Abstract
Mobile ad hoc networks communicate in a self-organized way without depending on any fixed infrastructure. The issue of selfish nodes, which may refuse to cooperate, is a great challenge in such networks and may cause network throughput to drastically reduce. Energy-based selfishness is a category of selfishness in which a selfish node shows nondeterministic and probabilistic selfishness behaviors based on level of its energy. In this paper, we propose a mechanism for coping with this kind of selfishness. This mechanism called CEMDEEM not only detects and isolates energy-based and traditional selfish nodes, but also malicious behaviors like spoofing. We also evaluate performance of Dynamic Source Routing (DSR) protocol fortified by CEMDEEM in the presence of different percentages of selfish nodes. Results show that CEMDEEM noticeably improves network performance with a reasonable additional packet overhead and network delay especially when percentage of selfish nodes is not more than 40.
Keywords: MANET, malice, reputation, routing, security, selfishness.
International Journal of Sensors, Wireless Communications and Control
Title:A Cooperation Enforcement, Malice Detection and Energy Efficient Mechanism for Mobile Ad hoc Networks
Volume: 3 Issue: 2
Author(s): Ehsan Ataie, Ali Movaghar and Mostafa Bastam
Affiliation:
Keywords: MANET, malice, reputation, routing, security, selfishness.
Abstract: Mobile ad hoc networks communicate in a self-organized way without depending on any fixed infrastructure. The issue of selfish nodes, which may refuse to cooperate, is a great challenge in such networks and may cause network throughput to drastically reduce. Energy-based selfishness is a category of selfishness in which a selfish node shows nondeterministic and probabilistic selfishness behaviors based on level of its energy. In this paper, we propose a mechanism for coping with this kind of selfishness. This mechanism called CEMDEEM not only detects and isolates energy-based and traditional selfish nodes, but also malicious behaviors like spoofing. We also evaluate performance of Dynamic Source Routing (DSR) protocol fortified by CEMDEEM in the presence of different percentages of selfish nodes. Results show that CEMDEEM noticeably improves network performance with a reasonable additional packet overhead and network delay especially when percentage of selfish nodes is not more than 40.
Export Options
About this article
Cite this article as:
Ataie Ehsan, Movaghar Ali and Bastam Mostafa, A Cooperation Enforcement, Malice Detection and Energy Efficient Mechanism for Mobile Ad hoc Networks, International Journal of Sensors, Wireless Communications and Control 2013; 3 (2) . https://dx.doi.org/10.2174/221032790302140505095700
DOI https://dx.doi.org/10.2174/221032790302140505095700 |
Print ISSN 2210-3279 |
Publisher Name Bentham Science Publisher |
Online ISSN 2210-3287 |
Call for Papers in Thematic Issues
Federated learning for biomedical applications
Federated learning, also known as distributed AI/machine learning, is a method that enables cooperative learning from big datasets owned by several parties without compromising the privacy of each person's raw data. FL is especially helpful when the needed information is not open source or easily accessible due to tactical or ...read more
Information, Trust, and Risk: Exploring the Intersection of Sensing, Wireless Communications, and Control
Sensing technologies, wireless communications, and control systems are becoming ubiquitous in our daily lives, with the potential to enhance and streamline many aspects of modern society. However, this also creates new challenges in terms of ensuring trust and managing risks associated with the use of these technologies. The sheer volume ...read more
Machine Learning for Industry 4.0 manufacturing applications
This thematic issue will focus on the intersection of Machine Learning and the manufacturing industry within the context of Industry 4.0. Industry 4.0 involves the use of smart sensors, devices, and machines to enable the creation of smart factories that constantly collect data related to production. Machine Learning techniques can ...read more
Next-Generation Network Architecture, Algorithms, and Security
Design of new network architectures, algorithms and protocols is one of the fundamental challenges in next-generation networking. To this end, novel networking techniques and applications are required for advancing today?s complex communication networks. This thematic issue provides researchers, industry professionals and practitioners with a forum to present the latest research ...read more
Related Journals
- Author Guidelines
- Graphical Abstracts
- Fabricating and Stating False Information
- Research Misconduct
- Post Publication Discussions and Corrections
- Publishing Ethics and Rectitude
- Increase Visibility of Your Article
- Archiving Policies
- Peer Review Workflow
- Order Your Article Before Print
- Promote Your Article
- Manuscript Transfer Facility
- Editorial Policies
- Allegations from Whistleblowers
- Announcements
Related Articles
-
Antibody Responses and CNS Pathophysiology of Mucormycosis in
Chronic SARS Cov-2 Infection: Current Therapies Against Mucormycosis
Current Medicinal Chemistry Identify Compounds' Target Against Alzheimer's Disease Based on In-Silico Approach
Current Alzheimer Research Vitamin D Insufficiency and Diabetes Risks
Current Drug Targets Nitrogen Containing Privileged Structures and their Solid Phase Combinatorial Synthesis
Combinatorial Chemistry & High Throughput Screening New Malaria Chemotherapy Developed by Utilization of a Unique Parasite Transport System
Current Pharmaceutical Design Amniotic Fluid Embolism: What Level of Scientific Evidence can be Drawn? A Systematic Review
Current Pharmaceutical Biotechnology Identification of Four Urea Adducts of Andrographolide in Humans
Drug Metabolism Letters Mechanism of Conjugated Imine and Iminium Species, including Marine Alkaloids: Electron Transfer, Reactive Oxygen Species, Therapeutics and Toxicity
Current Bioactive Compounds Novel Coronavirus (COVID-19) Outbreak: Hope and Search for Effective Therapeutic Agent
Letters in Drug Design & Discovery Nucleoprotein-Derived and Unbound Ribonucleosides: Bioactivity and Potential Applications
Current Pharmaceutical Design G Protein Coupled Receptors as Drug Targets: The Role of β-Arrestins
Endocrine, Metabolic & Immune Disorders - Drug Targets Toxocara infection and its Association with Allergic Manifestations
Endocrine, Metabolic & Immune Disorders - Drug Targets The Role of Coagulation in Ventilator-Associated Pneumonia
Current Respiratory Medicine Reviews The Impacts of PLGA/PEG Triblock Copolymers with Variable Molecular Weights on the Sustained Release of Buprenorphine
Current Drug Delivery Synthesis of Azlactones, Phenylpyruvic Acid and 1,2,4-Triazine Derivatives Under Microwave Irradiation
Letters in Organic Chemistry Synthesis and Evaluation of Haloacetyl, α-Bromoacryloyl and Nitrooxyacetyl Benzo[b]furan and Benzo[b]thiophene Derivatives as Potent Antiproliferative Agents Against Leukemia L1210 and K562 Cells
Letters in Drug Design & Discovery Design, Synthesis, and Activity Evaluation of a New 5-fluorouracil Prodrug Containing an Asn-Gly-Arg(NO2)COOCH3 Tripeptide
Protein & Peptide Letters Editorial [Hot topic: Structural Genomics (Executive Editor: Yu Wai Chen)]
Infectious Disorders - Drug Targets Partially Ordered Sets: Ranking and Prediction of Substances Properties
Current Computer-Aided Drug Design New Adamantane Derivatives with Sigma Affinity and Antiproliferative Activity
Medicinal Chemistry