CFP last date
20 January 2025
Reseach Article

A Probabilistic Approach to Detect Selfish Node in MANET

Published on January 2014 by Suman Goswami, Saptarshi Das
National Conference on Future Computing 2014
Foundation of Computer Science USA
NCFC2014 - Number 1
January 2014
Authors: Suman Goswami, Saptarshi Das
32793ab1-ff95-473b-81b7-4cb9b1c2f2c3

Suman Goswami, Saptarshi Das . A Probabilistic Approach to Detect Selfish Node in MANET. National Conference on Future Computing 2014. NCFC2014, 1 (January 2014), 23-26.

@article{
author = { Suman Goswami, Saptarshi Das },
title = { A Probabilistic Approach to Detect Selfish Node in MANET },
journal = { National Conference on Future Computing 2014 },
issue_date = { January 2014 },
volume = { NCFC2014 },
number = { 1 },
month = { January },
year = { 2014 },
issn = 0975-8887,
pages = { 23-26 },
numpages = 4,
url = { /proceedings/ncfc2014/number1/14792-1406/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Future Computing 2014
%A Suman Goswami
%A Saptarshi Das
%T A Probabilistic Approach to Detect Selfish Node in MANET
%J National Conference on Future Computing 2014
%@ 0975-8887
%V NCFC2014
%N 1
%P 23-26
%D 2014
%I International Journal of Computer Applications
Abstract

A mobile ad hoc network, literally means a wireless link, which is ad-hoc by nature between several mobile nodes or devices. Each device in a MANET can move freely in any direction, and will therefore change its links to other devices easily. The main challenge in building a MANET is in terms of security. In this paper we are presenting a probabilistic approach to detect selfish nodes using the probability density function. The proposed model works with existing routing protocol and the nodes that are suspected of having the selfishness are given a Selfishness test. This model formulates this problem with the help of prior probability and continuous Bayes' theorem.

References
  1. Y. Hu, A. Perrig, and D. Johnson, Ariadne "A Secure On Demand Routing Protocol for Ad Hoc Networks", In Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking, September 2002, 12-23.
  2. K. Sanzgiri, B. Dahill, B. Levine, C. Shields, and E. Belding-Royer, "A secure routing protocol for ad hoc networks", in the 10th IEEE International Conference on Network Protocols (ICNP), November 2002.
  3. K. Sanzgiri, D. LaFlamme, , B. Dahill, B. N. Levine, C. Shields, and E. M. Belding- Royer, "Authenticate routing for ad hoc networks", in IEEE Journal on Selected Area in Communications, ser. 3, vol. 23, March 2005.
  4. Y. Hu, D. Johnson, and A. Perrig. "SEAD Secure Efficient Distance Vector Routing in Mobile Wireless Ad Hoc Networks", In Fourth IEEE Workshop on Mobile Computing Systems and Applications, June 2002, 3-13.
  5. P. Papadimitratos, Z. Haas and P. Samar, "The Secure Routing Protocol (SRP) for Ad Hoc Networks", Internet-Draft, draft-papadimitratossecurerouting-protocol-00. txt, December 2002.
  6. D. Johnson, D. Maltz, and Y. -C. Hu, "The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR)", IEEE Internet Draft, Apr. 2003.
  7. Yih-Chun Hu, Adrian Perrig, and David B. Johnson, "Wormhole Attacks in Wireless Networks" University of Illinois, Carnegie Mellon University, Rice University
  8. He Ronghui, Ma Guoqing, Wang Chunlei, and Fang Lan" Detecting and Locating Wormhole Attacks in Wireless Sensor Networks Using Beacon Nodes", World Academy of Science, Engineering and Technology, 55,2009
  9. Mathematical model for the detection of selfish node in MANET, Akhtar et al. IJCSI Vol-1 Issue-3. .
  10. ZhiRen and Jing Su Wei Guo,"A Cross-Layer AODV Routing Protocol," Proceedings of the IEEE International Conference on Mechatronics & Automation Niagara Falls, Canada. July 2005.
  11. FanBai, Ahmed Helmy,"A survey of mobility models in wireless Ad Hoc Networks," University of Southern California, U. S. A.
  12. AndrasVarga, OMNeT++, www. omnetpp. org
Index Terms

Computer Science
Information Sciences

Keywords

Probabilistic Approach