Effect of Selfish
Nodes in Trust Base Route: MANET
Kiran, Sanjay Kumar, V. K. Patle
School
of Studies in Computer Science & IT Pt. Ravishankar Shukla University,
Raipur (Chhattisgarh) 492010 India
*Corresponding Author Email: kiranjuly79@gmail.com,
sanraipur@rediffmail.com,patlevinod@gmail.com
ABSTRACT:
MANET is a network with no fixed
infrastructure. Routing is a greater
challenge in these types of mobile networks due to the mobility and open media
nature .The mobile ad hoc networks are more prone to security threats compared
to the wired network. Therefore security needs are higher in mobile ad hoc
networks compared to the traditional networks. Many types of problem are
possible in mobile ad hoc networks such as selfish node problem .Selfish node
is a node which can hold packet for using resources for their respective use.
So for data security we want to send it through secure route, for that purpose
we identify which node is cooperative and which one is selfish. Increasing of
selfish node decreases the trust value of a node. If selfish node can be
detected in a rout then one can abort that route and choose another safe route
for data transfer. This paper analysis
the selfish nodes problem in MANET with the help of network simulator and
explore that the network performance is inversely proportional to no. of
selfish node. After finding load on network route can be modify and network
performance can be increased.
KEY WORDS: MANET Trust base route, Selfish node,
Cooperative node, Network simulator.
1. INTRODUCTION
With the recent technological advancements in the
field of Mobile Ad Hoc Networks, their utility has increased by leaps and
Bounds .MANETs find their use particularly in the field where infrastructure
network are not possible without having any centralized administration. Mobile
Ad Hoc network provide services to user at any time and any where but all
services depend upon behavior of nodes. If nodes present in network behave
cooperatively then quality of services is best but some time nodes are
represent misbehaving nature thus they affected the functionality of network
.they can be either selfish or malicious .Selfish nodes A selfish node may enjoy
network services, e.g. receiving packets destined for itself but refuse to
route or forward packets for others, therefore invalidating the basic
collaboration premise in almost all current routing algorithms for mobile
ad-hoc networks.
Malicious nodes
may seek to damage or disrupt normal network operations.
Moreover,
misbehaving node may act as a good network citizen for a certain time period or
in certain places, but then starts to act selfishly or maliciously at other
times or locations .
Trust based route,
if data send by any route reached it’s destination successfully then the
route known as trust based route that
type of route used by network for secure data sending. Reputation value of that
type routes is grater then other routes. Good
routing can be provided by different routing protocols. These protocol find out
the between two nodes and allow them to communicate with each other. The performance of a MANET greatly depends on the
cooperation of all nodes in the network. In this paper, we propose a system to
evaluate the trust value of a route in presence of selfish nodes that refuse to
cooperate but at the same time still use the network for their own benefits.
In MANET a network can be called better if
its data sending rate is high. But data sending rate or efficiency of a network
diminish by the presence of misbehaving nodes
when no. of selfish nodes are increase then route can not able to
forward data to its destination and data may be lost thus a intrusion
created between source and destination
nodes. While construction of network it is assumed that all nodes are
cooperative. But during packet
forwarding they spent most of there energy if they ignore the request of packet
transmission and save energy thus enjoy membership of networking. For example, simulation studies by Buttyan
and Hubaux [6] show that when the average numbers of hops from a source to a
destination is around 5, then almost 80% of the transmission energy will be
devoted to packet forwarding. By denying services for others, a node could
reserve its resources for its own use and stay longer in the network. So there
is a strong motivation for the nodes not to cooperate and misbehaving. In
general, there are two types of node misbehaving:
1.1MALICIOUS
NODES:-
A
misleading node is selective in choosing which packet it wants to respond. It
behaves like an honest node. Malicious nodes injected by adversaries, on the
other hand, will actively spend battery power to cause harm to the entire
network. Providing nodes with an incentive to cooperate (by either rewarding
them for active cooperation or punishing them for a lack of such cooperation)
becomes an interesting research issue.
1.2
SELFISH NODES:-
Selfish
node aims to save its resources to the maximum. This type of misbehaving node
discards all incoming packets (control and data) except those which are
destined to it. By dropping control packets, the nodes would not be included in
the routing and then be released from being requested to forward data packets.
The similarity of these two types of misbehaving is that they both use the
network to forward their own packets but refuse to provide the same services
back. Misbehaving nodes can significantly degrade the performance of a MANET.
Simulation done by Babakkhouya et al. [8] shows that the percentage of
misleading nodes can decrease the number of packets that are successfully
delivered in the network. As the number of selfish nodes been increased, the
source node will have less option on which route the data packets should
travel. As a result, less attractive route will be selected which means longer
delays. It also means that the remaining cooperative nodes have to take the
extra burden of forwarding packets. In [10], three types of selfish nodes
related to routing such as Dynamic Source Routing are defined:
Selfish
Nodes Type 1 (SN1) –
These
nodes participate in the DSR Route Discovery and Route Maintenance phases, but
refuse to forward data packets (which are usually much larger than the routing
control packets);
Selfish
Nodes Type 2 (SN2) –
These
nodes participate in neither the Route Discovery phase, nor forwarding data
packets. They only use their energy for transmissions of their own packets;
Selfish
Nodes Type 3 (SN3) –
These
nodes behave (or misbehave) differently based on their energy levels. When the
energy lies between full energy E and a threshold T1, the node
behaves properly. For an energy level between T1 and another lower
threshold T2, it behaves like a node of type SN1. Finally, for an energy
level lower than T2.it behaves like a node of type SN2. The relationship
between T1, T2, and E is T2 < T1 <
E.
2.
RELATED WORK:-
Various
techniques have been proposed to prevent selfishness in MANETs. These schemes
can be broadly classified into reputation-based schemes [2], [9] and
credit-based schemes [3], [5], [6], In2012 Sumer Singh, Puneet Jain, Puneet
Bindra, Chakshu Goel [8] made analysis of AODV and GRP by varying no. of
misbehavior nodes based on OPNET. Result of AODV is best in comparison of GRP.
In 2012,
March Kuldeep Vats, Monika Sachdeva, Dr. Krishan Saluja [10] prepared
performance analysis of OLSR, GRP, DSR protocol using OPNET and concluded that
OLSR presents the best ce then GRP present low to OLSR but high to DSR i.e.
performance of DSR is lowest.
3. EVALUATION OF TRUST BASE ROUTE:-
By
applying simulation we get throughput of that route i.e. no. of packet send and
no. of packet receive and use this data for evaluation of trust value of a
route. formula used for trust value calculation
The
proposed approach is implemented over the existing on demand routing protocol
Reputation value of node is used to classify a node as well behaving or
misbehaving. each node uses a monitoring mechanism like “watchdog” to monitor
their neighbors. Monitoring the neighbors helps each node to calculate the
reputation value of each of its neighbor. Reputation value is calculated using
equation above. Suppose there are „N‟ nodes in the mobile ad-hoc network.
M= no. of packet.
N= max. no. of node.
Pri=packet receive by node i.
Psi=packet send by node i.
3. 1 Simulation Methodology and
Simulation
Environment:-
We use network simulator ns2 for our proposed
simulations. It comprises the models and modules at physical and data link
layers, MAC layer protocols and the ad hoc routing protocols DSDV, DSR, AODV,
which we need to compare. Speed of a node in the ad hoc network is uniform
(Random way point mobility model). After reaching the destination, a node
pauses for a specified interval of time before choosing a random destination
and repeating the process. Constant Bit Rate (CBR) traffic is chosen for
communication among randomly selected
nodes. Two types of node misbehaviors mentioned above are incorporated in ns2
as separate node definition types, which allow picking a selfish model between
two possible choices. Table 1 lists some common parameters used in course of
the simulation.
3.2 Performance Analysis:-
|
PROTOCOL/PARAMETRE |
AODV |
DSR |
DSDV |
|
THROUGH PUT |
80‰ |
80‰ |
60‰ |
|
PACKET DROP FOR 40 FOR 60 FOR 80 |
100 150 200 |
100 200 250 |
3500 5500 4500 |
|
AVERAGE PACKET DELAY |
MIDIUM |
HIGH |
LOW |
Fig:-
Throughput for without selfish node[9]
Fig:-
Throughput for 40 selfish nodes[9]
Fig:-
Throughput for 60 selfish nodes[9]
Fig:- Throughput for 80 selfish nodes[9]
After
analysis given graph we obtain them in follow
following
table form
6.
CONCLUSION AND FUTURE WORK
In this
paper we analyzed relation between selfish nodes and network performance under varying no. of selfish
nodes with mobility speed of 25 m/s and the performance is compared in term of
no. of packet drop, throughput and delay. After analysis of graph it shows that
when no. of selfish node increase then the packet drop is also increase thus
performance of network is decrees. So the relation between network performance
and no. of selfish nodes is inversely proportional to each other. In future
this relationship can also calculate through mathematical implementation.
7.
REFERENCE:-
1.
K.
Balakrishnan, “Prevention of Node selfishness in Mobile Ad Hoc Networks”, M.S.
Thesis, Department of EECS, Syracuse University, Syracuse, NY, USA, August
2004.
2.
S.
Buchegger and J-Y. Le Boudec, “Performance Analysis of the CONFIDANT Protocol:
Cooperation Of Nodes, Fairness In Dynamic Ad-hoc Networks”, Proc. of the
IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), June 2002.
3.
L.
Buttyan and J-P. Hubaux, “Enforcing
Service Availability in Mobile Ad-Hoc WANs”, Proc. of First IEEE/ACM Workshop
on Mobile Ad Hoc Networking and Computing (MobiHOC), August 2000.
4.
Y-C.
Hu, D. Johnson and A. Perrig, “SEAD: Secure Efficient Distance Vector Routing
for Mobile Wireless Ad Hoc Networks”, Proc. Of Fourth IEEE Workshop on Mobile
Computing Systems and Applications
(WMCSA), June 2002.
5.
J-P.
Hubaux, T. Gross, J-Y. Le Boudec, and M. Vetterli, “Toward Self-Organized
Mobile Ad Hoc Networks: The Terminodes Project”, IEEE Communications Magazine,
January 2001.
6.
M.
Jakobsson, J-P. Hubaux and L. Buttyan, “A Micropayment Scheme Encouraging
Collaboration in Multi-Hop Cellular Networks”, Proc. of Financial Crypto ,
January 2003.
7.
L.
Buttyan and J. Hubaux, “Stimulating cooperation in self-organizing mobile ad
hoc networks,” in Mobile Networks and Applications, vol. 8, no. 5, pp. 579–592,
October 2003,
8.
Sumer
Singh, Puneet Jain, Puneet Bindra, Chakshu Goel” Opnet based simulation and
performance analysis of AODV and GRP by varying no . of. Misbehavior nodes”
ijeted ,issue2,vol4, may2012
9.
Manoj
Kumar Mishra, Binod Kumar Pattanayak, Alok Kumar Jagadev, Manojranjan Nayak,” measure
of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach” IJCSI International
Journal of Computer Science Issues, Vol. 7, Issue 4, No 8, July 2010
10.
Kuldeep
Vats, Monika Sachdeva, Dr. Krishan Saluja," Simulation and performance
Analysis of OLSR, GRP, DSR Routing Protocol using OPNET”, International Journal
of Emerging trends in Engineering and Development. Issue 2, Vol.2, March-2012.
11.
Animesh
Kr Trivedi1, Rishi Kapoor1, Rajan Arora1, SudipSanyal1 and Sugata Sanyal ,
" RISM – Reputation Based Intrusion
Detection System for Mobile Adhoc Networks" Available from link profile.iiita.ac.in/aktrivedi_b03/rism.pdf.
12.
M.
Tamer Refaei, Vivek Srivastava, Luiz Da Silva, Mohamed Eltoweissy," A
Reputation-based Mechanism for Isolating Selfish Nodes in Ad Hoc
Networks", Proceedings of the Second Annual International Conference on
Mobile and Ubiquitous Systems: Networking and Services(MobiQuitous'05) , 2005
13.
Pietro
Michiardi and Refik Molva, "CORE: Acollaborative reputation mechanism to enforce node cooperation in
mobile ad hoc networks," Sixth IFIP conference on security communications,
and multimedia (CMS2002), Portoroz, Slovenia, 2002.
14.
Buchegger,
Sonja; Le Boudec, Jean-Yves, "Performance Analysis of Confidant Protocol:
Cooperation of Nodes -Fairness in Dynamic Ad-Hoc Networks," Proceedings of
IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC). IEEE, June
2002.
15.
Tiranuch
Anantvalee, Jie Wu: Reputation-Based System for Encouraging the Cooperation of
Nodes in Mobile Ad Hoc Networks”, Proceedings of International conference of Communications,
pp 3383-3388, 2007.
16.
Fei
Wang. Furong Wang, Benxiong Huang, Laurence T. Yang,” COSR: a reputation-based
secure route protocol in MANET “in Journal EURASIP Journal on Wireless Communications
and Networking - Special issue on multimedia communications over next
generation wireless networks archive Volume 2010, pp. 1-11, January 2010.
17.
Sameh
R. Zakhary and Milena Radenkovic ,“Reputation based security protocol for
MANETs in highly mobile disconnection-prone environments” in International conference
on Wireless On-demand Network Systems and Services (WONS), PP. 161 – 167, Feb.
2010.
18.
David
B. Johnson, David A. Maltz, V “The Dynamic Source Routing Protocol for Mobile
Ad Hoc Networks (DSR)", draftietf-manet-dsr-09.txt, 2003.
19.
C.
E. Perkins and P. Bhagwat” DSDV Routing over a multi-hopwireless network of
mobile computers AdHoc Networking Concepts “ page no.-53 69.
20.
T.
Wei Chen and Mario Gerlatobe - Global State Routing:” ANew Routing Scheme for
Ad-hoc Wireless Networks“ Computer Science Department, University of
California, Los Angeles
21.
G.
Pei, M. Gerla - Computer Science Department ,University of California, Los
Angeles and Tsu-Wei Chen – Bell Laboratories, Lucent Technologies–“Fisheye
State Routingin Mobile Ad Hoc Networks”.
22.
P.
Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, A. Qayyum, L. Viennot–“
Optimized Link State Routing Protocol for Ad Hoc Networks”, Hipercon Project,
INRIA Rocquencourt; BP 105, 78153 Le Chesnay Cedex, France.
23.
M.
Abolhasan, T. Wysocki, E. Dutkiewicz –“ A review of routing protocols for mobile ad hoc networks
“- Received 25March 2003; accepted 4 June 2003
Received on 26.02.2013 Accepted on 20.03.2013
Modified on 25.03.2013©A&V Publications all right reserved
Research J. Science and Tech 5(3): July- Sept., 2013 page 327-330