chiasserini, C., R.Rao, R.: Cooperation in wireless ad hoc networks. In: IEEE INFOCOM 2003, San Francisco, California, USA (2003)
Papadimitratos, P., Haas, Z.J.: Secure data transmission in mobile ad hoc networks. In: ACM MOBICOM Wireless Security Workshop (WiSe 2003), San Diego, California, USA (2003)
Kargl, F., Klenk, A., Weber, M., Schlott, S.: Advanced detection of selfish or malicious nodes in ad hoc networks. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, vol. 3313, pp. 152–165. Springer, Heidelberg (2005)
Capkun, S., Buttyan, L., Hubaux, J.P.: Self-organized public-key management for mobile ad hoc networks. IEEE Transactions on Mobile Computing 2(1), 52–64 (2003)
Weimerskirch, A., Westhoff, D.: Zero common-knowledge authentication for pervasive networks. Selected Areas in Cryptography, 73–87 (2003)
Zeng, X., Bagrodia, R., Gerla, M.: Glomosim: A library for the parallel simulation of large-scale wireless networks. In: Proceeding of the 12th Workshop on Parallel and distributed Simulation, PADS 1998 (1998)
Djenouri, D., Derhab, A., Badache, N.: Ad hoc networks routing protocols and mobility. International Arab jornal of Information Technology (2005) (to appear)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Djenouri, D., Ouali, N., Mahmoudi, A., Badache, N. (2005). Random Feedbacks for Selfish Nodes Detection in Mobile Ad Hoc Networks. In: Magedanz, T., Madeira, E.R.M., Dini, P. (eds) Operations and Management in IP-Based Networks. IPOM 2005. Lecture Notes in Computer Science, vol 3751. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11567486_8
Download citation
DOI: https://doi.org/10.1007/11567486_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29356-9
Online ISBN: 978-3-540-32096-8
eBook Packages: Computer ScienceComputer Science (R0)