Selfishness in Mobile Ad-Hoc Networks: A Literature Review on Detection Techniques and Prevention Mechanisms

被引:6
作者
Kampitaki, Dimitra G. [1 ]
Economides, Anastasios A. [1 ]
机构
[1] Univ Macedonia, Informat Syst IPPS, GR-54636 Thessaloniki, Greece
关键词
Mobile ad hoc networks; routing protocols; next generation networking; mobile commu-nication; 5G and beyond communications; 6G communications; ROUTING PROTOCOL; TRANSMISSION; COOPERATION; SYSTEM; NODES;
D O I
10.1109/ACCESS.2023.3305262
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Constant connectivity is one of the most challenging requirements modern communication networks promise to satisfy. 5G and Beyond applications and the proliferation of Internet of Things (IoT) applications make mobile networks one of the most discussed research topics of the present, while research is already moving towards the design specifications and development of 6G services and solutions. Using multi-hop patterns, mobile nodes can move around always maintaining their connectivity in a pervasive and ubiquitous manner. New possibilities emerge from this progress, whereas long known challenges still exist and evolve. One of them is the selfishness or unwillingness of some nodes to spend resources to serve the communication requests of other nodes, not in a malicious but rather in a self-conservative manner. While intentional misbehavior of nodes is considered a security issue, selfishness is studied separately in the relevant literature and has attracted a lot of research attention. In this review we attempt to present the leading research on the detection techniques and the preventive mechanisms employed by previous studies to address the selfishness problem in mobile ad hoc networks, and to identify the trends during the past few years, focusing primarily on the routing layer. We follow a systematic methodology to identify, select, categorize, and analyze the relevant research and we use a concept-centric approach to present the results forming a comprehensive starting point for future research.
引用
收藏
页码:86895 / 86909
页数:15
相关论文
共 69 条
[1]  
Abd El-Haleem AM, 2011, COMM COM INF SC, V131, P236
[2]  
Abdullah AM, 2019, INT J ADV COMPUT SC, V10, P25
[3]   Evaluation of neighbor credit value based AODV routing algorithms for selfish node behavior detection [J].
Abirami, K. Rama ;
Sumithra, M. G. .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 6) :13307-13316
[4]  
Akhtar M. A. K., 2013, INT J WIRELESS MOBIL, V5, P187, DOI [10.5121/ijwmn.2013.5414, DOI 10.5121/IJWMN.2013.5414]
[5]  
Al-Shakarchi Sanaa J. H., 2021, 2021 1st Babylon International Conference on Information Technology and Science (BICITS), P178, DOI 10.1109/BICITS51482.2021.9509889
[6]  
Anderegg L., 2003, Proceedings of the 9th Annual International Conference on Mobile Computing and Networking, P245
[7]  
[Anonymous], 2002, ZON ROUT PROT ZRP AD
[8]  
[Anonymous], 2002, P 3 ACM INT S MOBILE
[9]  
[Anonymous], 2006, P ANN SE C, DOI DOI 10.1145/1185448.1185475
[10]  
Balakrishnan K, 2005, IEEE WCNC, P2137