Authors: Djamel Djenouri, Nadjib Badache
Addresses: CERIST Research Center, Computer Engineering Department, Algiers, Algeria. ' CERIST Research Center, Algiers, Algeria
Abstract: The resource limitation of nodes forming ad hoc networks along with the multi-hop nature of these networks rise a new problem. To preserve its energy a node may behave selfishly and would not forward packets for others, while using their services and consuming their resources. This paper presents a new monitoring solution that mitigates limitations of the watchdog-based monitoring, upon which rely most of the state-of-the-art solutions. The overhead of the proposed solution, termed Two-hop acknowledgment, is gradually decreased through the use of the lower layer acknowledgments (piggybacking), as well as aggregations.
Keywords: MANETs; mobile ad hoc networks; network security; selfishness; packet forwarding; wireless networks; power management; mobile networks; selfish nodes.
International Journal of Wireless and Mobile Computing, 2010 Vol.4 No.4, pp.264 - 274
Published online: 07 Oct 2010 *Full-text access for editors Access for subscribers Purchase this article Comment on this article