SLGP Header

Misbehavior Routing Identification by Collaborative Contact Based Detection in MANET

IJEECC Front Page

The continuously self-configuring, Infrastructure less Mobile Ad-hoc Networks (MANETs) route in effective manner by utilizing the voluntary cooperating nodes. That is the ability of each node to move independently and freely, thus can configure the links to other nodes frequently. Certain node refuse to cooperate and leads to the selfish behavior and such nodes are named as selfish nodes, whose existence will degrade the network performance. A well-known existing method to detect such selfish nodes was the watchdog mechanism. Focusing only on this watchdog system alone will fail to detect all the selfish nodes, may generate false positives and negatives and thus by leads to wrong operation. Also it created poor system performance in terms of speed and precision. These were much important factors in the networks with sporadic contacts such as opportunistic and delay tolerant networks, because watchdog lack enough time and information to detect the selfish nodes. Thus propose a collaborative approach based on the diffusion of local selfish node awareness when a contact occurs. Thus the information about the selfish node is propagated quickly in the network, which leads to improved speed and precision while detecting the selfish nodes. With the help of other nodes can avoid such nodes while routing in the network.
Keywords: Cooperation, Delay tolerant networks, Mobile Ad-Hoc Networks (MANETs), Opportunistic Networks, Selfish nodes, Sporadic contacts


  1. A. Chaintreau, P. Hui, J. Crowcroft, C. Diot, R. Gass, and J. Scott, “Impact of human mobility on opportunistic forwarding algorithms,” IEEE Trans. Mobile Comput., 2007.
  2. E. Hern_andez-Orallo, M. D. Serrat, J.-C. Cano, C. M. T. Calafate, and P. Manzoni, “Improving selfish node detection in MANETs using a collaborative watchdog,” IEEE Comm. Lett., vol. 16, no. 5, pp. 642–645, May 2012.
  3. H. Cai and D. Y. Eun, “Crossing over the bounded domain: From exponential to power-law intermeeting time in mobile ad hoc networks,” IEEE/ACM Trans. Netw., vol. 17, no. 5, pp. 1578–1591, Oct. 2009.
  4. J. Hortelano, J.-C. Cano, C. T. Calafate, M. de Leoni, P. Manzoni, and M. Mecella, “Black hole attacks in p2p mobile networks discovered through Bayesian filters,” in Proc. Int. Conf. Move Meaningful Internet Syst., 2010, pp. 543–552.
  5. K. Paul and D. Westhoff, “Context aware detection of selfish nodes in DSR based ad-hoc networks,” in Proc. IEEE Global Telecommun. Conf., 2002, pp. 178–182.
  6. L. Butty_an and J.-P. Hubaux, “Enforcing service availability in mobile ad-hoc WANs,” in Proc. 1st Annu. Workshop Mobile Ad Hoc Netw. Comput., 2000, pp. 87–96.
  7. L. Butty_an and J.-P. Hubaux, “Stimulating cooperation in selforganizing mobile ad hoc networks,” Mobile Netw. Appl., vol. 8, pp. 579 592, 2003.
  8. P. Hui, J. Crowcroft, and E. Yoneki, “Bubble rap: social-based forwarding in delay tolerant networks,” in Proc. 9th ACM Int. Symp. Mobile Ad Hoc Netw. Comput., 2008, pp. 241–250.
  9. R. Groenevelt, P. Nain, and G. Koole, “The message delay in mobile ad hoc networks,” Perform. Eval., vol. 62, pp. 210–228.
  10. S. Abbas, M. Merabti, D. Llewellyn-Jones, and K. Kifayat, “Lightweight sybil attack detection in manets,” IEEE Syst. J., vol. 7, no. 2, pp. 236–248, 2013.
  11. S. Bansal and M. Baker, “Observation-based cooperation enforcement in ad hoc networks” arXiv:cs.NI/0307012, 2003.
  12. S. Buchegger and J.-Y. Le Boudee, “Self-policing mobile ad hoc networks by reputation systems,” IEEE Commun. Mag., vol. 43, no. 7, pp. 101–107, Jul. 2005.
  13. W. Gao, Q. Li, B. Zhao, and G. Cao, “Multicasting in delay tolerant networks: A social network perspective,” in Proc. 10th ACM Int. Symp. Mobile Ad Hoc Netw. Comput., 2009, pp. 299–308. Oct. 2005.