CFP last date
22 April 2024
Reseach Article

Modeling, Implementation and Performance Analysis of Selfish Behavior in Enhanced Selfish- DSR Routing Protocol of MANET

by Rooshabh Kothari, Deepak Dembla
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 66 - Number 23
Year of Publication: 2013
Authors: Rooshabh Kothari, Deepak Dembla
10.5120/11282-6555

Rooshabh Kothari, Deepak Dembla . Modeling, Implementation and Performance Analysis of Selfish Behavior in Enhanced Selfish- DSR Routing Protocol of MANET. International Journal of Computer Applications. 66, 23 ( March 2013), 47-54. DOI=10.5120/11282-6555

@article{ 10.5120/11282-6555,
author = { Rooshabh Kothari, Deepak Dembla },
title = { Modeling, Implementation and Performance Analysis of Selfish Behavior in Enhanced Selfish- DSR Routing Protocol of MANET },
journal = { International Journal of Computer Applications },
issue_date = { March 2013 },
volume = { 66 },
number = { 23 },
month = { March },
year = { 2013 },
issn = { 0975-8887 },
pages = { 47-54 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume66/number23/11282-6555/ },
doi = { 10.5120/11282-6555 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:23:15.632289+05:30
%A Rooshabh Kothari
%A Deepak Dembla
%T Modeling, Implementation and Performance Analysis of Selfish Behavior in Enhanced Selfish- DSR Routing Protocol of MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 66
%N 23
%P 47-54
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The key confront in Mobile Ad hoc Network (MANET) is its dynamic nature, which itself carries security measures. The Mobile Ad hoc Network is multi-hop in nature where nodes are required to perform communication activity for end to end connectivity which is being used for transferring data packets and thereby spending its resources. A selfish node is one that tries to consume the network resources for its own benefit but is unwilling to spend its own resource for others. If such selfish behavior continues among nodes in network, it may be harmful for network by creating disorder. In this paper, Proposed ES-DSR (Enhanced Selfish DSR) is implemented on NS-2 and results shown significant improvement over original DSR in terms of performance evaluation of network. In proposed protocol, as mobility increases, there is significant decrease in communication overhead that is almost about 50% than DSR protocol which is one of the main beneficial point of our proposed protocol and also as speed increases end to end delay is also decreases almost 35% than DSR, Throughput is also increasing but marginally compared to DSR protocol and packet delivery ratio is also increasing due to less no. of connection breakage between nodes .So by experimental results it is found that in dense mobile ad hoc networks where route breakage is frequent and also communication overhead increases in DSR. But, by selfish behavior of some nodes in proposed protocol communication overhead reduces. Because of high density the negative effect of selfish nodes reduces overheads in ES-DSR and is also indirectly results in saving nodes battery power also. In this paper it has been proved that security attacks are somewhat beneficial to mobile adhoc network.

References
  1. Rooshabh Kothari and Deepak Dembla ,”Implementation of Black Hole Security Attack using Malicious Node for Enhanced - DSR Routing Protocol of MANET”, International Journal of Computer Application(IJCA),Vol.64, No.18, pp 1-8, February 2013
  2. Shailender Gupta, C. K. Nagpal and Charu Singla,” Impact of Selfish node concentration in MANETs” ,International Journal of Wireless & Mobile Networks (IJWMN) Vol. 3, No. 2 pp 29-37 , April 2011
  3. Shin Yokoyama, Yoshikazu Nakane, Osamu Takahashi and Eiichi Miyamoto,"Evaluation of the Impact of Selfish Nodes in Ad Hoc Networks and Detection and Countermeasure Methods,” Proceedings of the 7th International Conference on Mobile Data Management (MDM'06) pp 95, IEEE 2006
  4. Mahesh Kumar Yadav, Ram Kishan Khola and Deepak Dembla, “ Modeling, Analysis & Implementation of Improved AODV Routing Protocol in MANETs, International Journal of Computer Applications(0975-8887) Volume 41-No.21 pp 37-42 ,September-2012
  5. Deepak Dembla, Dr.Yogesh Chaba, “Modeling and Analysis of an intelligent AODV Routing Protocol based on Route Request Retransmission Strategy in MANETs”, International Journal of Computer Applications (0975-8887) Volume 30-No.11 pp 6-13, September-2011
  6. G.Lavanya, A. Ebenezer Jeyakumar,” An Enhanced Secured Dynamic Source Routing Protocol for MANETS”, International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume X, Issue-4 pp 135-140, September 2011
  7. Hemang Kothari and Manish Chaturvedi, “Effect of Selfish behavior on power consumption in mobile Adhoc Network”, Proceedings of the Asia-Pacific Advanced Network 2011 v. 32, pp . 91-100, APAN-2011
  8. RajenderNath, Pankaj Kumar Sehgal, Atul Kumar Sethi, “Effect of Routing Misbehavior in Mobile Ad Hoc Network” ISBN 978-1-4244-4791-6/10, IEEE 2010.
  9. Abdelaziz Babakhouya, Yacine Challal, Abdelmadjid Bouabdallah,” A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks”, “NGMAST/Workshop on Mobile Security, Europe (2008)"
  10. N.Bhalaji, Dr.A.Shanmugam,”Association between nodes to combat black hole attack in DSR based MANET”, 978-1-4244-3474-9/09/ pp 403-407, IEEE 2009
  11. Dinesh Mishra1, Yogendra Kumar Jain, Sudhir Agrawal,” Behavior Analysis of Malicious Node in the Different Routing Algorithms in Mobile Ad Hoc Network (MANET)”, 978-0-7695-3915-7/ pp 621-623 , IEEE 2009
  12. Abdul-Aziz Babakhouya, Yacine Challal, Abdelmadjid Bouabdallah,”A Simulation Analysis of Routing Misbehavior in Mobile Ad Hoc Networks”,pp 592-597, IEEE 2008,
  13. L. Abusalah, A. Khokhar, M. Guizani, "A survey of secure mobile Ad Hoc routing protocols," IEEE Communications Surveys & Tutorials,vol. 10, no. 4, pp. 78-93, IEEE 2008
  14. D.Johnson, Y. Hu, and D. Maltz, "The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4", RFC 4728, 2007.
  15. B. Wu, J. Chen, J. Wu, and M. Cardei, “A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks in Wireless/Mobile Network Security”, Springer 2008.
  16. Mon Bo Su, Xiao Hannan, A. Adereti, J. A. Malcolm, B. Christianson, “A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack”, Proc. of Third International Symposium on Information Assurance and Security, ‘IAS 2007’, pp. 50-55, Aug. 2007.
  17. K. Biswas and Md. Liaqat Ali, “Security threats in Mobile Ad-Hoc Network”, March 2007
  18. Bing Wu, Jianmin Chen, Jie Wu, MihaelaCardei “A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks”, Wireless Mobile Network Security pp 1-38, Springer 2006.
  19. D B. Johnson, D A. Maltz, and Y. Hu. “The dynamic source routing protocol for mobile ad hoc network,” IETF, pp 43-53, April 2003.
  20. Yi-Chun Hu, Adrian Perrig, “A Survey of Secure Wireless Ad Hoc Routing”, IEEE Security and Privacy, 1540- 7993/04/,2004 IEEE pp 28-39 , May/June 2004
  21. S. Marti, T. J. Giuli, K. Lai, M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” Proc. of MobiCom 2000 pp 255-165, Boston, August 2000.
Index Terms

Computer Science
Information Sciences

Keywords

DSR ES-DSR (Enhanced Selfish DSR) Secured Routing Selfish nodes Ad hoc network Security Selfish behavior