We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

A Survey on Evaluation Schemes for Routing Misbehaviors in Manet

by Rose Ann Cyril, Saritha S
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 78 - Number 11
Year of Publication: 2013
Authors: Rose Ann Cyril, Saritha S
10.5120/13531-0677

Rose Ann Cyril, Saritha S . A Survey on Evaluation Schemes for Routing Misbehaviors in Manet. International Journal of Computer Applications. 78, 11 ( September 2013), 7-11. DOI=10.5120/13531-0677

@article{ 10.5120/13531-0677,
author = { Rose Ann Cyril, Saritha S },
title = { A Survey on Evaluation Schemes for Routing Misbehaviors in Manet },
journal = { International Journal of Computer Applications },
issue_date = { September 2013 },
volume = { 78 },
number = { 11 },
month = { September },
year = { 2013 },
issn = { 0975-8887 },
pages = { 7-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume78/number11/13531-0677/ },
doi = { 10.5120/13531-0677 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:51:49.743050+05:30
%A Rose Ann Cyril
%A Saritha S
%T A Survey on Evaluation Schemes for Routing Misbehaviors in Manet
%J International Journal of Computer Applications
%@ 0975-8887
%V 78
%N 11
%P 7-11
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile ad hoc network has emerged as a trending topic of research in recent years owing to the highlighted pervasive computing culture. MANETs are decentralized, and therefore all network activities are carried out by nodes themselves. Transmissions are not controlled by any central authority as like base stations in the case of cellular networks. Each node is both an end-system as well as a relay node (router) to forward packets for other nodes. This requires that every node in the network contribute full cooperation as to cater to the routing needs of adhoc network. The route creation and maintenance tasks in Manet are autonomous operation. The flexibility of wireless transmission is however affected by its limitations as well like limited range, bandwidth, energy constraints etc. To cope up with these limitations, many a time's mobile nodes may decide either not to cooperate or partially cooperate for the benefit of their own. This strategic dimension of mobile nodes to conserve energy may be detrimental to the health of efficient Manet systems. Selfishness substantially reduces the performance of network at the routing layer. The selfishness may also cause data loss making the scenario more badly. It is hence the need of the hour to discover the selfish nodes and device new schemes wherein data accessibility is never affected on varying environments.

References
  1. Shailender Gupta, C. K. Nagpal And Charu Singla,"Impact Of Selfish Node Concentration In Manet",International Journal Of Wireless & Mobile Networks (ijwmn) Vol. 3, No. 2, April 2011
  2. L. Anderegg, S. Eidenbenz, "Ad hoc-VCG: A Truthful and Cost- Efficient Routing Protocol for Mobile Ad hoc Networks with Selfish Agents", Proc. ACM Mobicom, pp. 245–259, 2003.
  3. L. Buttyan and J-P. Hubaux, "Enforcing service availability in mobile ad-hoc WANs," in Proc. of First IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHoc), Boston, MA, USA, August 2000.
  4. S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. of the Sixth Annual International Conference on Mobile Computing and Networking (MobiCom), August 2000.
  5. V. Srinivasan, P. Nuggehalli, C. F. Chiasserini and R. Rao,"Cooperation in wireless Ad Hoc Network", in IEEE INFOCOM,California,USA,2003.
  6. Yanchao Zhang , Wenjing Lou , Wei Liu, Yuguang Fang, " A secure incentive protocol for mobile ad hoc networks" in Journal of Wireless Networks ,Volume 13 Issue 5, pp. 663-678 , October 2007
  7. S. Marti, T. Giuli, K. Lai and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks," in Proc. ACM MOBICOM, pp. 255-265, 2000.
  8. S. Zhong, J. Chen, and Y. R. Yang, "Sprite: A Simple, Cheat Proof, Credit based System for Mobile Ad Hoc Networks", in Proceedings of INFOCOM, Apr. 2003
  9. Pietro Michiardi and Refik Molva, "CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks," Sixth IFIP conference on security communications, and multimedia (CMS 2002), Portoroz, Slovenia, 2002.
  10. Hongxun Liu, José G. Delgado-Frias, and Sirisha Medidi, "Using a cache scheme to detect selfish nodes in mobile adhoc networks "in proceedings of IEEE international Conference on Networks, pp- 7– 12, Nov. 2007
  11. D. B. Johnson and D. A. Maltz, "Dynamic source routing in ad hoc wireless networks," in Mobile Computing, T. Imielinski and H. Korth, Eds. Norwell, MA: Kluwer,vol. 353, pp. 153–181, 1996. [12 ]Jerzy Konorski and Rafa? Orlikowski "AFramework for Detection of Selfishness in Multihop Mobile Ad Hoc Networks in "Journal of telecommunications and Information technology pp34-40,2009
  12. Zahara Safaei, Mohammad Hossein Anisi a Fatemeh Torgheh, "A Reputation based mechanism to enforce Cooperation in MANET's",Software Telecommunications and Computer Networks",2008(SoftCOM2008)16th International Conference on 25-27 Sept 2008.
  13. Yanchao Zhang, Wenjing Lou, Yuguang Fang," SIP: A Secure Incentive Protocol against Selfishness in Mobile Ad Hoc Networks"
  14. Levente Buttyan, Jean-Pierre Hubaux "Enforcing Service Availability in Mobile Ad-Hoc WANs", IEEE 2000.
Index Terms

Computer Science
Information Sciences

Keywords

Manet PPM PTM Secure Incentive Protocol Sprite Watchdog Pathrater CONFIDANT CORE