Open Access Open Access  Restricted Access Subscription or Fee Access

A New Random 2ACK Technique for Detection of Selfish Nodes in a Mobile Ad-Hoc Network

E. Kannan, Resmi R. Nair, P. Visu, S. Koteeswaran


A mobile ad hoc network (MANET) is a temporary infrastructure less network, formed by a set of mobile hosts. It dynamically establishes its own network without relying on any central administration. In a MANET each device is free to move independently in any direction, and will therefore change its links to other devices frequently. Mobile ad hoc networking works properly only if the participating nodes cooperate in routing and forwarding. However, performing network functions consumes energy and other resources. To save its energy a node may behave selfishly and uses the forwarding service of other nodes without correctly forwarding packets for them. These nodes must be identified and excluded from the cooperative part of the network, as they only consume resources and don’t contribute to the infrastructure. In MANET’s routing misbehavior can severely degrade the performance at the routing layer. Specifically, nodes may participate in the route discovery and maintenance process but refuse to forward data packets. Some solutions have been recently proposed to detect and mitigate such selfish nodes, but almost all these solutions rely on the watchdog technique in their monitoring components, which suffers from many problems. This paper proposes a new approach to mitigate some of the above problems. A misbehavior detection system aims at removing the MANET vulnerability. In this approach a system is built to detect misbehaving nodes in mobile ad hoc networks.


Mobile Ad Hoc Networks, Routing Misbehavior, Selfishness, Network Security.

Full Text:



K. Balakrishnan, J. Deng, and P.K. Varshney, “TWOACK: Preventing Selfishness in Mobile Ad Hoc Networks,” Proc. IEEE Wireless Comm. and Networking Conf. (WCNC ’05), Mar. 2005.

Kejun Liu, Jing Deng, Pramod K. Varshney, Kashyap Balakrishnan ”An Acknowledgement-Based Approach for the Detection of Routing Misbehavior in MANETs”, IEEE Transactions on Mobile Computing vol.6,No.5,May 2007.

H.Miranda and L.Rodrigues, “Preventing Selfishness in Open Mobile Ad Hoc Networks”, October 2002.

S.Marti,T.Giuli,K.Lai and M.Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks”,Aug 2000.

Djamel Djenouri, Nadjib Badache,”New Approach for Selfish Nodes Detection in Mobile Ad hoc Networks”.

J.-P. Hubaux, T. Gross, J.-Y. LeBoudec, and M. Vetterli, “Toward Self-Organized Mobile Ad Hoc Networks: The Terminodes Project,” IEEE Comm. Magazine, Jan. 2001.

S. Buchegger and J.-Y. Le Boudec, “Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes, Fairness in Dynamic Ad-Hoc Networks,” Proc. MobiHoc, June 2002.

L. Buttyan and J.-P. Hubaux, “Enforcing Service Availability in Mobile Ad-Hoc WANs,” Proc. MobiHoc, Aug. 2000.

S. Zhong, J. Chen, and YR Yang. Sprite: a simple, cheat-proof, creditbased system for mobile ad-hoc networks. INFOCOM 2003. Twenty-Second Annual Joint Conferences of the IEEE Computer and Communications Societies. IEEE, 3, 2003.

S. Yi and R. Kravetso. Moca : Mobile certificate authority for wireless ad hoc networks. In The second anunual PKI research workshop (PKI 03), Gaithersburg, 2003.

S. Capkun, L. Buttyan, and J.-P. Hubaux. Self organized public-key management for mobile ad hoc networks. IEEE Transactions on Mobile Computing, Vol.2, No.1, pages 52–64, January 2003.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.