ISSN ONLINE(2278-8875) PRINT (2320-3765)

All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Handling Selfishness in MANETs – A Survey

Gayathry S S1, R N Gaur2
  1. PG Student [Wireless Technology], Dept. of ECE, Toc H Institute of Science and Technology, Kochi, India
  2. Professor, Dept. of ECE, Toc H Institute of Science and Technology, Kochi, India
Related article at Pubmed, Scholar Google

Visit for more related articles at International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering

Abstract

A mobile ad hoc network (MANET) is an infrastructure-less network with self-configuring capability of mobile nodes connected wirelessly. In mobile ad hoc network, some nodes may selfishly decide only to cooperate partially, or not at all, with other nodes. These selfish nodes could then reduce the overall data accessibility in the network along with an increase in query delay. In the past, many people have worked on this selfish node problem, and proposed several methods to detect these selfish nodes. This paper provides a survey on different methods used to detect selfish nodes in MANETs. It also provides an overview on data replication in a mobile adhoc network, andcertain methods to handle selfishness occurring in this replica allocation process. It is being proposed to use a combined credit risk and collaborative watchdog method to improve the network performance by detecting such selfish nodes within a reduced time period.

Keywords

MANETs, Selfish nodes, Replica allocation, Credit risk method, Watchdog method, Combined credit risk and watchdog method

INTRODUCTION

Mobile AdHoc networks (MANETs) or simply adhoc networks, comprise of nodes that move freely and dynamically selforganize into arbitrary and temporary network topology without any fixed infrastructure support. In a mobile ad hoc network, the mobility and resource constraints of mobile nodes may lead to network partitioning or performance degradation.The mobile nodes that are in radio range of each other can directly communicate, whereas others need the help of intermediate nodes to route their packets.
In MANET, each node acts as a router [2]. These nodes in the network are responsible for discovering a path to a particular node and forward the data to that node. Since the nodes in the network are capable of moving, the infrastructure of network will change rapidly.Dynamic topology of MANETs may result innetwork partition. When network partition occurs,mobile nodes in one network are not able toaccess data hosted by nodes in other network. Each node in the MANET will do forward the data to other node but some nodes will not forward the data packet to other nodes, and so they are called as selfish nodes. This selfish behavior of the network nodesmay lead to decrease in data accessibility or the performance the network. As the performance of MANETs highly depends on collaboration of all nodes, detection of selfish node is an essential task.
The existence of selfish nodes in a network results in a considerable decrease in the data accessibility, but the delay time will get increased. It is very important to prevent the deterioration of data accessibility at the point of network partition.So, there is a need to detect and eliminate these selfish nodes.
The organization of this paper is as follows. The following section II describes the behavioral modes of nodes in MANETs. Section III gives out different methods to detect selfish nodes in these networks. The next section describes data replication process and the methods to detect selfish nodes in replica allocation. The paper ends with an outlook on a fast and efficient method to handle selfishness problem in MANETs.

RELATED WORK

NODE BEHAVIOURALMODEL

MANETs are mobile wireless networks that are rapidly changing, unpredictable and have no fixed base stations or infrastructure design. There are two types of MANETs: closed and open MANETs. In a closed MANETs, all nodes participate and organize the network. In an open MANET, different mobile nodes with different goals hesitate to share their resources. In this case, selfish nodes are originated.These nodes will not be willing to forward packets and share their memory space for the benefit of other nodes [2]. The nodes in a mobile adhoc network can be classified into three types, such as:
• Non-selfish nodes: These nodes allocate their memory space completely for the purpose of other nodes.
• Fully selfish nodes: They never utilize their memory space for other nodes to store data.
• Partially selfish nodes: These nodes may act as both selfish and non-selfish nodes. Since they have a selfish behavior, they have to be considered as selfish; rather than non-selfish. The detection of these partially selfish nodes is complex.
The major characteristics of selfish nodes include the following:
• Do not participate in routing process
• Do not reply or send hello messages
• Intentionally delay the RREQ packet
• Dropping of data packet

SELFISH NODE DETECTION METHODS

A. 2ACK METHOD
The acknowledgement-based 2ACK scheme is suggested to mitigate the adverse effects of misbehaving nodes. The basic idea of TWOACK scheme is that, when a node forwards a data packet successfully over the next hop, the next-hop-link’s destination node will send back a special two-hop acknowledgment called 2ACK to indicate that the data packet has been received successfully. The 2ACK scheme is a network-layer technique to detectmisbehaving links and to mitigate their effects. It can be implemented as an add-on to existing routing protocols for MANETs, such as DSR. The 2ACK scheme detects misbehavior through the use of a new type of acknowledgment packet, termed 2ACK. A 2ACK packet is assigned a fixed route of two hops (three nodes) in the opposite direction of the data traffic route [12].
B. S-2ACK METHOD
Another acknowledgement-based scheme, termed as S-TWOACK is a derivative of the basic TWOACK scheme, aimed at reducing the routing overhead and achieves the performance improvement along with the problem of false-alarms due to genuine TWOACK packets lost. The Selective TWOACK (S-TWOACK) scheme is different from 2ACK. Mainly, each TWOACK packet in the S-TWOACK scheme acknowledges the receipt of a number of data packets, but a 2ACK packet in the 2ACK scheme only acknowledges one data packet. With such a change, the 2ACK scheme has easier control over the trade-off between the performance of the network and the cost as compared to the S-TWOACK scheme[12].
C. SECURE INTENSIVE PROTOCOL(SIP)
Secure Intensive Protocol is a credit-based method that uses the credit as the incentive to stimulatepacket forwarding. Here each mobile node has a security module and they deal with the security related functions. The credits of the node increases and decreases depending on the forwarding behaviorof the node. Whenever a node is initiating or forwarding a packet, first node will pass it to SIPmodule for processing. SIP is session based and consists of four phases, 1) Session Initiation 2) Session Key Establishment 3) Packet Forwarding And 4) Rewarding Phase. The advantages of the scheme are SIP is routing independent; it is session based rather than packet based; unauthorized access is not allowed. The disadvantage of SIP is that it implemented on hardware module so each node shouldpossess a hardware module[13].
C. CONFIDANT METHOD
The reputation-based CONFIDANT(Cooperation of Nodes, Fairness in Dynamic Ad Hoc Networks) method will detect the misbehavior nodes by monitoring the behavior of neighbor nodes and they will pass this information to all other nodes. The misbehavior node will not be punished as a result.Monitoring System, Reputation System, Trust Manager and Path Manager are the four modules involved in this CONFIDANT protocol, each having a specific task to perform. CONFIDANT protocol is an expansion of DSR protocol. Increase in throughput andlow overhead of extra message are major advantages of this protocol but it has a disadvantage is that, the node authentication is not checked [15].
D. CORE METHOD
The reputation-based CORE (Collaborative Reputation) Mechanism to detect the selfish nodes, improves the coordination among nodes. For this purpose, it makes use of reputation mechanism and collaborative monitoring. The basic components used in the CORE mechanism are 1) reputation table and 2) watchdog mechanism. The CORE mechanism will prevent the DOS attacks, it is impossible for a node to decrease another node’s reputation maliciously because there is no negative rating spread between nodes. The CORE suffers from spoofing attacks, it cannot prevent colluding nodes from distributed negative reputation [15].
E. AD-HOC VCG
Ad hoc-VCG,named afterVickrey, Clarke, and Groves is a Truthful and Cost-Efficient reactive routing protocol for mobile ad hoc networks that is robust against individual selfishness of the communication nodes and is cost-efficient. This protocol first computes the most cost-efficient path and then routes the data packets from source to destination along this path. Ad hoc-VCG consists of the following two phases such as:-1) Route discovery 2) Data transmission. Route discovery includes payment computation whereas data transmission includes the act of making payments to the intermediate nodes. Ad hoc- VCG utilizes shortest path information to the destination node as in the case of DSR protocol. It is identical to credit-payment technique in which each node gives a credit to others, as a reward for data forwarding.This credit acquired is then used to send data to the others [4].

DATA REPLICATION IN MANETS

In mobile ad hoc networks (MANETs), since mobile nodes move freely, networkpartition may occur, where nodes in one partition cannot access data held by nodes in otherpartitions. Thus, data availability (i.e., the number of successful data accesses over the totalnumber of data accesses) in MANETs is lower than that in conventional wired networks. Datareplication has been widely used to improve data availability in distributed systems, and we willapply this technique to MANETs. By replicating data at mobile nodes which are not the ownersof the original data, data availability can be improved because there are multiple replicas in thenetwork and the probability of finding one copy of the data is higher. Also, data replication canreduce the query delay since mobile nodes can obtain the data from some nearby replicas.However, most mobile nodes only have limited storage space, bandwidth, and power, and henceit is impossible for one node to collect and hold all the data considering these constraints [7].
image
image
In Fig 1, if the radio link between two mobile hosts at the central part isdisconnected, the mobile hosts in the left-hand side and those in the right-hand side cannotaccess data items D1 and D2 respectively. In ad hoc networks, it is a very important issue toprevent deterioration of data accessibility at the point of network division. A possible solution isby replicating data items at mobile hosts which are not the owners of the original data. InFig 1, if the replicas of data items D1 and D2 are allocated at one of the mobile hosts in theopposite networks as shown in Fig 2, every mobile host can access both data items after thenetwork division.

REPLICA ALLOCATION METHODS

This section describes certain methods to allocate data replicas; in networks influenced by selfish nodes.
A. SAF METHOD
In SAF (Static Access Frequency) method, the nodes allocate replica of data items according to the access frequencies of that data items. Thus, this method allocates replicas with low overhead and low traffic. Mobile nodes with the same access frequencies to data items allocate the same replicas.A mobile node can access data items held by other connected mobile hosts, and it is more possible to share different kinds of replica among them. The SAF method causes low data accessibility when many mobile hosts have the similar access characteristics hence some of the data items to be duplicated in many nodes.
image
Fig 3 shows SAF method of replica allocation. In this, M1, M2 etc. are mobile nodes and thestraight lines between them denotes a wireless link. D1, D2 etc. are data items. The gray rectangles indicate original data, whereas the white indicates replicas allocated.
B. DAFN METHOD
The DAFN (Dynamic Access Frequency and Neighborhood)method was introduced in order to overcome the problem of replica duplication in the SAF method.In DAFN method, each mobile host first broadcasts both its id and access frequency at relocation period. The replicas will be allocatedin the same way as that of SAF method.Then, if there is replica duplication of a data item between two neighboring mobile hosts, the mobile host with the lower access frequency to the data item changes the replica to another replica.The node having high access frequency will store its replica,if two mobile nodes have the same data item.At each relocation period, the mobile nodes exchange information about replicas allocated in the memory space. So the overhead and the traffic are high compared with the SAF method.
image
Fig 4 shows DAFN method in which replica duplication of the data item, D8 takes place between ;M2 and M4,also duplication of D8 between M3 and M4, and also D7 between ;M4 and ;M5. Moreover, if the network topology changes during the execution of this method, the replica relocation cannot be done at mobile hosts over disconnected links.
C. DCG METHOD
Differing from the DAFN method that shares replicas among neighboring nodes, the DCG(Dynamic Connectivity and Grouping)method shares replica of data items in several groups of mobile nodes.The DCG method creates groups of mobile nodes that are bi-connected in an ad hoc network. The group is not being divided even if one mobile node is disconnected from the network. This DCG methodprovides high data accessibility and stability over nodes since many kinds of replicas can be shared. The network topologychanges rapidly during the execution of this method since it consists of three steps, such as 1) broadcasting host identifiers, 2) determining the replica allocation, and 3) notifying it to all hosts in the group, that makes this method to take the longest time among the three methods to relocate replicas. Here, the replica relocation cannot be done over disconnected links. Moreover, both the overhead and traffic are higher than the other two methods because,during each relocation period, mobile hosts exchange information and relocate replicas in a wide range.
image
Fig 5 shows DCG method in which two groups G1 and G2 are created containing some mobile nodes. In this method, each mobile node broadcast its host id and its access frequency along with data items to other nodes. By using the broadcasting information every node identifies its bi-connected nodes. The access frequency of each group is calculated by adding the access frequencies of all the mobile nodes in that group. According to the overall access frequency of the group, replicas of data items are allocated till the memory of all mobile nodes in the group becomes full.
D. SCF-TREE BASED METHOD
With the measured degree of selfishness, a tree represents relationships among nodes in a MANET for replica allocation, called as SCF-tree. The SCF-tree resembles human friendship management in the real world. The SCF-tree-based replica allocation technique highlights because it can reduce the communication cost, with a considerable achievement on high data accessibility.
image
Fig 6(a) shows a sample topology including 6 nodes and Fig 6(b) illustrates the SCF-trees of N1 and N2. The SCF-tree may have multiple routes for some nodes from the root node, but the shortest path will be selected. At every relocation period, each node updates its own SCF-tree based on the network topology at that moment.

HANDLING SELFISHNESS IN REPLICA ALLOCATION OVER MANETS

A. CREDIT RISK METHOD
This SCF-tree based credit risk method is found to be the best among the other aforementioned replica allocation methods to handle selfish nodes [19].Each node detects selfishness and makes replica allocation at its own discretion, without forming any group so it reduces overhead. This method includes 3 steps;
• Detecting selfish nodes:
Each host detects the selfish nodes dependingupon credit risk scores. The credit risk can be calculated as,
Credit Risk= Expected risk/ Expected value
The CR score is updated accordingly during the query processing phase by measuring the degree of selfishness. A node wants to know if another node is believable, in order to share a memory space in a MANET.
• Building SCF-tree:
Each node makes its own topology graph and constructs its own SCF-tree by excluding selfish nodes. The SCF-tree based replica allocation techniques are inspired by human friendship management in the real world, where each person makes his/her own friends forming a web and manages friendship by himself/herself. He/she does not have to discuss these with others to maintain the friendship. The decision is solely at his/her discretion.
• Allocating replica effectively:
According to SCF-tree, each node allocates replica in a distributed manner. After building the SCF-tree, a node allocates replica at every relocation period. Each node asks non-selfish nodes within its SCF-tree to hold replica when it cannot hold replica in its local memory space. Since the SCF-tree based replica allocation is performed in a fully distributed manner, each node determines replica allocation individually without any communication with other nodes.
B. COLLABORATIVE WATCHDOG METHOD
Watchdog systems overhear wireless traffic and analysesit to decide whether neighbor nodes are behaving in a selfishmanner and also detects the selfish nodes in the networks. The nodes other than the selfish nodes in the network can be called as collaborative nodes. Collaborative watchdog indicates the presence of the selfish node to the source node. The source node then broadcasts the selfish information to all other nodes. When the watchdog detects a selfish node, it is marked as a positive detection (or a negativedetection, if it is detected as a non-selfish node) or noinfowhen dissatisfying both the above. This approach reduces the detection time and improves the precision by reducing the effect of both false positives and false negatives [3] [10].
image
Infigure 7, initially it is assumed that there is onlyone selfish node. At this stage, no node has information about the selfish node. When a node detects a selfish node using its watchdog, it is marked as a positive, and if it is detected as a non-selfish node, it is marked as a negative. Later on, when this node contacts another node, it can transmit this information to it. So, from this stage, both nodes store information about this positive (or negative) detection. Therefore, a node can become aware about selfish nodes directly (using its watchdog) or indirectly, through the collaborative transmission of information that is provided by other nodes. This collaborative approach reduces the time and increases theprecision when detecting selfish nodes.
image
Fig 8 illustrates the graphical representation of the detection time of both SCF-tree based credit risk method and the collaborative watchdog method. It is clear that watchdog method takes much less time to detect the same selfish nodes.
C. COMBINED CREDIT RISK AND WATCHDOG METHOD
We applied the credit risk method to detect the selfish nodes and also proposed the collaborative watchdog method to reduce the detection time of those nodes [1] [21]. Every node in a MANET calculates credit risk information on other connected nodes individually so that it is used to measure the degree of selfishness. And then SCF-tree has been constructed with the backup of this credit-risk information. Since the various traditional replica allocation techniques, as described in section V were failed to consider the selfish nodes; in this paper, we propose the combined credit risk and watchdog methodto handle selfishness in replica allocation effectively.The combined credit risk and watchdog method works as follows:
• Recognizing the selfish replica allocation problem.
• Detecting the fully or the partially selfish nodes effectively.
• Applying collaborative watchdog method.
• Allocating replica effectively.
Finally, the credit risk method incorporates watchdog mechanism in it before building the SCF-tree to detect the selfishness in mobile adhoc networks fastly and effectively. This method includes the advantages of both credit risk method and watchdog method. Thus, the combination of credit risk and watchdog methods improves the data accessibility, reduces communication cost and average query delay and to improve the accuracy of watchdogs in the collaborative methodand also to reduce thedetection time.

CONCLUSION

This survey paper considers various methods to handle selfish nodes in MANETs. It deals with traditional replica allocation methods such as SAF, DAFN and DCG methods. From the above survey, we understood that SCF-tree based technique is the best among the above mentioned replica allocation techniques, and a combination of this credit risk and watchdog method detects the selfish nodes within much less amount of time.The proposed methodimproves the data accessibility, reduces communication cost and average query delay and also to reduce thedetection time and to improve the accuracy of watchdogs in the collaborative method.Detecting the false alarms in this technique can be considered as a future work.

References