4.6 Article

Counteracting Selfish Nodes Using Reputation Based System in Mobile Ad Hoc Networks

期刊

ELECTRONICS
卷 11, 期 2, 页码 -

出版社

MDPI
DOI: 10.3390/electronics11020185

关键词

mobile ad hoc networks; dynamic topology; multipath routing; secure routing; reputation ratio; trust management; selfish node; malicious node

资金

  1. Regional Innovation Strategy (RIS) through the NRF - Ministry of Education (MOE) [2021RIS-001]
  2. National Research Foundation of Korea [5199990214693] Funding Source: Korea Institute of Science & Technology Information (KISTI), National Science & Technology Information Service (NTIS)

向作者/读者索取更多资源

A mobile ad hoc network (MANET) is a network without predefined architecture, where nodes can communicate freely. However, malicious and selfish nodes can severely degrade network performance. This study proposes a reputation-based scheme to detect selfish nodes and enforce cooperation, improving network performance.
A mobile ad hoc network (MANET) is a group of nodes constituting a network of mobile nodes without predefined and pre-established architecture where mobile nodes can communicate without any dedicated access points or base stations. In MANETs, a node may act as a host as well as a router. Nodes in the network can send and receive packets through intermediate nodes. However, the existence of malicious and selfish nodes in MANETs severely degrades network performance. The identification of such nodes in the network and their isolation from the network is a challenging problem. Therefore, in this paper, a simple reputation-based scheme is proposed which uses the consumption and contribution information for selfish node detection and cooperation enforcement. Nodes failing to cooperate are detached from the network to save resources of other nodes with good reputation. The simulation results show that our proposed scheme outperforms the benchmark scheme in terms of NRL (normalized routing load), PDF (packet delivery fraction), and packet drop in the presence of malicious and selfish attacks. Furthermore, our scheme identifies the selfish nodes quickly and accurately as compared to the benchmark scheme.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据