Abstract
A delay tolerant network (DTN) is a complete wireless network. In a DTN there is no base station as it is in the case of existing wireless networks. Nodes may behave selfishly to transmit a message to save their own resources, such as energy. The cooperation requires detecting routes and transmitting the packets for other nodes, even though it consumes network bandwidth, buffer, and energy. A selfish node is a node that may be unwilling to cooperate to transfer packets. Such a node wants to preserve its own energy while using the services of others and consuming their resources. Many approaches have been used in the literature to implement the concept of non-cooperation in a simulated environment. However, none of them is capable of reflecting real cases and thus, the implementation of non-cooperative behavior needs improvement. In this paper, we focus on malicious and selfish node behavior, and we present a new classification and comparison between existing methods and algorithms to implement selfish nodes. Finally, we propose a new algorithm to implement selfish nodes in a DTN environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Jagadale PS (2014) A probabilistic misbehavior detection scheme in DTN survey. Int J Innov Res Comput Commun Eng 2(11):6784–6789
Magaia N, Rogerio Pereira P Correia MP (2013) Selfish and malicious behavior in delay-tolerant networks. In: Future networks mobile summit, pp 1–10
Benamar N, Singh KD, Benamar M, Ouadghiri DE, Bonnin J-M (2014) Routing protocols in vehicular delay tolerant networks: a comprehensive survey computer. Communication 48:141–158
Krug S, Schellenberg S (2015) Impact of traffic and mobility patterns on network performance in disaster scenarios. In: Proceedings of 10th ACM MobiCom work challenged networks, pp 9–12
Gamit V, Patel H (2014) Evaluation of DTN routing protocols. Int J Eng Sci Res Technol 3(2):1–5
Dias JA, Rodrigues JJ, Shu L, Ullah S (2014) Performance evaluation of a cooperative reputation system for vehicular delay-tolerant networks. EURASIP J Wirel Commun Netw 1:1–5
Benamar N, Benamar M, Ahnana S, Saiyari FZ, El Ouadghiri MD, Bonnin JM (2013) Are VDTN routing protocols suitable for data collection in smart cities: a performance assessment. J Theory Appl Inf Technol 58(3):589–600
Benamar N, Singh KD, Benamar M, El Ouadghiri D, Bonnin JM (2014) Routing protocols in vehicular delay tolerant networks: a comprehensive survey. Comput Commun 48:141–158
Doddamani ML, Shanwad V (2014) Delay tolerant network. Int J Sci Technol 2:50–52
Loudari SE, Benamar M, Benamar N, Habbal A (2015) The impact of energy consumption on the performance of DTN routing protocols. In: Fourth international conference internet applications protocols services, pp 147–154
Miao J, Hasan O, Ben Mokhtar S, Brunie L, Yim K (2012) An investigation on the unwillingness of nodes to participate in mobile delay tolerant network routing. Int J Inf Manag 1–11
Benamar M, Benamar N, El Ouadghiri D (2015) The effect of cooperation of nodes on VDTN routing protocols. In: International conference on wireless networks and mobile communications (WINCOM), pp 1–7
Asuquo P, Cruickshank H, Anyigor Ogah CP, Lei A, Sun Z (2016) A collaborative trust management scheme for emergency communication using delay tolerant networks, pp 1–6
Chen K, Shen H, Yan L (2015) Multicent: a multifunctional incentive scheme adaptive to diverse performance objectives for DTN routing. IEEE Trans Parallel Distrib Syst 26(6):1643–1653
Mariyam Benazir SA, Umarani V (2016) Detection of selfish & malicious behavior using dtn-chord monitoring in mobile networks. In: International conference on information communication and embedded system (ICICES), pp 1–5
Cai Y, Fan Y, Wen D (2016) An incentive-compatible routing protocol for two-hop delay tolerant networks. IEEE Trans Veh Technol 1–11
Cho J-H, Chen I-R (2016) PROVEST: provenance-based trust model for delay tolerant networks. IEEE Trans Depend Secur Comput 1–15
Sharma A, Singh D, Sharma P, Dhawan S (2015) Selfish nodes detection in delay tolerant networks. future trends. In: Computer and knowledge management ABLAZE, pp 407–410
Sharma A (2014) A credit based routing mechanism to contrast selfish nodes in delay tolerant networks. In: International conference on parallel, distributed and grid computing, pp 295–300
Jiang Q, Men C, Yu H, Cheng X (2015) A secure credit-based incentive scheme for opportunistic networks. In: 7th international conference on intelligent human-machine systems and cybernetics, vol 1, pp 87–91
Zhu H, Du S, Gao Z, Dong M Cao Z (2014) A probabilistic misbehavior detection scheme toward efficient trust establishment in delay-tolerant networks. IEEE Trans Parallel Distrib Syst 25(1):22–32
Subramaniyan S, Johnson W, Subramaniyan K (2014) A distributed framework for detecting selfish nodes in MANET using record- and trust-based detection (RTBD) technique. EURASIP J Wirel Commun Netw 205:210
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sharma, R., Gupta, D.V. (2019). A Reputation-Based Mechanism to Detect Selfish Nodes in DTNs. In: Kumar, A., Mozar, S. (eds) ICCCE 2018. ICCCE 2018. Lecture Notes in Electrical Engineering, vol 500. Springer, Singapore. https://doi.org/10.1007/978-981-13-0212-1_7
Download citation
DOI: https://doi.org/10.1007/978-981-13-0212-1_7
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-0211-4
Online ISBN: 978-981-13-0212-1
eBook Packages: EngineeringEngineering (R0)