Abstract
Mobile Ad hoc Networks are sensitive to selfish behavior that may occur due to restricted power or other resources. Several approaches have been investigated so far to address this problem. In many of them, upon detection, a selfish node is punished with isolation from network services access and in most cases with no possibility for redemption. In this paper, we show that selfish behavior can be exploited to improve network performance. We modify an existing routing protocol by introducing an altruism coefficient to model the overall satisfaction of every node from the network services. When the altruism coefficient is increased, the selfish behavior is decreased. We extend our approach by introducing a common welfare factor, which actually enforces the nodes to cooperate when the network connectivity is critical. A network simulator is utilized to show the impact of our schemes on the performance of the routing protocol when selfish nodes are present in the network.
Similar content being viewed by others
References
Siva Ram Murthy, C., & Manoj, B. S. (2004). Ad Hoc wireless networks: Architectures and protocols. London: Pearson, Education.
Abolhasan, M., Wysocki, T., & Dutkiewicz, E. (2004). A review of routing protocols for mobile ad hoc networks. Ad Hoc Networks, 2(1), 1–22.
Cai, R. J., Tan, W. C. W., & Chong, P. H. J. (2017). An overview of trust-based routing design under adversarial mobile ad hoc network environment. Wireless Personal Communications, 96(3), 3923–3946.
Kshirsagar, V. H., Kanthe, A. M., & Simunic, D. (2018). Trust based detection and elimination of packet drop attack in the mobile ad-hoc networks. Wireless Personal Communications, 100(2), 311–320.
Velloso, P. B., Laufer, R. P., Cunha, D. D. O., Duarte, O. C. M., & Pujolle, G. (2010). Trust management in mobile ad hoc networks using a scalable maturity-based model. IEEE Transactions on Network and Service Management, 7(3), 172–185.
Sivakami, R., & Nawaz, G. K. (2016). A radical block to byzantine attacks in mobile ad hoc networks. Wireless Personal Communications, 87(2), 485–497.
Poongodi, T., & Karthikeyan, M. (2016). Localized secure routing architecture against cooperative black hole attack in mobile ad hoc networks. Wireless Personal Communications, 90(2), 1039–1050.
Ubarhande, S. D., Doye, D. D., & Nalwade, P. S. (2017). A secure path selection scheme for mobile ad hoc network. Wireless Personal Communications, 97(2), 2087–2096.
Cho, J. H., & Chen, R. (2013). On the tradeoff between altruism and selfishness in MANET trust management. Ad Hoc Networks, 11(8), 2217–2234.
Samara, C., Karapistoli, E., & Economides, A. A. (2012). Performance comparison of MANET routing protocols based on real-life scenarios. In 2012 4th International congress on ultra-modern telecommunications and control systems and workshops (ICUMT) (pp. 870–877). IEEE.
Kampitaki, D., & Economides, A. A. (2014). Simulation study of MANET routing protocols under FTP traffic. Procedia Technology, 17, 231–238.
Kaur, P., Kaur, D., & Mahajan, R. (2017). Simulation based comparative study of routing protocols under wormhole attack in manet. Wireless Personal Communications, 96(1), 47–63.
Purohit, K. C., Dimri, S. C., & Jasola, S. (2017). Performance evaluation of various MANET routing protocols for adaptability in VANET environment. International Journal of System Assurance Engineering and Management, 8(2), 690–702.
Singh, S. K., Duvvuru, R., & Singh, J. P. (2014). Performance impact of TCP and UDP on the mobility models and routing protocols in MANET. In D. Mohapatra, & S. Patnaik (Eds.), Intelligent computing, networking, and informatics. Advances in Intelligent Systems and Computing (Vol. 243, pp. 895–901). New Delhi: Springer.
Alslaim, M. N., Alaqel, H. A., & Zaghloul, S. S. (2014, April). A comparative study of MANET routing protocols. In 2014 Third international conference on e-Technologies and networks for development (ICeND) (pp. 178–182). IEEE.
Macker, J. (1999). Mobile ad hoc networking (MANET): Routing protocol performance issues and evaluation considerations, IETF request for comments 2501.
Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000, August). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual international conference on Mobile computing and networking (pp. 255–265). ACM.
Hernandez-Orallo, E., Serrat, M. D., Cano, J. C., Calafate, C. T., & Manzoni, P. (2012). Improving selfish node detection in MANETs using a collaborative watchdog. IEEE Communications Letters, 16(5), 642–645.
Subramaniyan, S., Johnson, W., & Subramaniyan, K. (2014). A distributed framework for detecting selfish nodes in MANET using Record-and Trust-Based Detection (RTBD) technique. EURASIP Journal on Wireless Communications and Networking, 2014(1), 205.
Kang, N., Shakshuki, E. M., & Sheltami, T. R. (2010, November). Detecting misbehaving nodes in MANETs. In Proceedings of the 12th international conference on information integration and web-based applications & services (pp. 216–222). ACM.
El-Haleem, A. M. A., Ali, I. A., Ibrahim, I. I., & El-Sawy, A. R. H. (2011). TRIDNT: Isolating Dropper nodes with some degree of Selfishness in MANET. In International conference on computer science and information technology (pp. 236–247). Springer, Berlin.
Hernandez-Orallo, E., Olmos, M. D. S., Cano, J. C., Calafate, C. T., & Manzoni, P. (2015). CoCoWa: A collaborative contact-based watchdog for detecting selfish nodes. IEEE Transactions on Mobile Computing, 14(6), 1162–1175.
Tarannum, R., & Pandey, Y. (2012, March). Detection and deletion of selfish MANET nodes-a distributed approach. In 2012 1st international conference on recent advances in information technology (RAIT) (pp. 152–156). IEEE.
Das, D., Majumder, K., & Dasgupta, A. (2015). Selfish node detection and low cost data transmission in MANET using game theory. Procedia Computer Science, 54, 92–101.
Naserian, M., & Tepe, K. (2009). Game theoretic approach in routing protocol for wireless ad hoc networks. Ad Hoc Networks, 7(3), 569–578.
Djenouri, D., & Badache, N. (2009). On eliminating packet droppers in MANET: A modular solution. Ad Hoc Networks, 7(6), 1243–1258.
Menaka, R., Ranganathan, V., & Sowmya, B. (2017). Improving performance through reputation based routing protocol for manet. Wireless Personal Communications, 94(4), 2275–2290.
Sengathir, J., & Manoharan, R. (2017). Co-operation enforcing reputation-based detection techniques and frameworks for handling selfish node behaviour in MANETs: A review. Wireless Personal Communications, 97(3), 3427–3447.
Yoo, Y., & Agrawal, D. P. (2006). Why does it pay to be selfish in a MANET? IEEE Wireless Communications, 13(6), 87–97.
Djahel, S., Nait-Abdesselam, F., & Zhang, Z. (2011). Mitigating packet dropping problem in mobile ad hoc networks: Proposals and challenges. IEEE Communications Surveys & Tutorials, 13(4), 658–672.
Urpi, A., Bonuccelli, M., & Giordano, S. (2003). Modelling cooperation in mobile ad hoc networks: A formal description of selfishness. In WiOpt’03: Modeling and optimization in mobile, ad hoc and wireless networks (pp. 10-pages).
Komathy, K., & Narayanasamy, P. (2007). Study of co-operation among selfish neighbors in MANET under evolutionary game theoretic model. In International conference on signal processing, communications and networking, 2007. ICSCN’07. (pp. 133–138). IEEE.
Azni, A. H., Ahmad, R., Noh, Z. A. M., Basari, A. S. H., & Hussin, B. (2012). Correlated node behavior model based on semi Markov process for MANETS. arXiv preprint arXiv:1203.4319.
Kampitaki, D. G., Karapistoli, E. D., & Economides, A. A. (2014). Evaluating selfishness impact on MANETs. In 2014 international conference on telecommunications and multimedia (TEMU), (pp. 64–68). IEEE.
Kampitaki, D. G., & Economides, A. A. (2016). Novel routing protocol for mobile ad hoc networks with selfish and altruistic nodes. In 2016 International conference on telecommunications and multimedia (TEMU) (pp. 1–5). IEEE.
Johnson, D., Hu, Y. C., & Maltz, D. (2007). The dynamic source routing protocol (DSR) for mobile ad hoc networks for IPv4 (No. RFC 4728). Retrieved online from: https://www.ietf.org/rfc/rfc4728.txt.
Cheng, Y., Çetinkaya, E. K., & Sterbenz, J. P. (2012, March). Dynamic source routing (DSR) protocol implementation in ns-3. In Proceedings of the 5th international ICST conference on simulation tools and techniques (pp. 367–374). ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering).
Wu, H., Nabar, S., & Poovendran, R. (2011, March). An energy framework for the network simulator 3 (ns-3). In Proceedings of the 4th international ICST conference on simulation tools and techniques (pp. 222–230). ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Kampitaki, D.G., Economides, A.A. Exploiting Selfishness, Altruism and Common Welfare to Enhance Performance of Routing Protocols for Mobile Ad hoc Networks. Wireless Pers Commun 103, 2377–2390 (2018). https://doi.org/10.1007/s11277-018-5914-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-018-5914-z