Detection of Selfish Nodes in Networks Using CoopMAC Protocol with ARQ

被引:20
|
作者
Dehnie, Sintayehu [1 ]
Tomasin, Stefano [2 ]
机构
[1] BAE Syst, Wayne, NJ 07474 USA
[2] Univ Padua, Dept Informat Engn, I-35131 Padua, Italy
关键词
Ad-hoc networks; cooperative diversity; medium access control; MIMO systems; security; privacy; authentication; USER COOPERATION DIVERSITY; AD HOC;
D O I
10.1109/TWC.2010.07.091454
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
CoopMAC has been recently proposed as a possible implementation of cooperation protocols in the medium access control (MAC) layer of a wireless network. However, some nodes may refrain from cooperation for selfish purposes, e. g. in order to save energy, in what is called selfish behavior or misbehavior. This protocol violation worsens other nodes' performance and can be avoided if other nodes detect and punish (e. g. banning from the network) misbehaving nodes. However, fading and interference may prevent nodes from cooperating even if they are willing, therefore it is not trivial to identify misbehaving nodes. In a fading scenario where an automatic repeat request (ARQ) protocol is used, we propose a mechanism that allows to detect misbehaving nodes. Two approaches, either based on the uniformly most powerful (UMP) test or on the sequential probability ratio test (SPRT) are considered. The two techniques are characterized and compared in terms of their average detection delay and resulting network performance.
引用
收藏
页码:2328 / 2337
页数:10
相关论文
共 50 条
  • [31] Outwitting smart selfish nodes in wireless mesh networks
    Chong, Zan-Kai
    Tan, Su-Wei
    Goi, Bok-Min
    Ng, Bryan Cheng-Kuan
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2013, 26 (09) : 1163 - 1175
  • [32] Trust Based Intrusion Detection Technique to Detect Selfish Nodes in Mobile Ad Hoc Networks
    Kumar, Sunil
    Dutta, Kamlesh
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 101 (04) : 2029 - 2052
  • [33] Trust Based Intrusion Detection Technique to Detect Selfish Nodes in Mobile Ad Hoc Networks
    Sunil Kumar
    Kamlesh Dutta
    Wireless Personal Communications, 2018, 101 : 2029 - 2052
  • [34] Counteracting Selfish Nodes Using Reputation Based System in Mobile Ad Hoc Networks
    Fayaz, Muhammad
    Mehmood, Gulzar
    Khan, Ajab
    Abbas, Sohail
    Fayaz, M.
    Gwak, Jeonghwan
    ELECTRONICS, 2022, 11 (02)
  • [35] ARQ Protocol Studies in Underwater Communication Networks
    Kwatra, Priyanka
    2013 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION (ICSC), 2013, : 121 - 126
  • [36] A new ARQ protocol for wireless ATM networks
    Akyildiz, IF
    Joe, I
    ICC 98 - 1998 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS VOLS 1-3, 1998, : 1109 - 1113
  • [37] Reliable Distance Vector routing protocol to handle Blackhole and Selfish (RDV BS) nodes in Ad hoc Networks
    Khurana, Sandhya
    Gupta, Neelima
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2012, 3 (01): : 29 - 51
  • [38] Emergency Connectivity in Ad-hoc Networks with Selfish Nodes
    Karakostas, George
    Markou, Euripides
    ALGORITHMICA, 2014, 68 (02) : 358 - 389
  • [39] Emergency Connectivity in Ad-hoc Networks with Selfish Nodes
    George Karakostas
    Euripides Markou
    Algorithmica, 2014, 68 : 358 - 389
  • [40] Transmission of multimedia contents in opportunistic networks with social selfish nodes
    Daru Pan
    Hui Zhang
    WeiJing Chen
    Ke Lu
    Multimedia Systems, 2015, 21 : 277 - 288