A Survey of Various Approaches to Detect Selfishness in Wireless Ad-hoc Networks

被引:0
作者
Shah, Sachi N. [1 ]
Jhaveri, Rutvij H. [1 ]
机构
[1] SVM Inst Technol, Dept Comp Engn, Bharuch 392001, Gujarat, India
来源
2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT) | 2015年
关键词
Ad-hoc network; Routing Protocols; Selfishness; Existing Approaches; DETECTION MECHANISM; NODES; COOPERATION; PREVENTION; MODEL;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Ad hoc is a Latin word which describes solutions for this or specific purpose. In the world of computer network, an ad hoc network refers to a network connection which established for a single session and does not require wireless base station; they are on-the-fly networks. Energy, security and selfishness have been amongst the most popular issues for researchers in recent years. Selfish node is stated as a node that conserves its battery power and other resources and do not forward packets to other node but uses the service provided by other nodes. Due to dynamic nature of ad hoc networks, it is difficult to find out whether the node intentionally or unintentionally behaves as a selfish node. Such selfish nodes tend to save their energy in terms of CPU power, battery and bandwidth while they are assigned the work of forwarding the data to other nodes. In this Paper, we have carried out survey of various existing approaches to detect and prevent selfishness different kinds of ad hoc networks and describe the future scope regarding to that method. The literature survey depict that the existing schemes can be further modified to devise more reliable solutions to mitigate such selfish nodes.
引用
收藏
页码:627 / 632
页数:6
相关论文
共 20 条
[1]  
AGRAWAL V.M., 2015, INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING AND SCIENCES, V1, P9
[2]  
Balakrishnan K, 2005, IEEE WCNC, P2137
[3]  
Chen B, 2013, CHIN CONT DECIS CONF, P4021
[4]  
CIOBANU RI, 2013, INT NETW MAN IM 2013, P1161
[5]   A Fast Model for Evaluating the Detection of Selfish Nodes Using a Collaborative Approach in MANETs [J].
Hernandez-Orallo, Enrique ;
Serrat Olmos, Manuel D. ;
Cano, Juan-Carlos ;
Calafate, Carlos T. ;
Manzoni, Pietro .
WIRELESS PERSONAL COMMUNICATIONS, 2014, 74 (03) :1099-1116
[6]   Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks [J].
Jo, Minho ;
Han, Longzhe ;
Kim, Dohoon ;
In, Hoh Peter .
IEEE NETWORK, 2013, 27 (03) :46-50
[7]   Best neighbor strategy to enforce cooperation among selfish nodes in wireless ad hoc network [J].
Komathy, K. ;
Narayanasamy, P. .
COMPUTER COMMUNICATIONS, 2007, 30 (18) :3721-3735
[8]  
Konorski J., 2009, NTMS, P1
[9]  
Kurkure A. M., 2014, ADV ENG TECHN RES IC, P1
[10]  
Mao Y., 2015, MOBILE NETW APPL, V20, P1