International Journal of Application or Innovation in Engineering & Management... Web Site: www.ijaiem.org Email: ISSN 2319 – 4847

advertisement

International Journal of Application or Innovation in Engineering & Management (IJAIEM)

Web Site: www.ijaiem.org Email: editor@ijaiem.org

Volume 3, Issue 9, September 2014

ISSN 2319 – 4847

Detecting and Managing SelfishNodes over

MANET

1

Prof. Shobha Lolge,

2

Neha Baheti

Lecturer Department of Computer Engineering,

Lokmanya Tilak College of Engineering, Koparkhairane,

Navi Mumbai, India

A

BSTRACT

In wireless ad hoc networks, all nodes altogether cooperate to provide network services to users. Due to the limited bandwidth or communication range, data packets are forwarded through multiple medium of nodes before they reach the destinations. If a node always serves as a medium to transmit the packets, it may soon finish up its own energy and other resources constraints.

Therefore, some nodes behave using a selfish approach; they try to avoid forwarding the data packets. Such type of selfish behavior would often probably cause the network to break down. Selfish nodes are commonly occurred within ad hoc networks since they are managed by different resources. The performance of ad-hoc network gets degraded due to presence of selfish node which causes huge packet loss, decreased throughput, minimize data accessibility, increased query delay, high communication cost, low delivery ratio etc. In a mobile ad hoc network, the mobility behavior and resource constraints of mobile nodes may often lead to network partitioning or performance degradation. Many data replication techniques have been proposed to minimize performance degradation. Most of the nodes assume that all mobile nodes collaborate fully in terms of sharing their memory space. But in reality, however, some nodes may selfishly decide only partially to cooperate, or not at all, with other nodes. These selfish nodes could then decrease the overall data accessibility in the network. Here, we examine the impact of selfish nodes in a mobile ad hoc network from the view of replica allocation. We term this as selfish replica allocation. In particular, we have used a selfish node detection algorithm that considers partial selfishness and novel replica allocation techniques to properly cope with selfish replica allocation. The carried out simulations demonstrate the proposed approach outperforms traditional cooperative replica allocation techniques in terms of communication cost according to hop count, throughput, and packet delay and selfishness alarm.

Keywords: MANET, Node Selfishness, Replica allocation, Network efficacy

1.

I

NTRODUCTION

Advance researches and innovations in wireless communication technologies are mostly discussed in recent times and

MANET has attracted a lot of attention due to large variety of applications where installation of the infrastructure might be difficult. A MANET is peer-to-peer multihop mobile wireless network that neither have a fixed infrastructure nor a central server [1] that controls the network. Every node in a MANET acts as a router, and communicates with each other therefore it is also prone to issues such as network partitions causing some data often inaccessible to some of the nodes

[2].

The technical contributions are summarized as follows:

• Recognizing the selfish replica allocation problem: We view a selfish node in a MANET from the perspective of data replication, and conclude that selfish replica allocation can lead to degraded data accessibility in a MANET.

• Detecting the fully or the partially selfish nodes effectively: We devise a selfish node detection method that can measure the degree of selfishness.

• Allocating replica effectively: We propose a set of replica allocation techniques that use the self-centred friendship tree to reduce communication cost, along with achieving good data accessibility.

• Verifying the proposed strategy: The simulation results verify the efficacy of our proposed strategy.

2.

L

ITERATURE

R

EVIEW

Various algorithms have been proposed in recent years to solve the issue of selfish nodes in MANET. Each algorithm takes a different step towards the problem, but many of these algorithms are broken into three general categories that is reputation based, credit based and game theory based.

A.Reputation Based: Marti et al. [7] are the first one to introduce detection-based routing protocol enhancements for wireless ad hoc networks. They use a watchdog that finds out misbehaving nodes and a pathrater that helps routing protocols avoid these nodes. Buchegger and Le Boudec [8] propose a protocol, called CONFIDANT, to make misbehavior

Volume 3, Issue 9, September 2014 Page 31

International Journal of Application or Innovation in Engineering & Management (IJAIEM)

Web Site: www.ijaiem.org Email: editor@ijaiem.org

Volume 3, Issue 9, September 2014

ISSN 2319 – 4847

get unattractive. They include observation, detection and reaction mechanisms to a routing protocol to exclude uncooperative nodes present in the network. Michiardi and Molva [9] show a generic mechanism based on reputation to enforce cooperation among the nodes of a MA-NET to prevent selfish behavior. Every entity present in the network keeps track of other entities' collaboration using a technique called reputation. Simple service attacks are prevented by the collaboration technique.

B. Credit payment based: Buttyan and Hubaux [10] present a scheme to ensure cooperation among nodes in wireless ad hoc networks. They have introduced a virtual currency called Nuglet, which is used in the network to charge for the transmission of packets and to reward the forwarding process. Zhong et al. [11] make one of the first proposals, which utilizes rewards to encourage cooperation among nodes in wireless ad hoc networks. The authors suggest a virtual currency called Credits and a centralized account management via a Credit Clearance Service for all nodes. Chen et al. [12] propose an auction-based incentive scheme (called iPass) to enable cooperative packet forwarding behavior in MANET. Every flow pays the market price of packet for-warding service to the intermediate routers. The resource allocation method in iPass is based on the generalized Vickrey auction with reserve pricing.

C.Game theory based: Urpi et al. [3] develop a general mod-el which formally describes the characteristics of wireless ad hoc networks. Here they analyze different cooperation enforcement mechanism from the literature and propose a simple strategy resulting in equilibrium. This shows that in their model, cooperation is possible out of a node own selfinterest. Srini-vasan et al. [4] obtain same type of results. They make use of an algorithm based on the generous tit-for-tat

(GTFT) strategy. L. Anderegg et.al in [5] introduce a game-theoretic setting for routing in a wireless ad hoc network that consists of greedy, selfish agents who accept or demand payments for forwarding data for other agents if the payments cover their individual costs incurred by forwarding data. In this scenario, the authors propose Ad hoc-VCG, a routing protocol that achieves the de-sign objectives of truthfulness and cost-efficiency in a game theoretic sense by paying to the intermediate nodes a premium over their actual costs for forwarding data packets. Felegyhazi et al. [6] investigate whether cooperation can exist in wireless ad hoc networks without presence of incentive mechanisms. Here they propose a model based on game theory and graph theory to investigate equilibrium conditions for packet forwarding strategies in network. Their model is the first one to consider the network topology. Here they find that in theory conditions for cooperation out of own self-interest exist, but their simulation show that in actual these conditions are almost never satisfied and there will al-ways be nodes which need an incentive to cooperate.

3.

S

YSTEM MODEL

Node Behavior: There are three types of behavior states that a node can show from the viewpoint of selfish replica allocation .

 Type-1 node: The nodes are non-selfish nodes. These types of nodes hold replicas allocated by other nodes within the limits of their memory space.

 Type-2 node: The nodes are fully selfish nodes. These types of nodes do not hold replicas allocated by other nodes in the network, but allocate replicas to other nodes for their own accessibility.

 Type-3 node: The nodes are partially selfish nodes. These nodes use their memory space partially for replicas allocated by other nodes. Their memory space can be divided logically into two parts: selfish and public area.

These types of nodes allocate replicas to other nodes for their accessibility.

Presented novel approach measure the “degree of selfishness” to appropriately handle the partially selfish nodes.

Motivated by this concept of “partial selfishness,” this process borrows the term of credit risk (CR) from economics to detect selfish nodes. To avoid the replica allocation, the process use the method of Self-Centered Friendship tree (SCFtree) and its variation (SCF-DS) and (SCF-CN). SCF-tree based replica allocation technique is to achieve good data accessibility with low communication cost in the presence of selfish nodes. Since proposed replica allocation technique appropriately handles the (partially) selfish nodes, the technique is being expected to achieve the objective. After the SCFtree is built, a node allocates replica at every relocation period. Every node asks non selfish nodes present within its SCFtree to hold replica when it is not able to hold replica in its own local memory space present. Since the SCF-tree based replica allocation is performed in a fully distributed manner, replica allocation is determined by each node individually without any communication with other nodes. The approach proposed here is applied in following four steps

1.

Detecting selfish node

2.

Update selfish node

3.

Building SCF tree

4.

Allocating replica

Volume 3, Issue 9, September 2014 Page 32

International Journal of Application or Innovation in Engineering & Management (IJAIEM)

Web Site: www.ijaiem.org Email: editor@ijaiem.org

Volume 3, Issue 9, September 2014

DETECTING SELFISH NODE

ISSN 2319 – 4847

This algorithm describes how to detect selfish nodes. A selfish node may share part of its own memory space, or a small number of data items. The node-specific features can be used to represent the expected value of a node.

UPDATE SELFISH NODE

In the query processing-specific feature, we utilize the value of selfishness alarm which is the ratio of data request being not served by the expected node due to selfishness in its memory space. Query processing-specific feature can represent the expected risk of a node. To effectively identify the expected node should know the (expected) status of other nodes’ memory space.

BUILDING SCF TREE

The novel replica allocation techniques can allocate replica without discussion with other nodes present in network, as it happens in a human friendship management, traffic overhead will decrease. Using SCF tree we can differentiate the selfish nodes and partial selfish nodes.

ALLOCATING REPLICA

First, set of ordered data items are allocated. The ID of the data items is stored in descending order of access frequency.

Each node allocates replicas in descending order of its own access frequency. Each node executes this algorithm at every relocation period after its own SCF-tree is built. Initially, a node determines the priority for allocating replicas. The priority for allocating replicas is based on Breadth First Search (BFS) order of the SCF-tree.

Figure 1. The System Block Diagram

5.

SIMULATION ENVIRONMENT

Performance Metrics:

 Communication Cost: This is the measure of total hop count of data transmission for selfish node detection and replica allocation/relocation, and their involved information sharing.

 Throughput: It the average rates of successful message delivery over a communication channel.

 Packet delay: Total delay added by intermediate node during transmission.

 Packet Delivery Ratio: Ratio of total number of received packet to total number of sent packets.

 Energy Consumption: Energy utilization decreases with time as the selfish nodes are detected and removed.

Volume 3, Issue 9, September 2014 Page 33

International Journal of Application or Innovation in Engineering & Management (IJAIEM)

Web Site: www.ijaiem.org Email: editor@ijaiem.org

Volume 3, Issue 9, September 2014

ISSN 2319 – 4847

Volume 3, Issue 9, September 2014 Page 34

International Journal of Application or Innovation in Engineering & Management (IJAIEM)

Volume 3, Issue 9, September 2014

6.

C

ONCLUSION

Web Site: www.ijaiem.org Email: editor@ijaiem.org

ISSN 2319 – 4847

The presented approach is having advantage as it minimizes the duplication of data items in a group to achieve high data accessibility. It reduces the communication cost, along with achieving good data accessibility. This process is used to reduce query delay. Each node detects selfishness in nodes and makes replica allocation at its own decision, without forming any group or engaging in lengthy discussions.

References

[1.] P. Padmanabhan, L. Gruenwald, A. Vallur, and M. Atiquzzaman, “A Survey of Data Replication Techniques for

Mobile Ad Hoc Network Databases,” The Int’l J. Very Large Data Bases, vol. 17, no. 5, pp. 1143-1164, 2008.

[2.] B.-G. Chun, K. Chaudhuri, H. Wee, M. Barreno, C.H. Papadimitriou, and J. Kubiatowicz, “Selfish Caching in

Distributed Systems: A Game-Theoretic Analysis,” Proc. ACM Symp. Principles of Distributed Computing, pp. 21-

30, 2004.

[3.] A.Urpi, M.Bonuccelli, and S.Giordano, “Modeling cooperation in mobile ad-hoc networks: A formal description of selfishness”, Proc. of Modeling and Optimal in Moile, Ad Hoc and Wireless Networks, April 2003.

[4.] N.B. Salem, L. Buttyyan, J.P. Hubaux, and M. Jakobsson, “A Charging and Rewarding Scheme for Packet

Forwarding in Multi-hop Cellular Networks”, Proc. of MobiHoc, June 2003.

[5.] L. Anderegg and S. Eidenbenz, “Ad hoc-VCG: a Truthful and Cost-Efficient Routing Protocol for Mobile Ad hoc

Networks with Selfish Agents”, Proc. Of Mobicom, September 2003.

[6.] M. Felegyhazi, L. Buttyan, and J.P.Hubaux, “Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad

Hoc Networks- the static Case”, Proc. of Personal Wireless Communication, October 2003.

[7.] S. Marti, T.J. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks”, Proc. of

Mobicom, August 2000.

[8.] S. Buchegger, J.-Y. Le Boudec, “Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes -

Fairness In Distributed Ad-hoc NeTworks”, Proc. of MobiHoc, June 2002.

[9.] P. Michiardi and R. Molva, “Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks”, Proc. of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia

Security: Advanced Communications and Multimedia Security, pp.107-121, September 2002.

[10.] L. Buttyan and J.P. Hubaux, “Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad

Hoc Networks”, Technical Report No. DSC/2001/001, Swiss Federal Institute of Technology (EPFL), January 2001.

[11.] S. Zhong, J. Chen, and Y.R. Yang, “Sprite: A Simple, Cheat-Proof, Credit Based System for Mobile Ad-Hoc

Networks”, Proc. of IEEE INFOCOM, April 2003.

[12.] K. Chen and K. Nahrstedt, “iPass: an Incentive Compatible Auction Scheme to Enable Packet Forwarding Service in

MANET”, Proc. of the 24th International Conference on Distributed Computing Systems, March 2004.

Volume 3, Issue 9, September 2014 Page 35

Download