scholarly journals Counteracting Selfish Nodes Using Reputation Based System in Mobile Ad Hoc Networks

Electronics ◽  
2022 ◽  
Vol 11 (2) ◽  
pp. 185
Author(s):  
Muhammad Fayaz ◽  
Gulzar Mehmood ◽  
Ajab Khan ◽  
Sohail Abbas ◽  
Muhammad Fayaz ◽  
...  

A mobile ad hoc network (MANET) is a group of nodes constituting a network of mobile nodes without predefined and pre-established architecture where mobile nodes can communicate without any dedicated access points or base stations. In MANETs, a node may act as a host as well as a router. Nodes in the network can send and receive packets through intermediate nodes. However, the existence of malicious and selfish nodes in MANETs severely degrades network performance. The identification of such nodes in the network and their isolation from the network is a challenging problem. Therefore, in this paper, a simple reputation-based scheme is proposed which uses the consumption and contribution information for selfish node detection and cooperation enforcement. Nodes failing to cooperate are detached from the network to save resources of other nodes with good reputation. The simulation results show that our proposed scheme outperforms the benchmark scheme in terms of NRL (normalized routing load), PDF (packet delivery fraction), and packet drop in the presence of malicious and selfish attacks. Furthermore, our scheme identifies the selfish nodes quickly and accurately as compared to the benchmark scheme.

Author(s):  
D. Rajalakshmi ◽  
Meena K.

A MANET (mobile ad hoc network) is a self-organized wireless network. This network is more vulnerable to security failure due to dynamic topology, infrastructure-less environment, and energy consumption. Based on this security issue, routing in MANET is very difficult in real time. In these kinds of networks, the mobility and resource constraints could lead to divide the networks and minimize the performance of the entire network. In real time it is not possible because some selfish nodes interacts with other nodes partially or may not share the data entirely. These kind of malicious or selfish nodes degrade the network performance. In this chapter, the authors proposed and implemented the effect of malicious activities in a MANETs using self-centered friendship tree routing. It's a novel replica model motivated by the social relationship. Using this technique, it detects the malicious nodes and prevents hacking issues in routing protocol in future routes.


Author(s):  
Asha Asha ◽  
G. Mahadevan

<p>Mobile Ad Hoc Network (MANET) is a collection of mobile nodes, which dynamically form a temporary network, without using any infrastructure like wireless access points or base-stations. The provision of QoS guarantees is much more challenging in Mobile Ad hoc Networks. There are many interesting applications such as multimedia services, disaster recovery etc can be supported if Quality-of-Service (QoS) support can be provided for MANETs. But QoS provisioning in MANETs is a very challenging problem when compared to wired IP networks. This is because of unpredictable node mobility, wireless multi-hop communication, contention for wireless channel access, limited battery power and range of mobile devices as well as the absence of a central coordination authority. So, the design of an efficient and reliable routing scheme providing QoS support for such applications is a difficult task. In this paper we studied the challenges and approaches for QoS aware routing techniques.  </p><p> </p>


2012 ◽  
Vol 224 ◽  
pp. 520-523
Author(s):  
Hyun Jong Cha ◽  
Jin Mook Kim ◽  
Hwang Bin Ryou

A mobile ad-hoc network is a method of communication between different nodes (mobile devices) without the use of base stations, which are used in wired networks. In a Mobile ad-hoc network, nodes can play the role of a receiver, sender, or a relay. As movement is flexible in Mobile ad-hoc networks and nodes have limited resources, nodes may join the communication or exit it at any time. Therefore, for Mobile ad-hoc networks, routing techniques - selecting communication routes and maintaining them – is considered important in an environment of constantly changing network topology. To overcome this problem, this paper proposes a reliable routing protocol based on MP-AOMDV, which monitors changes in signal strength not only for GPS signals but reception signals as well. Although MP-AOMDV was researched under the assumption of fixed movement direction and speed, this paper proposes a routing technique that works with changing movement direction or speed of nodes.


Author(s):  
DWEEPNA GARG ◽  
PARTH GOHIL

A Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes forming a temporary network without using centralized access points, infrastructure, or centralized administration. Routing means the act of moving information across an internet work from a source to a destination. The biggest challenge in this kind of networks is to find a path between the communication end points, what is aggravated through the node mobility. In this paper we present a new routing algorithm for mobile, multi-hop ad-hoc networks. The protocol is based on swarm intelligence. Ant colony algorithms are a subset of swarm intelligence and consider the ability of simple ants to solve complex problems by cooperation. The introduced routing protocol is well adaptive, efficient and scalable. The main goal in the design of the protocol is to reduce the overhead for routing. We refer to the protocol as the Ant Colony Optimization Routing (ACOR).


Author(s):  
Sunil Kumar ◽  
Kamlesh Dutta

A Mobile Ad hoc NETwork (MANET) is a self-organizing, infrastructure-less network of mobile nodes connecting by wireless links. In operation, the nodes of MANETs do not have a central control mechanism. It is known for its properties of routable network, where each node acts as a router to forward packets to other specific nodes in the network. The unique properties of MANET have made it useful for large number of applications and led to a number of security challenges. Security in the mobile ad hoc network is a very critical job and requires the consideration of different security issues on all the layers of communication. The countermeasures are the functions that reduce or eliminate security vulnerabilities and attacks. This chapter provides a comprehensive study of all prominent attacks in Mobile Ad Hoc Networks described in the literature. It also provides various proactive and reactive approaches proposed to secure the MANETs. Moreover, it also points to areas of research that need to be investigated in the future.


Author(s):  
Mamata Rath

Mobile ad-hoc network (MANET) has always been a challenging and pioneering wireless network providing magnificent technology support starting from everyday life to disaster and critical environment. In industrial applications and most of the real-world solicitations, the MANET technology greatly suffers due to practical challenges faced by the network, power deficiency, and dynamic topology change being the prominent factors. Many cross-layer platforms supporting real-time applications have been developed by many researchers with the basic intention being maximum utilization of resources in the resource constrained environment of MANET, minimum power consumption using limited residual battery power of the highly transferable mobile nodes. This chapter presents the design of an optimized network layer protocol with delay management and power efficiency.


Author(s):  
Reshmi. T.R ◽  
Shymala L ◽  
Sandhya. M.K

Mobile ad-hoc networks (MANETs) are composed of mobile nodes connected by wireless links without using any pre-existent infrastructure. Hence the assigning of unique IP address to the incoming node becomes difficult. There are various dynamic auto configuration protocols available to assign IP address to the incoming nodes including grid based protocol which assigns IP address with less delay and low protocol overhead. Such protocols get affected by presence of either selfish nodes or malicious nodes. Moreover there is no centralized approach to defend against these threats like in wired network such as firewall, intrusion detection system, proxy etc. The selfish nodes are the nodes which receive packet destined to it and drop packet destined to other nodes in order to save its energy and resources. This behavior of nodes affects normal functioning of auto configuration protocol. Many algorithms are available to isolate selfish nodes but they do not deal with presence of false alarm and protocol overhead. And also there are certain algorithms which use complex formulae and tedious mathematical calculations. The proposed algorithm in this paper helps to overcome the attack of selfish nodes effect in an efficient and scalable address auto configuration protocol that automatically configures a network by assigning unique IP addresses to all nodes with a very low protocol overhead, minimal address acquisition delay and computational overhead.


2019 ◽  
Vol 8 (02) ◽  
pp. 24484-24490
Author(s):  
Abdulghani Saif Kasem Mohammed ◽  
Khalid Hamid Bilal

Mobile Ad Hoc Network (MANET) is the one of the type of ad hoc network, the MANET is a collection of two or more devices or nodes or terminals with wireless communications and networking capability that communicate with each other without the aid of any centralized  administrator also the wireless nodes that can dynamically form a network to exchange information without using any existing fixed network infrastructure. And it's an autonomous system in which mobile hosts connected by wireless links are free to be dynamically and sometime act as routers at the same time, In MANET, the mobile nodes require to forward packets for each other to enable communication among nodes outside of transmission  range. The nodes in the network are free to move independently in any direction, leave and join the network arbitrarily. Thus a node experiences changes in its link states regularly with other devices. Eventually, the mobility in the ad hoc network, change of link states and other properties of  wireless transmission such as attenuation, multipath propagation, interference etc. This paper discuses   study of Mobile ad-hoc Networks (MANET): classification, characteristics, structure of  MANET  and challenges that are imposed by Mobile ad-hoc Networks.


2018 ◽  
Vol 8 (1) ◽  
pp. 2532-2536
Author(s):  
S. Jahanbakhsh Gudakahriz ◽  
S. Jamali ◽  
M. Vajed Khiavi ◽  
A. Soleimany

A mobile ad hoc network (MANET) is defined as a set of mobile nodes which communicate through wireless links with no central infrastructure. In these networks nodes are always moving and could enter to or exit from the network at any time. Therefore, network topology is completely dynamic. Another characteristic of these networks is the low node energy level, resulting from inherent node limitations. Stable routing is one method to face routing challenges in mobile ad hoc networks. The objective of this study is to stabilize TORA protocol which is a distributed routing protocol, with high adaptation, efficiency, and suitability for large and dense mobile ad hoc networks and thus to provide a new high efficiency protocol. The proposed protocol introduced as Stable-TORA has been compared with base protocol TORA in different scenarios via NS-2 simulator environment and its efficiency is evaluated.


2021 ◽  
Author(s):  
Ning Zhang

Mobile Ad-Hoc Network (MANET) is a collection of mobile nodes, dynamically forming a temporary network without pre-existing network infrastructure or centralized administration. Due to the bandwidth constraint and dynamic topology of MANETs, supporting quality of Service (QoS) in MANETs is a challenging task. MANETs have certain unique characteristics that pose several difficulties in provisioning QoS. Most routing protocols for MANETs are designed without explicitly considering QoS of the routes. QoS-aware routing requires to find a route that satisfies the end-to-end QoS requirement. QoS in MANETs is a rapidly growing area of research interest. In this report, the challenges of QoS support for MANETs are discussed first.Then the current research on QoS support in MANETs is reviewed, followed by extensive discussion and analysis of QoS models and QoS routing. Finally, one of the QoS models - SWAN is studied to provide a qualitative assessment of the applicability of the model.


Sign in / Sign up

Export Citation Format

Share Document