Skip to main content

Weight-Based Secure Approach for Identifying Selfishness Behavior of Node in MANET

  • Conference paper
  • First Online:
Information and Decision Sciences

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 701))

Abstract

Mobile adhoc networks (MANET) is an interesting concept, as all mobile nodes work like router. They can receive and transmit data packet any time in hostile environment even when the source and the destination mobile nodes are not directly connected to each other. In this circumstance, data packets are forwarded to the destination mobile node by relaying the transmission through intermediary mobile nodes. Due to selfish behavior, packets are intentionally dropped by intermediate nodes, also intermediate nodes continuously forward or broadcast control packets in network that consumes energy of node and lowers performance. This makes discovery of secure routing path and detection of selfish nodes and their activities as important challenges in MANET. This paper proposes a weight-based secure approach for identifying selfish behavior in MANET (WSISB). The proposed WSISB identifies the above-discussed activities and it will also discover a trusted path for secure data transmission. Experimental results show that WSISB performs much better than existing techniques and show significant improvement in terms of performance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Feng, D., Zhu, Y., Luo, X.: Cooperative Incentive Mechanism based on Game Theory in MANET. In: ICNDS, pp. 201–204 (2009)

    Google Scholar 

  2. Wu, J.S., Huey, R.S.: A Routing Protocol Using Game Theory in Ad hoc Networks (2013)

    Google Scholar 

  3. Wu, L., Yu, R.: A Threshold-based method for selfish nodes detection in MANET. In: Computer Symposium (ICS), pp. 875–882 (2010)

    Google Scholar 

  4. Buttyn, L., Hubaux, J.P.: Enforcing service availability in mobile Ad-Hoc WANs. In: 1st ACM International Symposium on Mobile Ad hoc Networking and Computing, pp. 87–96 (2000)

    Google Scholar 

  5. Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad hoc Networks 6th International Conference on Mobile Computing and Networking, pp. 255–265 (2000)

    Google Scholar 

  6. Xu, Z., Wu, G., Xia, Q., Ren, J.: GTFTTS: A generalized tit-for-tat based corporative game for temperature-aware task scheduling in multi-core systems. In: Third International Symposium on Parallel Architectures, Algorithms and Programming (PAAP), pp. 81–88 (2010)

    Google Scholar 

  7. Tootaghaj, D.Z., Farhat, F., Pakravan, M.R., Aref, M.: Game-theoretic approach to mitigate packet dropping in wireless Ad-hoc networks. In: Consumer Communications and Networking Conference (CCNC), pp. 163–165 (2011)

    Google Scholar 

  8. Usha, S., Radha, S.: Co-operative approach to detect misbehaving nodes in MANET using multi-hop acknowledgement scheme. In: Advances in Computing, Control, Telecommunication Technologies, pp. 576–578 (2009)

    Google Scholar 

  9. Komathy, K., Narayanasamy, P.: Study of co-operation among selfish neighbors in manet under evolutionary game theoretic model. In: Signal Processing, Communications and Networking, pp. 133–138 (2007)

    Google Scholar 

  10. Agarwal, R., Gupta, R., Motwani, M.: Performance optimisation through EPT-WBC in mobile Ad hoc networks. Int. J. Electron. 103(3), 355–371 (2015)

    Article  Google Scholar 

  11. Bisen, D., Sharma, S.: An enhanced performance through agent-based secure approach for mobile Ad hoc networks. Int. J. Electron. (2017)

    Google Scholar 

  12. Saurabh, P., Verma, B.: An efficient proactive artificial immune system based anomaly detection and prevention system. Expert Syst. Appl. 60, 311–320 (2016)

    Article  Google Scholar 

  13. Saurabh, P., Verma, B.: Cooperative negative selection algorithm. Int. J. Comput. Appl. (0975–8887) 95(17), 27–32 (2014)

    Google Scholar 

  14. Saurabh, P., Verma, B, Sharma, S.: An immunity inspired anomaly detection system: a general framework. In: 7th BioInspired Computing: Theories & Applications, pp. 417–428. Springer (2012)

    Google Scholar 

  15. Saurabh, P., Verma, B., Sharma, S.: Biologically inspired computer security system: the way ahead. In: CICS, vol. 335, pp. 474–484. Springer (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shoaib Khan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Khan, S., Prasad, R., Saurabh, P., Verma, B. (2018). Weight-Based Secure Approach for Identifying Selfishness Behavior of Node in MANET. In: Satapathy, S., Tavares, J., Bhateja, V., Mohanty, J. (eds) Information and Decision Sciences. Advances in Intelligent Systems and Computing, vol 701. Springer, Singapore. https://doi.org/10.1007/978-981-10-7563-6_40

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-7563-6_40

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-7562-9

  • Online ISBN: 978-981-10-7563-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics