You are on page 1of 5

International Journal of Application or Innovation in Engineering& Management (IJAIEM)

Web Site: www.ijaiem.org Email: editor@ijaiem.org


Volume 3, Issue 9, September 2014 ISSN 2319 4847

Volume 3, Issue 9, September 2014 Page 31

ABSTRACT
In wireless ad hoc networks, all nodes altogether cooperate to provide network services to users. Due to the limited bandwidth or
communication range, data packets are forwarded through multiple medium of nodes before they reach the destinations. If a
node always serves as a medium to transmit the packets, it may soon finish up its own energy and other resources constraints.
Therefore, some nodes behave using a selfish approach; they try to avoid forwarding the data packets. Such type of selfish
behavior would often probably cause the network to break down. Selfish nodes are commonly occurred within ad hoc networks
since they are managed by different resources. The performance of ad-hoc network gets degraded due to presence of selfish node
which causes huge packet loss, decreased throughput, minimize data accessibility, increased query delay, high communication
cost, low delivery ratio etc. In a mobile ad hoc network, the mobility behavior and resource constraints of mobile nodes may often
lead to network partitioning or performance degradation. Many data replication techniques have been proposed to minimize
performance degradation. Most of the nodes assume that all mobile nodes collaborate fully in terms of sharing their memory
space. But in reality, however, some nodes may selfishly decide only partially to cooperate, or not at all, with other nodes. These
selfish nodes could then decrease the overall data accessibility in the network. Here, we examine the impact of selfish nodes in a
mobile ad hoc network from the view of replica allocation. We term this as selfish replica allocation. In particular, we have used a
selfish node detection algorithm that considers partial selfishness and novel replica allocation techniques to properly cope with
selfish replica allocation. The carried out simulations demonstrate the proposed approach outperforms traditional cooperative
replica allocation techniques in terms of communication cost according to hop count, throughput, and packet delay and
selfishness alarm.
Keywords: MANET, Node Selfishness, Replica allocation, Network efficacy
1. INTRODUCTION
Advance researches and innovations in wireless communication technologies are mostly discussed in recent times and
MANET has attracted a lot of attention due to large variety of applications where installation of the infrastructure might
be difficult. A MANET is peer-to-peer multihop mobile wireless network that neither have a fixed infrastructure nor a
central server [1] that controls the network. Every node in a MANET acts as a router, and communicates with each other
therefore it is also prone to issues such as network partitions causing some data often inaccessible to some of the nodes
[2].
The technical contributions are summarized as follows:
Recognizing the selfish replica allocation problem: We view a selfish node in a MANET from the perspective of
data replication, and conclude that selfish replica allocation can lead to degraded data accessibility in a MANET.
Detecting the fully or the partially selfish nodes effectively: We devise a selfish node detection method that can
measure the degree of selfishness.
Allocating replica effectively: We propose a set of replica allocation techniques that use the self-centred friendship
tree to reduce communication cost, along with achieving good data accessibility.
Verifying the proposed strategy: The simulation results verify the efficacy of our proposed strategy.
2. LITERATURE REVIEW
Various algorithms have been proposed in recent years to solve the issue of selfish nodes in MANET. Each algorithm
takes a different step towards the problem, but many of these algorithms are broken into three general categories that is
reputation based, credit based and game theory based.
A.Reputation Based: Marti et al. [7] are the first one to introduce detection-based routing protocol enhancements for
wireless ad hoc networks. They use a watchdog that finds out misbehaving nodes and a pathrater that helps routing
protocols avoid these nodes. Buchegger and Le Boudec [8] propose a protocol, called CONFIDANT, to make misbehavior
Detecting and Managing SelfishNodes over
MANET

1
Prof. Shobha Lolge,
2
Neha Baheti
Lecturer Department of Computer Engineering,
Lokmanya Tilak College of Engineering, Koparkhairane,
Navi Mumbai, India

International Journal of Application or Innovation in Engineering& Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 3, Issue 9, September 2014 ISSN 2319 4847

Volume 3, Issue 9, September 2014 Page 32
get unattractive. They include observation, detection and reaction mechanisms to a routing protocol to exclude
uncooperative nodes present in the network. Michiardi and Molva [9] show a generic mechanism based on reputation to
enforce cooperation among the nodes of a MA-NET to prevent selfish behavior. Every entity present in the network keeps
track of other entities' collaboration using a technique called reputation. Simple service attacks are prevented by the
collaboration technique.
B. Credit payment based: Buttyan and Hubaux [10] present a scheme to ensure cooperation among nodes in
wireless ad hoc networks. They have introduced a virtual currency called Nuglet, which is used in the
network to charge for the transmission of packets and to reward the forwarding process. Zhong et al. [11] make
one of the first proposals, which utilizes rewards to encourage cooperation among nodes in wireless ad hoc networks. The
authors suggest a virtual currency called Credits and a centralized account management via a Credit Clearance Service
for all nodes. Chen et al. [12] propose an auction-based incentive scheme (called iPass) to enable cooperative packet
forwarding behavior in MANET. Every flow pays the market price of packet for-warding service to the intermediate
routers. The resource allocation method in iPass is based on the generalized Vickrey auction with reserve pricing.
C.Game theory based: Urpi et al. [3] develop a general mod-el which formally describes the characteristics of wireless
ad hoc networks. Here they analyze different cooperation enforcement mechanism from the literature and propose a
simple strategy resulting in equilibrium. This shows that in their model, cooperation is possible out of a node own self-
interest. Srini-vasan et al. [4] obtain same type of results. They make use of an algorithm based on the generous tit-for-tat
(GTFT) strategy. L. Anderegg et.al in [5] introduce a game-theoretic setting for routing in a wireless ad hoc network that
consists of greedy, selfish agents who accept or demand payments for forwarding data for other agents if the payments
cover their individual costs incurred by forwarding data. In this scenario, the authors propose Ad hoc-VCG, a routing
protocol that achieves the de-sign objectives of truthfulness and cost-efficiency in a game theoretic sense by paying to the
intermediate nodes a premium over their actual costs for forwarding data packets. Felegyhazi et al. [6] investigate
whether cooperation can exist in wireless ad hoc networks without presence of incentive mechanisms. Here they propose a
model based on game theory and graph theory to investigate equilibrium conditions for packet forwarding strategies in
network. Their model is the first one to consider the network topology. Here they find that in theory conditions for
cooperation out of own self-interest exist, but their simulation show that in actual these conditions are almost never
satisfied and there will al-ways be nodes which need an incentive to cooperate.
3. SYSTEM MODEL
Node Behavior: There are three types of behavior states that a node can show from the viewpoint of selfish replica
allocation.
Type-1 node: The nodes are non-selfish nodes. These types of nodes hold replicas allocated by other nodes within
the limits of their memory space.
Type-2 node: The nodes are fully selfish nodes. These types of nodes do not hold replicas allocated by other nodes
in the network, but allocate replicas to other nodes for their own accessibility.
Type-3 node: The nodes are partially selfish nodes. These nodes use their memory space partially for replicas
allocated by other nodes. Their memory space can be divided logically into two parts: selfish and public area.
These types of nodes allocate replicas to other nodes for their accessibility.
Presented novel approach measure the degree of selfishness to appropriately handle the partially selfish nodes.
Motivated by this concept of partial selfishness, this process borrows the term of credit risk (CR) from economics to
detect selfish nodes. To avoid the replica allocation, the process use the method of Self-Centered Friendship tree (SCF-
tree) and its variation (SCF-DS) and (SCF-CN). SCF-tree based replica allocation technique is to achieve good data
accessibility with low communication cost in the presence of selfish nodes. Since proposed replica allocation technique
appropriately handles the (partially) selfish nodes, the technique is being expected to achieve the objective. After the SCF-
tree is built, a node allocates replica at every relocation period. Every node asks non selfish nodes present within its SCF-
tree to hold replica when it is not able to hold replica in its own local memory space present. Since the SCF-tree based
replica allocation is performed in a fully distributed manner, replica allocation is determined by each node individually
without any communication with other nodes. The approach proposed here is applied in following four steps
1. Detecting selfish node
2. Update selfish node
3. Building SCF tree
4. Allocating replica
International Journal of Application or Innovation in Engineering& Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 3, Issue 9, September 2014 ISSN 2319 4847

Volume 3, Issue 9, September 2014 Page 33
DETECTING SELFISH NODE
This algorithm describes how to detect selfish nodes. A selfish node may share part of its own memory space, or a small
number of data items. The node-specific features can be used to represent the expected value of a node.
UPDATE SELFISH NODE
In the query processing-specific feature, we utilize the value of selfishness alarm which is the ratio of data request being
not served by the expected node due to selfishness in its memory space. Query processing-specific feature can represent
the expected risk of a node. To effectively identify the expected node should know the (expected) status of other nodes
memory space.
BUILDING SCF TREE
The novel replica allocation techniques can allocate replica without discussion with other nodes present in network, as it
happens in a human friendship management, traffic overhead will decrease. Using SCF tree we can differentiate the
selfish nodes and partial selfish nodes.
ALLOCATING REPLICA
First, set of ordered data items are allocated. The ID of the data items is stored in descending order of access frequency.
Each node allocates replicas in descending order of its own access frequency. Each node executes this algorithm at every
relocation period after its own SCF-tree is built. Initially, a node determines the priority for allocating replicas. The
priority for allocating replicas is based on Breadth First Search (BFS) order of the SCF-tree.

Figure 1. The System Block Diagram
5. SIMULATION ENVIRONMENT
Performance Metrics:
Communication Cost: This is the measure of total hop count of data transmission for selfish node detection and
replica allocation/relocation, and their involved information sharing.
Throughput: It the average rates of successful message delivery over a communication channel.
Packet delay: Total delay added by intermediate node during transmission.
Packet Delivery Ratio: Ratio of total number of received packet to total number of sent packets.
Energy Consumption: Energy utilization decreases with time as the selfish nodes are detected and removed.


International Journal of Application or Innovation in Engineering& Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 3, Issue 9, September 2014 ISSN 2319 4847

Volume 3, Issue 9, September 2014 Page 34




International Journal of Application or Innovation in Engineering& Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 3, Issue 9, September 2014 ISSN 2319 4847

Volume 3, Issue 9, September 2014 Page 35
6. CONCLUSION
The presented approach is having advantage as it minimizes the duplication of data items in a group to achieve high data
accessibility. It reduces the communication cost, along with achieving good data accessibility. This process is used to
reduce query delay. Each node detects selfishness in nodes and makes replica allocation at its own decision, without
forming any group or engaging in lengthy discussions.
References

[1.] P. Padmanabhan, L. Gruenwald, A. Vallur, and M. Atiquzzaman, A Survey of Data Replication Techniques for
Mobile Ad Hoc Network Databases, The Intl J . Very Large Data Bases, vol. 17, no. 5, pp. 1143-1164, 2008.
[2.] B.-G. Chun, K. Chaudhuri, H. Wee, M. Barreno, C.H. Papadimitriou, and J . Kubiatowicz, Selfish Caching in
Distributed Systems: A Game-Theoretic Analysis, Proc. ACM Symp. Principles of Distributed Computing, pp. 21-
30, 2004.
[3.] A.Urpi, M.Bonuccelli, and S.Giordano, Modeling cooperation in mobile ad-hoc networks: A formal description of
selfishness, Proc. of Modeling and Optimal in Moile, Ad Hoc and Wireless Networks, April 2003.
[4.] N.B. Salem, L. Buttyyan, J .P. Hubaux, and M. Jakobsson, A Charging and Rewarding Scheme for Packet
Forwarding in Multi-hop Cellular Networks, Proc. of MobiHoc, J une 2003.
[5.] L. Anderegg and S. Eidenbenz, Ad hoc-VCG: a Truthful and Cost-Efficient Routing Protocol for Mobile Ad hoc
Networks with Selfish Agents, Proc. Of Mobicom, September 2003.
[6.] M. Felegyhazi, L. Buttyan, and J.P.Hubaux, Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad
Hoc Networks- the static Case, Proc. of Personal Wireless Communication, October 2003.
[7.] S. Marti, T.J . Giuli, K. Lai, and M. Baker, Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Proc. of
Mobicom, August 2000.
[8.] S. Buchegger, J .-Y. Le Boudec, Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes -
Fairness In Distributed Ad-hoc NeTworks, Proc. of MobiHoc, J une 2002.
[9.] P. Michiardi and R. Molva, Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad
hoc networks, Proc. of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia
Security: Advanced Communications and Multimedia Security, pp.107-121, September 2002.
[10.] L. Buttyan and J.P. Hubaux, Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad
Hoc Networks, Technical Report No. DSC/2001/001, Swiss Federal Institute of Technology (EPFL), January 2001.
[11.] S. Zhong, J . Chen, and Y.R. Yang, Sprite: A Simple, Cheat-Proof, Credit Based System for Mobile Ad-Hoc
Networks, Proc. of IEEE INFOCOM, April 2003.
[12.] K. Chen and K. Nahrstedt, iPass: an Incentive Compatible Auction Scheme to Enable Packet Forwarding Service in
MANET, Proc. of the 24th International Conference on Distributed Computing Systems, March 2004.

You might also like