Skip to main content
Erschienen in: Wireless Personal Communications 2/2023

22.09.2022

Detection and Isolation of Selfish Nodes in MANET Using Collaborative Contact-Based Watchdog with Chimp-AODV

verfasst von: Bismin V. Sherif, P. Salini

Erschienen in: Wireless Personal Communications | Ausgabe 2/2023

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Mobile Ad-hoc Network (MANET) is one of the most important self-configuring and independent wireless network. Numerous intermediate nodes are used among MANET to interchange the information without the requirement of any centralized infrastructure. But some nodes act selfishly and utilize the resources only for their own purposes and do not share with the neighbors. This selfish nodes might delay or drop the packet and do not perform routing. Though watchdog is a well-known selfish node detection technique, it causes false negatives and false positives that can affect the performance in terms of precision and speed. To eliminate the drawbacks of existing approaches in selfish node detection, this paper integrates both Ad-hoc On-Demand Distance Vector (AODV) protocol incorporated with chimp optimization algorithm and Collaborative Contact based Watchdog to propose a novel technique called Chimp-CoCoWa-AODV in order to improve the performance of MANET. The main role of chimp optimization algorithm in AODV is to undergo optimal route selection process. The performance of the proposed Chimp-CoCoWa-AODV approach is compared with existing approaches in terms of average routing load, Average Packet Delivery Fraction (PDF), Average End-to-end Delay (EED), Average Throughput, Total packet drop in the application layer, and maliciously dropped packet in the routing layer. The simulation results shows that the proposed approach is effective with 82% PDF and 7.4 ms EED at 50 nodes in detection and isolation of selfish nodes in MANET even in the presence of malicious node.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
5.
Zurück zum Zitat Farooq, H., & Tang Jung, L. (2013). Energy, traffic load, and link quality aware ad hoc routing protocol for wireless sensor network based smart metering infrastructure. International Journal of Distributed Sensor Networks, 9(8), 59758210.CrossRef Farooq, H., & Tang Jung, L. (2013). Energy, traffic load, and link quality aware ad hoc routing protocol for wireless sensor network based smart metering infrastructure. International Journal of Distributed Sensor Networks, 9(8), 59758210.CrossRef
12.
14.
15.
Zurück zum Zitat Wang, W., Huang, K., & Zou, Y. (2016). Cooperation incentive mechanism for selfish users based on trust degree. In 2016 sixth international conference on information science and technology (ICIST), 2(1), 12–25. Wang, W., Huang, K., & Zou, Y. (2016). Cooperation incentive mechanism for selfish users based on trust degree. In 2016 sixth international conference on information science and technology (ICIST), 2(1), 12–25.
21.
Zurück zum Zitat Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual international conference on mobile computing and networking (pp. 255–265). Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual international conference on mobile computing and networking (pp. 255–265).
22.
Zurück zum Zitat Dias, J. A., Rodrigues, J. J., Xia, F., & Mavromoustakis, C. X. (2015). A cooperative watchdog system to detect misbehavior nodes in vehicular delay-tolerant networks. IEEE Transactions on Industrial Electronics, 62(12), 7929–7937.CrossRef Dias, J. A., Rodrigues, J. J., Xia, F., & Mavromoustakis, C. X. (2015). A cooperative watchdog system to detect misbehavior nodes in vehicular delay-tolerant networks. IEEE Transactions on Industrial Electronics, 62(12), 7929–7937.CrossRef
23.
Zurück zum Zitat Dias, J. A., Rodrigues, J. J., Shu, L., & Ullah, S. (2014). Performance evaluation of a cooperative reputation system for vehicular delay-tolerant networks. EURASIP Journal on Wireless Communications and Networking, 2014(1), 1–13.CrossRef Dias, J. A., Rodrigues, J. J., Shu, L., & Ullah, S. (2014). Performance evaluation of a cooperative reputation system for vehicular delay-tolerant networks. EURASIP Journal on Wireless Communications and Networking, 2014(1), 1–13.CrossRef
24.
Zurück zum Zitat Yao, L., Man, Y., Huang, Z., Deng, J., & Wang, X. (2015). Secure routing based on social similarity in opportunistic networks. IEEE Transactions on Wireless Communications, 15(1), 594–605.CrossRef Yao, L., Man, Y., Huang, Z., Deng, J., & Wang, X. (2015). Secure routing based on social similarity in opportunistic networks. IEEE Transactions on Wireless Communications, 15(1), 594–605.CrossRef
25.
Zurück zum Zitat Subramaniyan, S., Johnson, W., & Subramaniyan, K. (2014). A distributed framework for detecting selfish nodes in MANET using Record-and Trust-Based Detection (RTBD) technique. EURASIP Journal on Wireless Communications and Networking, 2014(1), 1–10.CrossRef Subramaniyan, S., Johnson, W., & Subramaniyan, K. (2014). A distributed framework for detecting selfish nodes in MANET using Record-and Trust-Based Detection (RTBD) technique. EURASIP Journal on Wireless Communications and Networking, 2014(1), 1–10.CrossRef
26.
Zurück zum Zitat Kumar, J. M. S. P. J., Kathirvel, A., Kirubakaran, N., Sivaraman, P., & Subramaniam, M. (2015). A unified approach for detecting and eliminating selfish nodes in MANETs using TBUT. EURASIP Journal on Wireless Communications and Networking, 2015(1), 1–11. Kumar, J. M. S. P. J., Kathirvel, A., Kirubakaran, N., Sivaraman, P., & Subramaniam, M. (2015). A unified approach for detecting and eliminating selfish nodes in MANETs using TBUT. EURASIP Journal on Wireless Communications and Networking, 2015(1), 1–11.
27.
Zurück zum Zitat Hernández-Orallo, E., Olmos, M. D., Cano, J., Calafate, C. T., & Manzoni, P. (2013). A Fast model for evaluating the detection of Selfish nodes using a collaborative approach in MANETs. Wireless Personal Communications, 74(3), 1099–1116.CrossRef Hernández-Orallo, E., Olmos, M. D., Cano, J., Calafate, C. T., & Manzoni, P. (2013). A Fast model for evaluating the detection of Selfish nodes using a collaborative approach in MANETs. Wireless Personal Communications, 74(3), 1099–1116.CrossRef
29.
Zurück zum Zitat Pati, B., Panigrahi, C. R., Buyya, R., & Li, K.-C. (Eds.). (2020). Advanced computing and intelligent engineering: proceedings of ICACIE 2018, volume 2. Springer Singapore. Pati, B., Panigrahi, C. R., Buyya, R., & Li, K.-C. (Eds.). (2020). Advanced computing and intelligent engineering: proceedings of ICACIE 2018, volume 2. Springer Singapore.
Metadaten
Titel
Detection and Isolation of Selfish Nodes in MANET Using Collaborative Contact-Based Watchdog with Chimp-AODV
verfasst von
Bismin V. Sherif
P. Salini
Publikationsdatum
22.09.2022
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2023
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-022-10004-9

Weitere Artikel der Ausgabe 2/2023

Wireless Personal Communications 2/2023 Zur Ausgabe

Neuer Inhalt