Detecting and preventing selfish behaviour in mobile ad hoc network

被引:0
作者
Tao Lei
Shangguang Wang
Jinlin Li
Ilsun You
Fangchun Yang
机构
[1] Beijing University of Posts and Telecommunications,State Key Laboratory of Networking and Switching Technology
[2] Soonchunhyang University,Department of Information Security Engineering
来源
The Journal of Supercomputing | 2016年 / 72卷
关键词
Mobile ad hoc network; Repeated games; Adaptive threshold algorithm; Selfish behaviour;
D O I
暂无
中图分类号
学科分类号
摘要
In mobile ad hoc networks for big data transmission, nodes communicate with each other via intermediate nodes. However, some intermediate nodes may behave selfishly, resulting in reduced throughput and increased delay in the network. Thus, the existence of selfish behaviour in a mobile ad hoc network degrades the performance of the network. In this paper, we propose a scheme that detects selfish behaviour and prevents its occurrence in mobile ad hoc network. The proposed scheme uses an adaptive threshold algorithm to detect selfish behaviour, and prevents it based on a repeated games scheme. Extensive simulations using NS-2 showed that our scheme can effectively detect and prevent selfish behaviour.
引用
收藏
页码:3156 / 3168
页数:12
相关论文
共 28 条
[1]  
Sun B(2007)Intrusion detection techniques in mobile ad hoc and wireless sensor networks IEEE Wirel Commun 14 56-63
[2]  
Osborne L(2003)Stimulating cooperation in self-organizing mobile ad hoc networks Mob Netw Appl 8 579-592
[3]  
Xiao Y(2006)Why does it pay to be selfish in a MANET? IEEE Wirel Commun 13 87-97
[4]  
Guizani S(2005)Using game theory to analyze wireless ad hoc networks IEEE Commun Surv Tutor 7 46-56
[5]  
Buttyán L(2008)Cooperation enforcement and learning for optimizing packet forwarding in autonomous wireless networks IEEE Trans Wirel Commun 7 3150-3163
[6]  
Hubaux J-P(2009)Coalition games with cooperative transmission: a cure for the curse of boundary nodes in selfish packet-forwarding wireless networks IEEE Trans Commun 57 203-213
[7]  
Yoo Y(2015)Selfish node detection and low cost data transmission in MANET using game theory Procedia Computer Sci 54 92-101
[8]  
Agrawal DP(2006)Application of anomaly detection algorithms for detecting SYN flooding attacks Computer Commun 29 1433-1442
[9]  
Srivastava V(2008)Application of desired utility function theory to library administration College Math 2 039-269
[10]  
Neel JO(2003)The node distribution of the random waypoint mobility model for wireless ad hoc networks IEEE Trans Mob Comput 2 257-undefined