##plugins.themes.academic_pro.article.main##

Abstract

Mobile Ad hoc Networks (MANETs) are very popular because of their widespread usage. In MANET, each node has to co-operate with each other to perform functions in the network. However some nodes do not participate in routing and forwarding packets which are not destined to them, in order to save their energy. Such misbehaving nodes which try to get benefitted from other nodes but refusing to forward other nodes packets can severely degrade the performance of the whole network. In MANETs, detection of such misbehaving nodes is very important. In this survey, a detailed study of misbehaving nodes, their characteristics and their effects in various layers of the network are discussed. Moreover, various detection schemes which deal with misbehaving nodes are also considered in the discussion. This paper discusses the different acknowledgement schemes for misbehaving node detection in MANETs. 

##plugins.themes.academic_pro.article.details##

How to Cite
Roopa Banakar**, G. D. N. (2014). A Survey on Acknowledgement Based Detection Schemes for Detecting Selfish Nodes in MANETs. International Journal of Emerging Trends in Science and Technology, 1(03). Retrieved from https://igmpublication.org/ijetst.in/index.php/ijetst/article/view/102

References

1) S. Anandukey and M. Chawla, “Detection of packet dropping attack using improved acknowledgement based scheme in MANET,” International Journal of Computer Science Issues I, vol. 7, no. 1, pp. 12-17, 2010.
2) S. Dhanalakshmi and M. Rajaram, “A reliable and secure framework for detection and isolation of malicious nodes in MANET,” International Journal of Computer Science and Network Security, vol..8, no.10, pp. 184-190, 2008.
3) M.I.M. Saad and Z. A. Zukarnain, “Performance analysis of random-based mobility models in MANET routing protocol, “ European Journal of Scientific Reasearch, vol. 32, no. 4, pp. 444-454, 2009.
4) Sangheethaa Sukumaran, Venkatesh.J, Arunkorath, “A Survey of Methods to mitigate Selfishness in Mobile Adhoc Networks”, in International Journal of Information and Communication Technology Research, Volume 1 No. 2, June 2011.
5) Younghwan Yoo and Dharma P. Agrawal, “Why Does It Pay To Be Selfish In a MANET?”, in IEEE Wireless Communications, December 2006.
6) Mangesh, Pradeep, Ali, “Countermeasures of Network Layer Attacks in MANETs”, in IJCA Special Issue on “Network Security and Cryptography” NSC, 2011.
7) Shailender Gupta, C. K. Nagpal and Charu Singla, “Impact Of Selfish Node Concentration In MANETS”, in International Journal of Wireless & Mobile Networks (IJWMN), Vol. 3, No. 2, April 2011.
8) Li Zhao, Jose, “MARS: Misbehavior Detection in Ad Hoc Networks”, in IEEE GLOBECOM, 2007.
9) Graffi, Parag, Matthias, Steinmetz, “Detection of Colluding Misbehaving Nodes in Mobile Ad hoc and Wireless Mesh Networks”, in IEEE Global Communications Conference, November 2007.
10) Marti, Giuli, Lai, Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks”, in Proceedings of ACM, 2000.
11) Mieso K. Denko, “ Detection and Prevention of Denial of Service (DoS) Attacks in Mobile Ad Hoc Networks using Reputation-Based Incentive Scheme”, in SYSTEMICS, CYBERNETICS AND INFORMATICS, Vol. 3, No. 4, 2003.
12) Kejun Liu, Jing Deng, Pramod K. Varshney and Kashyap Balakrishnan, “An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs”, in IEEE Transactions on Mobile Computing, May 2007, 536-550.
13) Roubaiey, Sheltami, Mahmoud, Shakshuki, Mouftah, “AACK: Adaptive Acknowledgment Intrusion Detection for MANET with Node Detection Enhancement”, in proceedings of IEEE International Conference on Advanced Information Networking and Applications, PP. 634-640, 2010.
14) G. S. Mamatha and S. C. Sharma, “A new combination approach to secure manets against attacks,” International Journal of Wireless & Mobile Networks, vol. 2, no. 4, pp. 71-80, 2010.
15) Rajaram and S. Palaniswami, “Malicious node detection system for mobile ad hoc networks,” International Journal of Computer Science and Information Technologies, vol. 1, no. 2, pp. 77-85, 2010.