Skip to main content
Erschienen in: Wireless Personal Communications 2/2015

01.05.2015

Opportunistic Routing in Presence of Selfish Nodes for MANET

verfasst von: Sandeep A. Thorat, P. J. Kulkarni

Erschienen in: Wireless Personal Communications | Ausgabe 2/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Opportunistic Routing protocols use broadcast nature of wireless communication to improve packet delivery from source to destination in mobile ad hoc network (MANET). In traditional routing protocols for MANET, each node uses the best neighbor for forwarding packet to destination. In opportunistic routing, a node selects and prioritizes multiple nodes which can act as potential packet forwarders. Similar to traditional routing protocols, opportunistic routing assumes that all nodes participating in the network are honest and cooperative. However, this is practically difficult in an open MANET. Few nodes participating in the network may behave selfishly; these nodes drop packets and do not offer service to other nodes. Such behavior exhibited by the nodes may cause a collapse of MANET communication. The selfish behavior attack is addressed by researchers for many existing MANET routing protocols. There are just a few works, which address selfish nodes attack for opportunistic routing protocols. The paper proposes an opportunistic routing protocol which can overcome the presence of selfish nodes. The proposed protocol discovers reliable candidate nodes for packet forwarding using a new metric called ‘path goodness’. The path goodness metric takes into account trustworthiness of the nodes on a path to the destination. The protocol decides trustworthiness of the nodes using packet forwarding behavior of the nodes. The work is a trust based extension of CORMAN opportunistic routing protocol. Simulation results show that, the proposed opportunistic routing protocol improves the packet delivery ratio by approximately 10 % in the presence of selfish nodes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Perkins, C. E., & Royer, E. M. (1999). Ad hoc on-demand distance vector routing. In Proceedings of workshop mobile computing systems and applications, pp. 90–100. Perkins, C. E., & Royer, E. M. (1999). Ad hoc on-demand distance vector routing. In Proceedings of workshop mobile computing systems and applications, pp. 90–100.
2.
Zurück zum Zitat Johnson, D. B., Maltz, D. A., & Broch, J. (2001). DSR: The dynamic source routing protocol for multihop wireless ad hoc networks. In Ad hoc networking, (pp. 139–172). Reading: Addison-Wesley. Johnson, D. B., Maltz, D. A., & Broch, J. (2001). DSR: The dynamic source routing protocol for multihop wireless ad hoc networks. In Ad hoc networking, (pp. 139–172). Reading: Addison-Wesley.
3.
Zurück zum Zitat Marina, M. K., & Das, S. R. (2001). On-demand multipath distance vector routing in ad hoc networks. In Ninth international conference on network protocols, pp. 14–23. Marina, M. K., & Das, S. R. (2001). On-demand multipath distance vector routing in ad hoc networks. In Ninth international conference on network protocols, pp. 14–23.
4.
Zurück zum Zitat Biswas, S., & Morris, R. (2005). ExOR: Opportunistic multi-hop routing for wireless networks. In Proceedings of conference on applications, technologies, architectures, and protocols for computer communications (SIGCOMM ’05), ACM, New York, NY, USA, pp. 133–144. Biswas, S., & Morris, R. (2005). ExOR: Opportunistic multi-hop routing for wireless networks. In Proceedings of conference on applications, technologies, architectures, and protocols for computer communications (SIGCOMM ’05), ACM, New York, NY, USA, pp. 133–144.
5.
Zurück zum Zitat Liu, H., Zhang, B., Mouftah, H. T., Shen, X., & Ma, J. (2009). Opportunistic routing for wireless ad hoc and sensor networks: Present and future directions. IEEE Communications Magazine, 47(12), 103–109.CrossRef Liu, H., Zhang, B., Mouftah, H. T., Shen, X., & Ma, J. (2009). Opportunistic routing for wireless ad hoc and sensor networks: Present and future directions. IEEE Communications Magazine, 47(12), 103–109.CrossRef
6.
Zurück zum Zitat Du, X., Liu, Y.-A., Liu, K.-M., Tang, B.-H., & Chen, X. (2013). Throughput oriented forwarders selection analysis for opportunistic routing in wireless mesh network. The Journal of China Universities of Posts and Telecommunications, ISSN 1005–8885. 20(2), 73–78. Du, X., Liu, Y.-A., Liu, K.-M., Tang, B.-H., & Chen, X. (2013). Throughput oriented forwarders selection analysis for opportunistic routing in wireless mesh network. The Journal of China Universities of Posts and Telecommunications, ISSN 1005–8885. 20(2), 73–78.
7.
Zurück zum Zitat Hsu, C.-J., Liu, H.-I., & Seah, W. K. G. (2011). Opportunistic routing: A review and the challenges ahead. Computer Networks, ISSN 1389–1286, 55(15), 3592–3603. Hsu, C.-J., Liu, H.-I., & Seah, W. K. G. (2011). Opportunistic routing: A review and the challenges ahead. Computer Networks, ISSN 1389–1286, 55(15), 3592–3603.
8.
Zurück zum Zitat Wang, Z., Chen, Y., & Li, C. (2012). CORMAN: A novel cooperative opportunistic routing scheme in mobile ad hoc networks. IEEE Journal on Selected Areas in Communications, 30(2), 289–296.CrossRef Wang, Z., Chen, Y., & Li, C. (2012). CORMAN: A novel cooperative opportunistic routing scheme in mobile ad hoc networks. IEEE Journal on Selected Areas in Communications, 30(2), 289–296.CrossRef
9.
Zurück zum Zitat Djahel, S., Nait-abdesselam, F., & Zhang, Z. (2011). Mitigating packet dropping problem in mobile ad hoc networks: Proposals and challenges. IEEE Communications Surveys & Tutorials, 13(4), 658–672.CrossRef Djahel, S., Nait-abdesselam, F., & Zhang, Z. (2011). Mitigating packet dropping problem in mobile ad hoc networks: Proposals and challenges. IEEE Communications Surveys & Tutorials, 13(4), 658–672.CrossRef
10.
Zurück zum Zitat Li, X., Jia, Z., Zhang, P., Zhang, R., & Wang, H. (2010). Trust-based on-demand multipath routing in mobile ad hoc networks. IET Information Security, 4(4), 212–232.CrossRefMathSciNet Li, X., Jia, Z., Zhang, P., Zhang, R., & Wang, H. (2010). Trust-based on-demand multipath routing in mobile ad hoc networks. IET Information Security, 4(4), 212–232.CrossRefMathSciNet
11.
Zurück zum Zitat Xia, H., Jia, Z., Ju, L., & Zhu, Y. (2011). Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory. IET Wireless Sensor Systems, 1(4), 248–266.CrossRef Xia, H., Jia, Z., Ju, L., & Zhu, Y. (2011). Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory. IET Wireless Sensor Systems, 1(4), 248–266.CrossRef
12.
Zurück zum Zitat Zhao, H., Yang, X., & Li, X. (2013). Trust management in cyclic mobile ad hoc networks. IEEE Transactions on Vehicular Technology, 62(6), 2792–2806.CrossRef Zhao, H., Yang, X., & Li, X. (2013). Trust management in cyclic mobile ad hoc networks. IEEE Transactions on Vehicular Technology, 62(6), 2792–2806.CrossRef
13.
Zurück zum Zitat Rozner, E., Seshadri, J., Mehta, Y., & Qiu, L. (2009). SOAR: Simple opportunistic adaptive routing protocol for wireless mesh networks. IEEE Transactions on Mobile Computing, 8(12), 1622–1635.CrossRef Rozner, E., Seshadri, J., Mehta, Y., & Qiu, L. (2009). SOAR: Simple opportunistic adaptive routing protocol for wireless mesh networks. IEEE Transactions on Mobile Computing, 8(12), 1622–1635.CrossRef
14.
Zurück zum Zitat Bo, W., Chuanhe, H., Layuan, L., & Wenzhong, Y. (2011). Trust-based minimum cost opportunistic routing for ad hoc networks. Journal of Systems and Software, 84(12), 2107–2122, ISSN 0164-1212. Bo, W., Chuanhe, H., Layuan, L., & Wenzhong, Y. (2011). Trust-based minimum cost opportunistic routing for ad hoc networks. Journal of Systems and Software, 84(12), 2107–2122, ISSN 0164-1212.
15.
Zurück zum Zitat Zhong, Z., & Nelakuditi, S. (2007, June). On the efficacy of opportunistic routing. In 4th annual IEEE communications society conference on sensor, mesh and ad hoc communications and networks, SECON ’07, pp. 441–450, 18–21. Zhong, Z., & Nelakuditi, S. (2007, June). On the efficacy of opportunistic routing. In 4th annual IEEE communications society conference on sensor, mesh and ad hoc communications and networks, SECON ’07, pp. 441–450, 18–21.
16.
Zurück zum Zitat Zeng, K., Yang, Z., & Lou, W. (2009). Location-aided opportunistic forwarding in multirate and multihop wireless networks. IEEE Transactions on Vehicular Technology, 58(6), 3032–3040.CrossRef Zeng, K., Yang, Z., & Lou, W. (2009). Location-aided opportunistic forwarding in multirate and multihop wireless networks. IEEE Transactions on Vehicular Technology, 58(6), 3032–3040.CrossRef
17.
Zurück zum Zitat Zuo, J., Dong, C., Nguyen, H. V., Ng, S. X., Yang, L.-L., & Hanzo, L. (2014). Cross-layer aided energy-efficient opportunistic routing in ad hoc networks. IEEE Transactions on Communications, 62(2), 522–535. Zuo, J., Dong, C., Nguyen, H. V., Ng, S. X., Yang, L.-L., & Hanzo, L. (2014). Cross-layer aided energy-efficient opportunistic routing in ad hoc networks. IEEE Transactions on Communications, 62(2), 522–535.
18.
Zurück zum Zitat Mao, X., Tang, S., Li, X., & Ma, H. (2011). Energy-efficient opportunistic routing in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 22(11), 1934–1942.CrossRef Mao, X., Tang, S., Li, X., & Ma, H. (2011). Energy-efficient opportunistic routing in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 22(11), 1934–1942.CrossRef
19.
Zurück zum Zitat Shen, H., Bai, G., Tang, Z., & Zhao, L. (2014). QMOR: QoS-aware multi-sink opportunistic routing for wireless multimedia sensor networks. Wireless Personal Communications Journal, 75, 1307–1330.CrossRef Shen, H., Bai, G., Tang, Z., & Zhao, L. (2014). QMOR: QoS-aware multi-sink opportunistic routing for wireless multimedia sensor networks. Wireless Personal Communications Journal, 75, 1307–1330.CrossRef
20.
Zurück zum Zitat Li, F., & Jie, W. (2010). Uncertainty modeling and reduction in MANETs. IEEE Transactions on Mobile Computing, 9(7), 1035–1048.CrossRef Li, F., & Jie, W. (2010). Uncertainty modeling and reduction in MANETs. IEEE Transactions on Mobile Computing, 9(7), 1035–1048.CrossRef
21.
Zurück zum Zitat Myung, J., & Lee, W. (2012). Eliminating duplicate forwarding in wireless opportunistic routing. IEEE Communications Letters, 16(4), 510–513.CrossRef Myung, J., & Lee, W. (2012). Eliminating duplicate forwarding in wireless opportunistic routing. IEEE Communications Letters, 16(4), 510–513.CrossRef
22.
Zurück zum Zitat Ajmal, M. M., Madani, S. A., Maqsood, T., Bilal, K., Nazir, B., & Hayat, K. (2013). Coordinated opportunistic routing protocol for wireless mesh networks. Computers & Electrical Engineering, ISSN 0045–7906, 39(8), 2442–2453. Ajmal, M. M., Madani, S. A., Maqsood, T., Bilal, K., Nazir, B., & Hayat, K. (2013). Coordinated opportunistic routing protocol for wireless mesh networks. Computers & Electrical Engineering, ISSN 0045–7906, 39(8), 2442–2453.
23.
Zurück zum Zitat Othmana, J. B., & Mokdadb, L. (2010). Enhancing data security in ad hoc networks based on multipath routing. Elsevier Journal of Parallel Distributed Computing, 70, 309–316.CrossRef Othmana, J. B., & Mokdadb, L. (2010). Enhancing data security in ad hoc networks based on multipath routing. Elsevier Journal of Parallel Distributed Computing, 70, 309–316.CrossRef
24.
Zurück zum Zitat El Defrawy, K., & Tsudik, G. (2011). ALARM: Anonymous location-aided routing in suspicious MANETs. IEEE Transactions on Mobile Computing, 10(9), 1345–1358.CrossRef El Defrawy, K., & Tsudik, G. (2011). ALARM: Anonymous location-aided routing in suspicious MANETs. IEEE Transactions on Mobile Computing, 10(9), 1345–1358.CrossRef
25.
Zurück zum Zitat Gunasekaran, M., & Premalatha, K. (2013). TEAP: Trust-enhanced anonymous on-demand routing protocol for mobile ad hoc networks. IET Information Security, 7(3), 203–211.CrossRef Gunasekaran, M., & Premalatha, K. (2013). TEAP: Trust-enhanced anonymous on-demand routing protocol for mobile ad hoc networks. IET Information Security, 7(3), 203–211.CrossRef
26.
Zurück zum Zitat Cordasco, J., & Wetzel, S. (2008). Cryptographic versus trust-based methods for manet routing security. Electronic Notes in Theoretical Computer Science, 197(2), 131–140.CrossRef Cordasco, J., & Wetzel, S. (2008). Cryptographic versus trust-based methods for manet routing security. Electronic Notes in Theoretical Computer Science, 197(2), 131–140.CrossRef
27.
Zurück zum Zitat Zhizhong, J., Chuanhe, H., Liya, X., Bo, W., Xi, C., & Xiying, F. (2012, October). A trusted opportunistic routing algorithm for VANET. In Third International Conference on Networking and Distributed Computing (ICNDC), pp. 86–90. Zhizhong, J., Chuanhe, H., Liya, X., Bo, W., Xi, C., & Xiying, F. (2012, October). A trusted opportunistic routing algorithm for VANET. In Third International Conference on Networking and Distributed Computing (ICNDC), pp. 86–90.
28.
Zurück zum Zitat Wang, Z., Chen, Y., & Li, C. (2014). PSR: A lightweight proactive source routing protocol for mobile ad hoc networks. IEEE Transactions on Vehicular Technology, 63(2), 859–868.CrossRef Wang, Z., Chen, Y., & Li, C. (2014). PSR: A lightweight proactive source routing protocol for mobile ad hoc networks. IEEE Transactions on Vehicular Technology, 63(2), 859–868.CrossRef
29.
Zurück zum Zitat Li, Y., Chen, W., & Zhang, Z. L. (2009). Optimal forwarder list selection in opportunistic routing. In IEEE 6th international conference on mobile adhoc and sensor systems, MASS’09, pp. 670–675. Li, Y., Chen, W., & Zhang, Z. L. (2009). Optimal forwarder list selection in opportunistic routing. In IEEE 6th international conference on mobile adhoc and sensor systems, MASS’09, pp. 670–675.
31.
Zurück zum Zitat Fouchal, H., Hunel, P., & Ramassamy, C. (2014). Towards efficient deployment of wireless sensor networks. Special issue paper in Security and Communication Networks. New York: Wiley. Fouchal, H., Hunel, P., & Ramassamy, C. (2014). Towards efficient deployment of wireless sensor networks. Special issue paper in Security and Communication Networks. New York: Wiley.
32.
Zurück zum Zitat Darehshoorzadeh, A., Cerd-Alabern, L., & Pla, V. (2011, September). Modeling and comparison of candidate selection algorithms in opportunistic routing. Computer Networks, ISSN 1389–1286, 55(13), 2886–2898. Darehshoorzadeh, A., Cerd-Alabern, L., & Pla, V. (2011, September). Modeling and comparison of candidate selection algorithms in opportunistic routing. Computer Networks, ISSN 1389–1286, 55(13), 2886–2898.
33.
Zurück zum Zitat Sun, Y., Han, Z., & Liu, K. J. R. (2008). Defense of trust management vulnerabilities in distributed networks. IEEE Communications Magazine, 46(2), 112–119.CrossRef Sun, Y., Han, Z., & Liu, K. J. R. (2008). Defense of trust management vulnerabilities in distributed networks. IEEE Communications Magazine, 46(2), 112–119.CrossRef
Metadaten
Titel
Opportunistic Routing in Presence of Selfish Nodes for MANET
verfasst von
Sandeep A. Thorat
P. J. Kulkarni
Publikationsdatum
01.05.2015
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2015
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-014-2247-4

Weitere Artikel der Ausgabe 2/2015

Wireless Personal Communications 2/2015 Zur Ausgabe

Neuer Inhalt