Weight-Based Secure Approach for Identifying Selfishness Behavior of Node in MANET

  • Shoaib Khan
  • Ritu Prasad
  • Praneet Saurabh
  • Bhupendra Verma
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 701)

Abstract

Mobile adhoc networks (MANET) is an interesting concept, as all mobile nodes work like router. They can receive and transmit data packet any time in hostile environment even when the source and the destination mobile nodes are not directly connected to each other. In this circumstance, data packets are forwarded to the destination mobile node by relaying the transmission through intermediary mobile nodes. Due to selfish behavior, packets are intentionally dropped by intermediate nodes, also intermediate nodes continuously forward or broadcast control packets in network that consumes energy of node and lowers performance. This makes discovery of secure routing path and detection of selfish nodes and their activities as important challenges in MANET. This paper proposes a weight-based secure approach for identifying selfish behavior in MANET (WSISB). The proposed WSISB identifies the above-discussed activities and it will also discover a trusted path for secure data transmission. Experimental results show that WSISB performs much better than existing techniques and show significant improvement in terms of performance.

Keywords

Selfish nodes Trust Packet drop Secure MANET 

References

  1. 1.
    Feng, D., Zhu, Y., Luo, X.: Cooperative Incentive Mechanism based on Game Theory in MANET. In: ICNDS, pp. 201–204 (2009)Google Scholar
  2. 2.
    Wu, J.S., Huey, R.S.: A Routing Protocol Using Game Theory in Ad hoc Networks (2013)Google Scholar
  3. 3.
    Wu, L., Yu, R.: A Threshold-based method for selfish nodes detection in MANET. In: Computer Symposium (ICS), pp. 875–882 (2010)Google Scholar
  4. 4.
    Buttyn, L., Hubaux, J.P.: Enforcing service availability in mobile Ad-Hoc WANs. In: 1st ACM International Symposium on Mobile Ad hoc Networking and Computing, pp. 87–96 (2000)Google Scholar
  5. 5.
    Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad hoc Networks 6th International Conference on Mobile Computing and Networking, pp. 255–265 (2000)Google Scholar
  6. 6.
    Xu, Z., Wu, G., Xia, Q., Ren, J.: GTFTTS: A generalized tit-for-tat based corporative game for temperature-aware task scheduling in multi-core systems. In: Third International Symposium on Parallel Architectures, Algorithms and Programming (PAAP), pp. 81–88 (2010)Google Scholar
  7. 7.
    Tootaghaj, D.Z., Farhat, F., Pakravan, M.R., Aref, M.: Game-theoretic approach to mitigate packet dropping in wireless Ad-hoc networks. In: Consumer Communications and Networking Conference (CCNC), pp. 163–165 (2011)Google Scholar
  8. 8.
    Usha, S., Radha, S.: Co-operative approach to detect misbehaving nodes in MANET using multi-hop acknowledgement scheme. In: Advances in Computing, Control, Telecommunication Technologies, pp. 576–578 (2009)Google Scholar
  9. 9.
    Komathy, K., Narayanasamy, P.: Study of co-operation among selfish neighbors in manet under evolutionary game theoretic model. In: Signal Processing, Communications and Networking, pp. 133–138 (2007)Google Scholar
  10. 10.
    Agarwal, R., Gupta, R., Motwani, M.: Performance optimisation through EPT-WBC in mobile Ad hoc networks. Int. J. Electron. 103(3), 355–371 (2015)CrossRefGoogle Scholar
  11. 11.
    Bisen, D., Sharma, S.: An enhanced performance through agent-based secure approach for mobile Ad hoc networks. Int. J. Electron. (2017)Google Scholar
  12. 12.
    Saurabh, P., Verma, B.: An efficient proactive artificial immune system based anomaly detection and prevention system. Expert Syst. Appl. 60, 311–320 (2016)CrossRefGoogle Scholar
  13. 13.
    Saurabh, P., Verma, B.: Cooperative negative selection algorithm. Int. J. Comput. Appl. (0975–8887) 95(17), 27–32 (2014)Google Scholar
  14. 14.
    Saurabh, P., Verma, B, Sharma, S.: An immunity inspired anomaly detection system: a general framework. In: 7th BioInspired Computing: Theories & Applications, pp. 417–428. Springer (2012)Google Scholar
  15. 15.
    Saurabh, P., Verma, B., Sharma, S.: Biologically inspired computer security system: the way ahead. In: CICS, vol. 335, pp. 474–484. Springer (2011)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Shoaib Khan
    • 1
  • Ritu Prasad
    • 1
  • Praneet Saurabh
    • 2
  • Bhupendra Verma
    • 2
  1. 1.Technocrats Institute of Technology (Excellence)BhopalIndia
  2. 2.Technocrats Institute of TechnologyBhopalIndia

Personalised recommendations