Selfish Node Detection in Wireless Networks

Authors

  • D Nivetha Department of ECS, ARJ College of Engineering and Technology, Edayarnatham, India
  • D Karthika Department of ECS, ARJ College of Engineering and Technology, Edayarnatham, India

DOI:

https://doi.org/10.26438/ijcse/v5i7.2831

Keywords:

MANETs, Selfish Node, Node Misbehavior, Detection

Abstract

Mobile ad-hoc networks (MANETs) relies on upon network participation plans to work legitimately. It expects that mobile node deliberate participate so as to work appropriately. By and by, if nodes have a selfish conduct and are unwilling to participate, the general network execution could be genuinely degraded. The proposed framework builds up a homomorphic straight Authenticator based upon examining design that enables the identifier to confirm the honesty of the bundle misfortune data detailed with nodes. In this manner, by recognizing the correlations between lost bundles, one can choose whether the parcel misfortune is absolutely because of normal connection blunders, or is a consolidated impact of connection mistake and selfish node. In our project we have proposed an efficient method for detecting a selfish node which takes into account the various factors like the battery capacity of a node, power consumption in transmitting packets and to overcome the presence of selfish nodes. In this framework consists of degree of intrinsic selfishness (DeIS) and the degree of extrinsic selfishness (DeES). Under the distributed node-selfishness management, a path selection criterion is designed to select the most reliable and shortest path in terms of RNs’. The theoretical analysis and results show that the proposed model has better probability and efficiency.

References

B. Swetha, D.B. Rao, P.N. Rao, "Intelligent Anti-Theft Finding Scheme Towards Itrust Establishment in Delay Tolerant Networks Using VANET", International Journal of Computer Sciences and Engineering, Vol.2, Issue.9, pp.50-56, 2014.

J.Li, Q.Yang, and K.S.Kwak, “Neural-network based optimal dynamic control of delivering packets in selfish wireless networks,” IEEE Commun. Lett. vol.19, no.12, pp.2246–2249, Dec.2015.

H.Jiang and W.Zhuang, “Cross-layer resource allocation for integrated voice/data traffic in wireless cellular networks,” IEEE Trans. Wireless Commun., vol.5, no.2, pp.457–468, Feb.2006.

F.Bao, I.Chen, M.Chang, and J.Cho, “Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection,” IEEE Trans. Netw. Serv. Manage., vol.9, no.2, pp.169–183, Jun.2012.

Shanmugapriya R. “Parallel Networks For Enhancing And Efficient Delay Bounds Based Trust Management”, International Journal of Applied Engineering and Technical Research-IJAETR. Vol.1, Issue.1,pp.1-9, 2017.

S. Jain, "Black Hole Attack in Delay Tolerant Networks: A Survey", International Journal of Computer Sciences and Engineering, Vol.2, Issue.4, pp.172-175, 2014.

H. Zhu, X. Lin, and R. Lu, “SMART: A secure multilayer credit based incentive scheme for delay-tolerant networks,” IEEE Trans. Veh. Technol., vol.58, no.8, pp.4628–4639, Oct.2009.

P.Kyasanur and N.F.Vaidya, “Selfish MAC layer misbehavior in wireless networks,” IEEE Trans. Mobile Comput., vol.4, no.5, pp.502–516, Sep.2005.

Z.Ji and K.J.R.Liu, “Multi-stage pricing game for collusion-resistant dynamic spectrum allocation” IEEE J.Sel.Areas Commun., vol.26, no.1, pp.182–191, Jan.2008.

Y.Rebahi, V.E.Mujica-V, and D.Sisalem, “A reputation-based trust mechanism for ad hoc networks,” in Proc. IEEE Symp. Comput. Commun. Jun.2005, pp.37–42.

C.E.Perkins, E.M.Royer, S.R.Das, and M.K.Marina, “Performance comparison of two on-demand routing protocols for ad hoc networks,” IEEE Pers. Commun., vol.8, no.1, pp.16–28, Feb.2001.

Y.Xiao and H.Li, “Voice and video transmissions with global data parameter control for the IEEE 802.11e enhance distributed channel access”, in IEEE, vol.15, issue.11, pp.1041–1053, Nov.2004.

M.v.d. Schaar, Y.Andreopoulos, and Z.Hu, “Optimized scalable video steaming over IEEE 802.11a/e HCCA wireless networks under delay constraints”, in IEEE, vol.5, issue.6, pp.755–768, Jun 2006.

R.Dai, P.Wang, and I.F.Akyildiz, “Correlation-aware QoS routing with differential coding for wireless video sensor networks”, in IEEE, vol.14, issue.5, pp.1469–1479, Oct.2012.

Downloads

Published

2025-11-11
CITATION
DOI: 10.26438/ijcse/v5i7.2831
Published: 2025-11-11

How to Cite

[1]
D. Nivetha and D. Karthika, “Selfish Node Detection in Wireless Networks”, Int. J. Comp. Sci. Eng., vol. 5, no. 7, pp. 28–31, Nov. 2025.

Issue

Section

Research Article