Abstract
We study routing misbehavior in MANETs (Mobile Ad Hoc Networks) in this paper. In general, routing protocols for MANETs are designed based on the assumption that all participating nodes are fully cooperative. However, due to the open structure and scarcely available battery-based energy, node misbehaviors may exist.[1]. One such routing misbehavior is that some selfish nodes [2], will participate in the route discovery and maintenance processes but refuse to forward data packets. In this paper, we develop a game theoretic based cooperation model that observes the behavior of an intermediary node (selfish neighbors) while forwarding packets for others on a route between a source and a destination. It also allows formally study and analyze the impact of selfish behavior on the system performance .
Highlights
Mobile Ad Hoc Network (MANET) is a collection of mobile nodes which communicate with each other via wireless links either directly or relying on other nodes as routers
To provide a complete picture of the negative effect of node misbehaviors, we evaluated the network performance when misbehaving nodes are present by simulations, where misbehaving nodes drop all data packets to be forwarded once paths are established
We presented a model to describe behavior of an intermediary node in a route between a source and a destination, which is a collaborative point of its one-hop neighbors
Summary
Mobile Ad Hoc Network (MANET) is a collection of mobile nodes (hosts) which communicate with each other via wireless links either directly or relying on other nodes as routers. A behavioral model that could dynamically predict the level of cooperation extended by the node towards the network functions such as routing, network monitoring and packet forwarding is crucial. On the other hand, which cooperate during route discovery and defect during packet forwarding, need to be explored. We design a behavioral model that could dynamically affect the level of cooperation extended by the node towards the network functions such as routing, network monitoring and packet forwarding.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International journal of Network Security & Its Applications
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.