Abstract
A Wireless Mobile Ad-Hoc Network is a self-configured network with a spontaneous change in the network topology. Since the nodes are under mobility the routing topology adopts to the changes instantaneously. Routing security is the more challenging and nodes misbehavior attacks are likely to happen when using AODV protocol. Nodes tend to behave more selfishly and fail to forward the packet in the routing process. The key goal of this paper is to mitigate the selfish behavior of the node using reputation based Extensive deep packet scrutiny Algorithm. The proposed mathematical model detects the selfish nodes from normal working nodes based upon the final reputation score The proposed version improvises the performance of AODV in terms of throughput and packet delivery ratio in the NS-2 simulation environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Taneja, S., Ashwani, K.: A survey of routing protocols in mobile ad hoc networks. Int. J. Innov. Manag. Technol. 1(3), 279 (2010)
Ade, S.A., Tijare, P.A.: Performance comparison of AODV, DSDV, OLSR and DSR routing protocols in mobile ad hoc networks. Int. J. Inf. Technol. Knowl. Manag. 2(2), 545–548 (2010)
Sengathir, J., Manoharan, R.: A split half reliability coefficient based mathematical model for mitigating selfish nodes in MANETs. Presented at Research Gate Conference, February 2013. https://doi.org/10.1109/iadcc.2013.6514233
Mamatha, G.S., Sharma, S.C.: Network layer attacks and defense mechanisms in MANETS—a survey. Int. J. Comput. Appl. 9(9), 12–17 (2010)
Gerla, Mario, Kleinrock, Leonard: Vehicular networks and the future of the mobile internet. Comput. Netw. 55(2), 457–469 (2011)
Khokhar, R.H., Md Asri, N., Satria, M.: A review of current routing attacks in mobile ad hoc networks. Int. J. Comput. Sci. Secur. 2(3), 18–29 (2008)
Tarag, F., Robert, A.: A node misbehaviour detection mechanism for mobile ad-hoc networks (2006). ISBN 9025-6013-9
Raghavendran, C.H.V., Naga Satish, G., Suresh Varma, P.: Security challenges and attacks in mobile ad hoc networks. Int. J. Inf. Eng. Electron. Bus. 5(3), 49 (2013)
Venkanna, U., Agarwal, Jeh Krishna, LeelaVelusamy, R.: A cooperative routing for MANET based on distributed trust and energy management. Wirel. Pers. Commun. 81(3), 961–979 (2015)
Khokhar, R.H., Md Asri, N., Satria, M.: A review of current routing attacks in mobile ad hoc networks. Int. J. Comput. Sci. Secur. 2(3), 18–29 (2008)
Buchegger, S., Boudec, J.-Y.L.: Performance analysis of the CONFIDANT protocol: cooperation of nodes - fairness in distributed ad-hoc networks. Presented At IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), Lausanne (2002). https://doi.org/10.1145/513800.513828
Yang, H., Luo, H.Y., Ye, F., Lu, S.W., Zhang, L.: Security in mobile ad hoc networks: challenges and solutions. IEEE Wirel. Commun. 11, 38–47 (2004)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Geetha, V., Hariprasad, S.A., Vanke, P. (2019). Reputation Based Extensive Deep Packet Sc-Rutiny Algorithm for Detecting Selfish Nodes in MANETs. In: Hemanth, J., Fernando, X., Lafata, P., Baig, Z. (eds) International Conference on Intelligent Data Communication Technologies and Internet of Things (ICICI) 2018. ICICI 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 26. Springer, Cham. https://doi.org/10.1007/978-3-030-03146-6_177
Download citation
DOI: https://doi.org/10.1007/978-3-030-03146-6_177
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-03145-9
Online ISBN: 978-3-030-03146-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)