Advertisement

Reputation Based Extensive Deep Packet Sc-Rutiny Algorithm for Detecting Selfish Nodes in MANETs

  • V. GeethaEmail author
  • S. A. Hariprasad
  • Priyanka Vanke
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 26)

Abstract

A Wireless Mobile Ad-Hoc Network is a self-configured network with a spontaneous change in the network topology. Since the nodes are under mobility the routing topology adopts to the changes instantaneously. Routing security is the more challenging and nodes misbehavior attacks are likely to happen when using AODV protocol. Nodes tend to behave more selfishly and fail to forward the packet in the routing process. The key goal of this paper is to mitigate the selfish behavior of the node using reputation based Extensive deep packet scrutiny Algorithm. The proposed mathematical model detects the selfish nodes from normal working nodes based upon the final reputation score The proposed version improvises the performance of AODV in terms of throughput and packet delivery ratio in the NS-2 simulation environment.

Keywords

EDPS AODV Selfish nodes 

References

  1. 1.
    Taneja, S., Ashwani, K.: A survey of routing protocols in mobile ad hoc networks. Int. J. Innov. Manag. Technol. 1(3), 279 (2010)Google Scholar
  2. 2.
    Ade, S.A., Tijare, P.A.: Performance comparison of AODV, DSDV, OLSR and DSR routing protocols in mobile ad hoc networks. Int. J. Inf. Technol. Knowl. Manag. 2(2), 545–548 (2010)Google Scholar
  3. 3.
    Sengathir, J., Manoharan, R.: A split half reliability coefficient based mathematical model for mitigating selfish nodes in MANETs. Presented at Research Gate Conference, February 2013.  https://doi.org/10.1109/iadcc.2013.6514233
  4. 4.
    Mamatha, G.S., Sharma, S.C.: Network layer attacks and defense mechanisms in MANETS—a survey. Int. J. Comput. Appl. 9(9), 12–17 (2010)Google Scholar
  5. 5.
    Gerla, Mario, Kleinrock, Leonard: Vehicular networks and the future of the mobile internet. Comput. Netw. 55(2), 457–469 (2011)CrossRefGoogle Scholar
  6. 6.
    Khokhar, R.H., Md Asri, N., Satria, M.: A review of current routing attacks in mobile ad hoc networks. Int. J. Comput. Sci. Secur. 2(3), 18–29 (2008)Google Scholar
  7. 7.
    Tarag, F., Robert, A.: A node misbehaviour detection mechanism for mobile ad-hoc networks (2006). ISBN 9025-6013-9Google Scholar
  8. 8.
    Raghavendran, C.H.V., Naga Satish, G., Suresh Varma, P.: Security challenges and attacks in mobile ad hoc networks. Int. J. Inf. Eng. Electron. Bus. 5(3), 49 (2013)Google Scholar
  9. 9.
    Venkanna, U., Agarwal, Jeh Krishna, LeelaVelusamy, R.: A cooperative routing for MANET based on distributed trust and energy management. Wirel. Pers. Commun. 81(3), 961–979 (2015)CrossRefGoogle Scholar
  10. 10.
    Khokhar, R.H., Md Asri, N., Satria, M.: A review of current routing attacks in mobile ad hoc networks. Int. J. Comput. Sci. Secur. 2(3), 18–29 (2008)Google Scholar
  11. 11.
    Buchegger, S., Boudec, J.-Y.L.: Performance analysis of the CONFIDANT protocol: cooperation of nodes - fairness in distributed ad-hoc networks. Presented At IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), Lausanne (2002).  https://doi.org/10.1145/513800.513828
  12. 12.
    Yang, H., Luo, H.Y., Ye, F., Lu, S.W., Zhang, L.: Security in mobile ad hoc networks: challenges and solutions. IEEE Wirel. Commun. 11, 38–47 (2004)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Information Science and EngineeringRVCEBengaluruIndia
  2. 2.Jain UniversityBengaluruIndia
  3. 3.Software EngineeringRVCEBengaluruIndia

Personalised recommendations