A performance comparison of multi-hop wireless ad hoc network routing protocols
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Ad hoc networking: an introduction
Ad hoc networking
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Securing ad hoc routing protocols
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
An on-demand secure routing protocol resilient to byzantine failures
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Secure ad hoc on-demand distance vector routing
ACM SIGMOBILE Mobile Computing and Communications Review
A Secure Routing Protocol for Ad Hoc Networks
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
Low Cost Attacks on Tamper Resistant Devices
Proceedings of the 5th International Workshop on Security Protocols
Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security
Secure Link State Routing for Mobile Ad Hoc Networks
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
Stimulating cooperation in self-organizing mobile ad hoc networks
Mobile Networks and Applications
Intrusion detection techniques for mobile wireless networks
Wireless Networks
Securing mobile ad hoc networks
The handbook of ad hoc wireless networks
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks
EUROMICRO-PDP'02 Proceedings of the 10th Euromicro conference on Parallel, distributed and network-based processing
A novel secure wireless video surveillance system based on Intel IXP425 network processor
WMuNeP '05 Proceedings of the 1st ACM workshop on Wireless multimedia networking and performance modeling
Cooperation monitoring issues in ad hoc networks
Proceedings of the 2006 international conference on Wireless communications and mobile computing
Improved security in geographic ad hoc routing through autonomous position verification
Proceedings of the 3rd international workshop on Vehicular ad hoc networks
Adaptive security design with malicious node detection in cluster-based sensor networks
Computer Communications
The performance of a watchdog protocol for wireless network security
International Journal of Wireless and Mobile Computing
On eliminating packet droppers in MANET: A modular solution
Ad Hoc Networks
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
A hierarchical architecture for detecting selfish behaviour in community wireless mesh networks
Computer Communications
Cross-layer approach to detect data packet droppers in mobile ad-hoc networks
IWSOS'06/EuroNGI'06 Proceedings of the First international conference, and Proceedings of the Third international conference on New Trends in Network Architectures and Services conference on Self-Organising Systems
Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks
Journal of Network and Computer Applications
Random feedbacks for selfish nodes detection in mobile ad hoc networks
IPOM'05 Proceedings of the 5th IEEE international conference on Operations and Management in IP-Based Networks
Evaluation of collaborative selfish node detection in MANETS and DTNs
Proceedings of the 15th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems
Secure scheme against data dropping
Proceedings of the 16th Communications & Networking Symposium
Socially-Competent Computing Implementing Social Sensor Design
International Journal of Web-Based Learning and Teaching Technologies
A Fast Model for Evaluating the Detection of Selfish Nodes Using a Collaborative Approach in MANETs
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node may exhibit is selfishness. A selfish node wants to preserve own resources while using the services of others and consuming their resources. One way of preventing selfishness in a MANET is a detection and exclusion mechanism. In this paper, we focus on the detection phase and present different kinds of sensors that can be used to find selfish nodes. First we present simulation results that show the negative effects which selfish nodes cause in MANET. In the related work section we will analyze some of the detection mechanisms proposed in literature so far. Our new detection mechanisms described next are called activity-based overhearing, iterative probing, and unambiguous probing. Simulation-based analysis of these mechanisms show that they are highly effective and can reliably detect a multitude of selfish behaviors.