International Journal of
Computer Sciences and Engineering

Scholarly, Peer-Reviewed and Fully Refereed Academic Research Journal

Flash News 

Full paper submission has now been opened for Vol.6, Issue.9, September 2018 Edition. You can upload your full paper using the required templates to the Online Submission System. Deadline for uploading the full papers is 22-Sep-2018.

Selfish Node Detection in Wireless Networks
Open Access   Article

Selfish Node Detection in Wireless Networks
D. Nivetha1 , D. Karthika2
1 Department of ECS, ARJ College of Engineering and Technology, Edayarnatham, India.
2 Department of ECS, ARJ College of Engineering and Technology, Edayarnatham, India.
Correspondence should be addressed to: .

Section:Research Paper, Product Type: Journal Paper
Volume-5 , Issue-7 , Page no. 28-31, Jul-2017


Online published on Jul 30, 2017

Copyright © D. Nivetha, D. Karthika . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at   Google Scholar | DPI Digital Library
  XML View PDF Download  

IEEE Style Citation: D. Nivetha, D. Karthika, “Selfish Node Detection in Wireless Networks”, International Journal of Computer Sciences and Engineering, Vol.5, Issue.7, pp.28-31, 2017.

MLA Style Citation: D. Nivetha, D. Karthika "Selfish Node Detection in Wireless Networks." International Journal of Computer Sciences and Engineering 5.7 (2017): 28-31.

APA Style Citation: D. Nivetha, D. Karthika, (2017). Selfish Node Detection in Wireless Networks. International Journal of Computer Sciences and Engineering, 5(7), 28-31.
289 169 downloads 105 downloads
Abstract :
Mobile ad-hoc networks (MANETs) relies on upon network participation plans to work legitimately. It expects that mobile node deliberate participate so as to work appropriately. By and by, if nodes have a selfish conduct and are unwilling to participate, the general network execution could be genuinely degraded. The proposed framework builds up a homomorphic straight Authenticator based upon examining design that enables the identifier to confirm the honesty of the bundle misfortune data detailed with nodes. In this manner, by recognizing the correlations between lost bundles, one can choose whether the parcel misfortune is absolutely because of normal connection blunders, or is a consolidated impact of connection mistake and selfish node. In our project we have proposed an efficient method for detecting a selfish node which takes into account the various factors like the battery capacity of a node, power consumption in transmitting packets and to overcome the presence of selfish nodes. In this framework consists of degree of intrinsic selfishness (DeIS) and the degree of extrinsic selfishness (DeES). Under the distributed node-selfishness management, a path selection criterion is designed to select the most reliable and shortest path in terms of RNs’. The theoretical analysis and results show that the proposed model has better probability and efficiency.
Key-Words / Index Term :
MANETs, Selfish Node, Node Misbehavior, Detection
References :
[1] B. Swetha, D.B. Rao, P.N. Rao, "Intelligent Anti-Theft Finding Scheme Towards Itrust Establishment in Delay Tolerant Networks Using VANET", International Journal of Computer Sciences and Engineering, Vol.2, Issue.9, pp.50-56, 2014.
[2] J.Li, Q.Yang, and K.S.Kwak, “Neural-network based optimal dynamic control of delivering packets in selfish wireless networks,” IEEE Commun. Lett. vol.19, no.12, pp.2246–2249, Dec.2015.
[3] H.Jiang and W.Zhuang, “Cross-layer resource allocation for integrated voice/data traffic in wireless cellular networks,” IEEE Trans. Wireless Commun., vol.5, no.2, pp.457–468, Feb.2006.
[4] F.Bao, I.Chen, M.Chang, and J.Cho, “Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection,” IEEE Trans. Netw. Serv. Manage., vol.9, no.2, pp.169–183, Jun.2012.
[5] Shanmugapriya R. “Parallel Networks For Enhancing And Efficient Delay Bounds Based Trust Management”, International Journal of Applied Engineering and Technical Research-IJAETR. Vol.1, Issue.1,pp.1-9, 2017.
[6] S. Jain, "Black Hole Attack in Delay Tolerant Networks: A Survey", International Journal of Computer Sciences and Engineering, Vol.2, Issue.4, pp.172-175, 2014.
[7] H. Zhu, X. Lin, and R. Lu, “SMART: A secure multilayer credit based incentive scheme for delay-tolerant networks,” IEEE Trans. Veh. Technol., vol.58, no.8, pp.4628–4639, Oct.2009.
[8] P.Kyasanur and N.F.Vaidya, “Selfish MAC layer misbehavior in wireless networks,” IEEE Trans. Mobile Comput., vol.4, no.5, pp.502–516, Sep.2005.
[9] Z.Ji and K.J.R.Liu, “Multi-stage pricing game for collusion-resistant dynamic spectrum allocation” IEEE J.Sel.Areas Commun., vol.26, no.1, pp.182–191, Jan.2008.
[10] Y.Rebahi, V.E.Mujica-V, and D.Sisalem, “A reputation-based trust mechanism for ad hoc networks,” in Proc. IEEE Symp. Comput. Commun. Jun.2005, pp.37–42.
[11] C.E.Perkins, E.M.Royer, S.R.Das, and M.K.Marina, “Performance comparison of two on-demand routing protocols for ad hoc networks,” IEEE Pers. Commun., vol.8, no.1, pp.16–28, Feb.2001.
[12] Y.Xiao and H.Li, “Voice and video transmissions with global data parameter control for the IEEE 802.11e enhance distributed channel access”, in IEEE, vol.15, issue.11, pp.1041–1053, Nov.2004.
[13] M.v.d. Schaar, Y.Andreopoulos, and Z.Hu, “Optimized scalable video steaming over IEEE 802.11a/e HCCA wireless networks under delay constraints”, in IEEE, vol.5, issue.6, pp.755–768, Jun 2006.
[14] R.Dai, P.Wang, and I.F.Akyildiz, “Correlation-aware QoS routing with differential coding for wireless video sensor networks”, in IEEE, vol.14, issue.5, pp.1469–1479, Oct.2012.