A Game Theoretic Approach to Thwart Selfishness Attack in MANET

Article Preview

Abstract:

Ad-hoc networks are attractive, since they can provide a high level of connectivity without the need of a fixed infrastructure. Nodes that are not within the same transmission range communicate through multi-hops, where intermediate nodes act as relays. Mutual cooperation of all the participating nodes is necessary for proper operation of MANET. However, nodes in MANET being battery-constrained, they tend to behave selfishly while forwarding packets. In this paper, we have investigated the security of MANET AODV routing protocol by identifying the impact of selfish nodes on it. It was observed that due to the presence of selfish nodes, packet loss in the network increases and the performance of MANET degrades significantly. Finally a game theoretic approach is used to mitigate the selfishness attack. All the nodes in MANET should cooperate among themselves to thwart the selfish behavior of attacker nodes.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 433-440)

Pages:

3944-3948

Citation:

Online since:

January 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] S. Corson and J. Macker, Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations, Internet Request for comment RFC 2501, Jan (1999).

DOI: 10.17487/rfc2501

Google Scholar

[2] P. Sankareswary, R. Suganthi, G. Sumathi, Impact of selfish nodes in multicast Ad hoc on demand Distance Vector Protocol, in Wireless Communication and Sensor Computing, 2010, ICWCSC (2010).

DOI: 10.1109/icwcsc.2010.5415902

Google Scholar

[3] A. Babakhouya, Y. Challal, and A. Bouabdallah, A Simulation Analysis of Routing Misbehaviour in Mobile Ad Hoc Networks, in Proc. of the Second International Conference on Next Generation Mobile Applications, Services, and Technologies, September 2008, pp.592-597.

DOI: 10.1109/ngmast.2008.56

Google Scholar

[4] Rekha Kaushik, Dr. Jyoti Singhai, Simulation Analysis of Node Misbehavior in an Ad-hoc Network using NS2, International Journal of Computer Science and Information Security (IJCSIS), Vol. 8, No. 4, July (2010).

Google Scholar

[5] Satyanarayana Vuppala, Alokparna Bandyopadhyay, Prasenjit Choudhury and Tanmay De, Simulation Analysis on Node Selfishness using NS-3, published in the Second International Joint Journal Conference in Computer, Electronics and Electrical, CEE 2010 [ISSN: 2158-5555 (print) ISSN: 2158-5563 (online)].

Google Scholar

[6] C.E. Perkins, E. Belding Royer, and S.R. Das, Ad hoc On demand distance vector (AODV) routing, IETF RFC 3561, July (2003).

DOI: 10.17487/rfc3561

Google Scholar

[7] The NS-3 Network Simulator, http: /www. nsnam. org.

Google Scholar

[8] Sergio Marti, T.J. Giuli, Kevin Lai, and Mary Baker, Mitigating routing misbehavior in mobile ad hoc networks, International Conference on Mobile Computing and Networking, Proc. of the 6th annual international conference on Mobile computing and networking, 2000, Boston, Massachusetts, United States, pgs. 255 – 265.

DOI: 10.1145/345910.345955

Google Scholar