A unified approach for detecting and eliminating selfish nodes in MANETs using TBUT

被引:7
作者
Kumar, Jebakumar Mohan Singh Pappaji Josh [1 ,2 ]
Kathirvel, Ayyaswamy [3 ]
Kirubakaran, Namaskaram [5 ]
Sivaraman, Perumal [6 ]
Subramaniam, Muthusamy [4 ]
机构
[1] Sathyabama Univ, Madras 600119, Tamil Nadu, India
[2] GKM Coll Engn & Technol, Dept ECE, Madras 600063, Tamil Nadu, India
[3] Anand Inst Higher Technol, Dept Informat Technol, Madras 603103, Tamil Nadu, India
[4] SA Engn Coll, Dept Informat Technol, Chennai 600077, Tamil Nadu, India
[5] St Peters Univ, Madras 600054, Tamil Nadu, India
[6] VIT Univ, Vellore 632014, Tamil Nadu, India
关键词
MANET; Selfish node; Performance and token-based umpiring technique (TBUT); TRUST MANAGEMENT; SENSOR NETWORKS; INTERNET; THINGS;
D O I
10.1186/s13638-015-0370-x
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Recent years have witnessed the increasing efforts toward making architecture standardization for the secured wireless mobile ad hoc networks. In this scenario when a node actively utilizes the other node resources for communicating and refuses to help other nodes in their transmission or reception of data, it is called a selfish node. As the entire mobile ad hoc network (MANETs) depends on cooperation from neighboring nodes, it is very important to detect and eliminate selfish nodes from being part of the network. In this paper, token-based umpiring technique (TBUT) is proposed, where every node needs a token to participate in the network and the neighboring nodes act as umpire. This proposed TBUT is found to be very efficient with a reduced detection time and less overhead. The security analysis and experimental results have shown that TBUT is feasible for enhancing the security and network performance of real applications.
引用
收藏
页数:11
相关论文
共 58 条
[1]  
[Anonymous], INT J CURRENT ENG TE
[2]  
[Anonymous], 13 INT C ADV COMM TE
[3]  
Arya M, 2011, INT J COMPUTER APPL, V27, P21
[4]   A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions [J].
Attar, Alireza ;
Tang, Helen ;
Vasilakos, Athanasios V. ;
Yu, F. Richard ;
Leung, Victor C. M. .
PROCEEDINGS OF THE IEEE, 2012, 100 (12) :3172-3186
[5]  
Brown T., 2010, COMPANION HLTH MED G, P1, DOI DOI 10.1002/9781444314762
[6]   Approximating Congestion plus Dilation in Networks via "Quality of Routing" Games [J].
Busch, Costas ;
Kannan, Rajgopal ;
Vasilakos, Athanasios V. .
IEEE TRANSACTIONS ON COMPUTERS, 2012, 61 (09) :1270-1283
[7]   Nodes organization for channel assignment with topology preservation in multi-radio wireless mesh networks [J].
Cheng, Hongju ;
Xiong, Naixue ;
Vasilakos, Athanasios V. ;
Yang, Laurence Tianruo ;
Chen, Guolong ;
Zhuang, Xiaofang .
AD HOC NETWORKS, 2012, 10 (05) :760-773
[8]   Service configuration and traffic distribution in composite radio environments [J].
Demestichas, PP ;
Stavroulaki, VAG ;
Papadopoulou, LMI ;
Vasilakos, AV ;
Theologou, ME .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2004, 34 (01) :69-81
[9]   DTRAB: Combating Against Attacks on Encrypted Protocols Through Traffic-Feature Analysis [J].
Fadlullah, Zubair M. ;
Taleb, Tarik ;
Vasilakos, Athanasios V. ;
Guizani, Mohsen ;
Kato, Nei .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2010, 18 (04) :1234-1247
[10]  
Georgiadis Leonidas, 2006, Foundations and Trends in Networking, V1, P1, DOI 10.1561/1300000001