Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/1833006.1833038guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

The controversy of selfish nodes in ad hoc networks

Published: 07 February 2010 Publication History

Abstract

Currently, there are work related to selfish nodes in ad hoc mobile networks. In this paper, questions on the viability, validity, and presence of selfish nodes are raised and discussed. Various definitions and interpretations of the term "selfishness" are also presented, along with ways of determining and evaluating selfishness. In this paper, we introduce SCNP Selfish Check Negotiation Protocol to allow nodes to negotiate for collaboration whenever possible. We also discuss the "impact" of being selfish and unselfish, especially on collaborative applications, and network communication performance. We discuss the relationship of selfishness with security and denial of service. Finally, we compare the pros and cons between punishment-based and incentive-based approaches. The incentive-based approach is advocated since it encourages nodes to be less selfish and more cooperative. Cooperativeness is a necessity for supporting user communications and service provisioning in an ad hoc wireless network.

References

[1]
K. Paul and D. Westhoff, Context Aware Detection of Selfish Nodes in DSR based Ad-Hoc Networks. In Proceedings of IEEE Globecom, (2002)
[2]
S. Marti, T. Giuli, K. Lai, and M. Baker, Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In Proceedings of ACM Mobicom, (2000)
[3]
S. Buttyan, L. Hubaux and Jakobson, A Charging and Rewarding Scheme for Packet Forwarding in Muitihop Cellular Networks. In Proceedings ofACM Mobihoc, (2003)
[4]
S. Zhong, J. Chen, and Y. Yang, Sprite: A Simple, Cheat-Proof, Creditbased System for Mobile Ad Hoc Networks. In Proceedings of IEEE INFOCOM, (2003)
[5]
M. Hollick, J. Schmitt, C. Seipl, and R. Steinmetz, On the Effect of Node Misbehavior in Ad Hoc Networks. In Proceedings of IEEE ICC, (2004)
[6]
Y. Liu and Y R Yang, Reputation Propagation and Agreement in Mobile Ad Hoc Networks, In Proceedings ofIEEE WCNC, (2003)
[7]
P. Dewan, P. Dasgupta, and A. Bhattacharya, On Using Reputations in Ad Hoc Networks to Counter Malicious Nodes. In Proceedings of QoS & Dynamic Systems Workshop, (2004)
[8]
Y. Liu and Y. Yang, Reputation Propagation and Agreement in Mobile Ad Hoc Networks. In Proceedings ofIEEE WCNC, (2003)
[9]
S. Buchegger and J Boudec, The Effect of Rumor Spreading in Reputation Systems for Mobile Ad Hoc Networks. In Proceedings of WiOpt Workshop, (2003)
[10]
S. Soitanali, S. Pirahesh, S Niksefat, and M Sabaei, An Efficient Scheme to Motivate Cooperation in Mobile Ad Hoc Networks. In Proceedings of International Conference on Networking and Services, (2007)
[11]
S. Yokoyama, Y. Nakane, O. Takahashi, and E. Miyamoto, Evaluation of the Impact of Selfish Nodes in Ad Hoc Networks and Detection and Countermeasures Methods. In Proceedings of International Conference on Mobile Data Management, (2006)

Cited By

View all
  • (2018)Trust Based Intrusion Detection Technique to Detect Selfish Nodes in Mobile Ad Hoc NetworksWireless Personal Communications: An International Journal10.1007/s11277-018-5804-4101:4(2029-2052)Online publication date: 1-Aug-2018
  • (2012)Evaluation of collaborative selfish node detection in MANETS and DTNsProceedings of the 15th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems10.1145/2387238.2387266(159-166)Online publication date: 21-Oct-2012

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
ICACT'10: Proceedings of the 12th international conference on Advanced communication technology
February 2010
1712 pages
ISBN:9781424454273

Publisher

IEEE Press

Publication History

Published: 07 February 2010

Author Tags

  1. ad hoc networks
  2. selfish nodes
  3. selfishness

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 24 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2018)Trust Based Intrusion Detection Technique to Detect Selfish Nodes in Mobile Ad Hoc NetworksWireless Personal Communications: An International Journal10.1007/s11277-018-5804-4101:4(2029-2052)Online publication date: 1-Aug-2018
  • (2012)Evaluation of collaborative selfish node detection in MANETS and DTNsProceedings of the 15th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems10.1145/2387238.2387266(159-166)Online publication date: 21-Oct-2012

View Options

View options

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media