Skip to main content
Log in

Detecting and preventing selfish behaviour in mobile ad hoc network

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

In mobile ad hoc networks for big data transmission, nodes communicate with each other via intermediate nodes. However, some intermediate nodes may behave selfishly, resulting in reduced throughput and increased delay in the network. Thus, the existence of selfish behaviour in a mobile ad hoc network degrades the performance of the network. In this paper, we propose a scheme that detects selfish behaviour and prevents its occurrence in mobile ad hoc network. The proposed scheme uses an adaptive threshold algorithm to detect selfish behaviour, and prevents it based on a repeated games scheme. Extensive simulations using NS-2 showed that our scheme can effectively detect and prevent selfish behaviour.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

Notes

  1. http://www.isi.edu/nsnam/ns/ns-documentation.html.

References

  1. Sun B, Osborne L, Xiao Y, Guizani S (2007) Intrusion detection techniques in mobile ad hoc and wireless sensor networks. IEEE Wirel Commun 14:56–63

    Article  Google Scholar 

  2. Yokoyama S, Nakane Y, Takahashi O, Miyamoto E (2006) Evaluation of the impact of selfish nodes in ad hoc networks and detection and countermeasure methods. In: 7th international conference on mobile data management, (MDM 2006), pp 95–100

  3. Padiya S, Pandit R, Patel S (2013) Survey of Innovated Techniques to detect selfish nodes in MANET. In: International journal of computer networking, wireless and mobile communications (IJCNWMC), pp 2250–1568

  4. Rodriguez-Mayol A, Gozalvez J (2013) Reputation based selfishness prevention techniques for mobile ad-hoc networks. Springer Telecommunication Systems, pp 1–15

  5. Buttyán L, Hubaux J-P (2003) Stimulating cooperation in self-organizing mobile ad hoc networks. Mob Netw Appl 8:579–592

    Article  Google Scholar 

  6. Zhong S, Chen J, Yang YR (2003) Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: 2003 IEEE 22th international conference on computer communication (INFOCOM 2003), pp 1987–1997

  7. Yoo Y, Agrawal DP (2006) Why does it pay to be selfish in a MANET? IEEE Wirel Commun 13:87–97

    Article  Google Scholar 

  8. Marti S, Giuli TJ, Lai K, Baker M (2000) Mitigating routing misbehavior in mobile ad hoc networks. In: 2000 ACM 6 th annual international conference on mobile computing and networking, pp 255–265

  9. He Q, Wu D, Khosla P (2004) SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks. In: 2004 IEEE conference on wireless communications and networking (WCNC 2004), vol 2, pp 825–830

  10. Srivastava V, Neel JO, MacKenzie AB, Menon R, DaSilva LA, Hicks JE et al (2005) Using game theory to analyze wireless ad hoc networks. IEEE Commun Surv Tutor 7:46–56

    Article  Google Scholar 

  11. Pandana C, Han Z, Liu KR (2008) Cooperation enforcement and learning for optimizing packet forwarding in autonomous wireless networks. IEEE Trans Wirel Commun 7:3150–3163

    Article  Google Scholar 

  12. Han Z, Poor HV (2009) Coalition games with cooperative transmission: a cure for the curse of boundary nodes in selfish packet-forwarding wireless networks. IEEE Trans Commun 57:203–213

    Article  Google Scholar 

  13. Debjit D, Majumder K, Dasgupta A (2015) Selfish node detection and low cost data transmission in MANET using game theory. Procedia Computer Sci 54:92–101

    Article  Google Scholar 

  14. Tao L, Ming-Sen X (2012) Research of avoid the selfish behavior in mobile ad hoc networks based on repeated game. In: 2012 4th international conference on multimedia information networking and security (MINES 2012), pp 835–838

  15. Siris VA, Papagalou F (2006) Application of anomaly detection algorithms for detecting SYN flooding attacks. Computer Commun 29:1433–1442

    Article  Google Scholar 

  16. Mailath GJ, Samuelson L (2006) Repeated games and reputations: long-run relationships. OUP Catalogue

  17. Yu-rui LIN (2008) Application of desired utility function theory to library administration. College Math 2:039

    Google Scholar 

  18. Bettstetter C, Resta G, Santi P (2003) The node distribution of the random waypoint mobility model for wireless ad hoc networks. IEEE Trans Mob Comput 2:257–269

    Article  Google Scholar 

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China under Grant No. 61202435 and 61272521 and the Natural Science Foundation of Beijing under Grant No. 4132048.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shangguang Wang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lei, T., Wang, S., Li, J. et al. Detecting and preventing selfish behaviour in mobile ad hoc network. J Supercomput 72, 3156–3168 (2016). https://doi.org/10.1007/s11227-015-1561-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-015-1561-2

Keywords

Navigation