Call For Papers
Contact Us

  Probabilistic Modeling and Estimation of Network Blocking Probability for Selfish Behavior Attack in Mobile Ad hoc Networks  
  Authors : Kirti A. Adoni; Anil S. Tavildar
  Cite as:


Data delivery in Mobile Adhoc Networks (MANETs) gets adversely affected by various malicious attacks. Detection of malicious presence, therefore, becomes important to improve MANET's performance. In this paper probabilistic models have been proposed to characterize random behavior of nodes for Selfish Behavior (SB) attacks. This attack makes nodes unavailable for data forwarding, resulting in increased blocking tendency of the network. Quantification of network blocking probabilities has been proposed. This can then be further used for making appropriate trustworthiness related decisions for nodes, leading to improvement in MANET’s performance, using suitable routing protocols.


Published In : IJCSN Journal Volume 5, Issue 4

Date of Publication : August 2016

Pages : 653-660

Figures :06

Tables : --


Kirti Aniruddha Adoni : is presently working as Assistant Professor at P.E.S. Modern College of Engineering, Shivajinagar, Pune, India 411005. She is a Research Student of Electronics and Telecommunication department, V.I.I.T. Research Centre, Kondhwa, Pune, India. She has completed her M.Tech (Microwave) from College of Engineering, Pune, Maharashtra, India in 2010. Her major fields of study are wireless networks, mobile ad-hoc networks.

Dr. Anil S. Tavildar : is working as Professor Emeritus in Electronics and Telecommunication Engineering at MKSSS’s Cummins college of Engineering, Pune, India. He has obtained his B.E. (Electronics and Telecommunication Engineering) from University of Pune and PhD (Communication Engineering) from Indian Institute of Technology, Delhi in 1984. He has 28 years of industrial, research and development experience and 16 years of teaching experience. His research interests are in signal processing, wireless and mobile communication systems. Prof Tavildar is Senior Member, IEEE USA, Fellow Member of IETE, India, Founder Member ICIET and Life Member of ISTE, India.








Probabilistic Models, Selfish Behavior Attack, Probability of Blocking, MANETs

Maliciousness due to SB attack, has been modeled using uniformly distributed continuous time random variables, Poisson and uniformly distributed discrete values for ONOFF pulses 'k' and binomially distributed number of malicious nodes 'n' of the network. Formulation for probability of network blocking for individual nodes Pbj and total network blocking probability, PB, based on concept of statistical averaging have been proposed. MATLAB based simulations on typical MANET network of fifty nodes, indicate that blocking probability is maximum around k=2 and it saturates for higher values of 'k' for uniform distribution. In the above analysis the basic occurrence of random time for ON-OFF switching of nodes has been assumed to be uniformly distributed in available time. However, any other continuous time distributions like, Gaussian, Lognormal, Exponential distribution etc. may also be used in modeling. The analysis can be carried out, using the similar approach.


[1] M. Abolhasan, T. Wysocki, E. Dutkiewicz, “A review of routing protocols for mobile ad hoc networks”, Ad Hoc Networks, 1570-8705 2 (1) (2004) 1–22. [2] Charles E. Perkins, PravinBhagwat, “Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers” [3] T. Clausen, P. Jacquet, IETF RFC-3626: “Optimized Link State Routing Protocol OLSR”, 2003. [4] Charles E. Perkins, Elizabeth M. Royer, “Ad-hoc Ondemand Distance Vector Routing” [5] D. B. Johnson and D.A. Maltz, “Dynamic Sources Routing in Ad hoc Wireless Networks”, Mobile Computing, 1996. [6] I. ChakeresCenGen, C. Perkins WiChorus, “Dynamic MANET On-demand Routing draft-ietf-manet-dymo- 17”, 2009. [7] LoayAbusalah, AshfaqKhokhar and Mohsen Guizani, “A Survey of Secure Mobile Ad Hoc Routing Protocols”, IEEE Communications Surveys and Tutorials, vol.1, no.4, Fourth Quarter 2008. [8] Jian Wang, Yanheng Liu, Yu Jiao, “Building a trusted route in a mobile ad hoc network considering Communication reliability and path length”, Journal of Network and Computer Applications, 34(2011), pp.1138-1149. [9] Candolin C, Kari H. “A security architecture for wireless ad hoc networks”, In: Proceedings of International Conference on mobile computing and networking (MOBICOM’02): October 2002,1095-100. [10] Pirzada AA, McDonald C., “Establishing trust in pure ad-hoc networks” In: Proceedings of Australian Conference on Computer Science, vol.56; January 2004, pp. 47-54. [11] Anantvalee T., Wu J., “Reputation-based system for encouraging the cooperation of nodes in mobile ad-hoc networks”, In: Proceedings of IEEE International Conference on the communication (ICC’07): June 2007, pp 3383-8. [12] Peng SC, Jia WJ, Wang GJ, WU J, Guo MY, “Trusted Routing Based on Dynamic Trust Mechanism in Mobile Ad Hoc Networks.”,IEICE TRANSACTIONS on Information and Sysytems E93-D 2010(3):510-7. [13] AsmaAdnane , Christophe Bidan , Rafael Timóteo de Sousa Júnior, “ Trust-based security for the OLSR routing protocol” , Computer Communications, 36 (2013) 1159–1171 [14] S. Buchegger, J-Y. Le Boudec, “Performance analysis of the confidant protocol : cooperation of nodes – fairness. Dynamic Ad-hoc networks” , Proceedings of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), IEEE, 2002. [15] P. Michiardi, R. Molva, “Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks”, in: IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security, 2002, pp. 107–121. [16] K. Meka, M. Virendra, S. Upadhyaya, “Trust based routing decisions in mobile adhocNetworks”, in:Workshop on Secure Knowledge Management (SKM), 2006. [17] Hui Xia, ZhipingJia, Xin Li, Lei Ju,Edwin H.-M. Sha, “Trust prediction and trust-based source routing in mobile ad hoc networks”, Ad Hoc Networks, 11 (2013) pp. 2096-2114. [18] Ing-Ray Chen, JiaGuo, FenyoBao, Jin-Hee Cho, “Trust management in mobile ad hoc networks for bias minimization and application performance maximization”, Ad Hoc Networks 19 (2014) pp. 59-74. [19] Sergio Marti, T.J. Giuli, Kevin Lai, and Mary Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks”, In: Proceedings of international conference on mobile computing and networking(MOBICOM’00):August 2000, pp. 255-65. [20] Zouridaki. C, Mark. B.L., Hejmo.M and Thomas.R.K., “A quantitative trust establishment framework for reliable data packet delivery in MANETs”, Proceedings of the 3rd ACM workshop on security of adhoc and sensor networks, vol1, pp.1-10,(2005) [21] Md. Amir KhusruAkhtar and Sahoo.G, “Mathematical Model for the detection of selfish Nodes in MANETs”, International Journal of Computer science and Informatics, 2231-5292, vol 1(3), pp25-28(2011) [22] J. SengathirR. And Manoharan, “Selfish Conscious Mathematical Model based on Reliable Conditional Survivability Co-efficient in MANET Routing”, Proceedings of International Conference on Advances Information Technology and Mobile Communication (2013) [23] Syed S. Rizvi and Khaled M. Elleithy, “A New Scheme for minimizing malicious behavior of mobile nodes in Mobile Ad Hoc Networks”, IJCSIS International Journal of Computer science and Information Security, vol.3, no.1,(2009) [24] Hernandez-Orallo, Manuel.D, Serraty, Juan-Carlos Cano, Calafate.T and Manzoni’s, “ Improving Selfish Node Detection in MANETs Using a collaborative Watchdog”, IEEE Communication Letters, vol.16, no.5, (2012) [25] Buchegger S., Boudec J.L., “A Robust reputation system for P2P and mobile ad hoc networks”, In Proceedings 2nd Workshop on economics of Peer to Peer system(2004) [26] Kirti A. Adoni, MandarKaryakarte, Anil Tavildar, “Security Enhancement in OLSR protocol using Trust Aware Routing Framework” in proceedings of ICEIT conference on Advances in Mobile Communications, Networking and Computing, April 2015, pp. 84-87. [27] A. Rajaram and Dr. S. Palaniswami, “Malicious node detection System for Mobile Ad hoc Networks”, IJCSIT International Journal of Computer Science and Information Technologies, vol.1 (2), pp.77-85(2010) [28] Cheny and Zhao Q. (2005) on the lifetime of wireless sensor networks, IEEE Communications Letters, 9(11):976-978. [29] “Probability, Random Variables and Stochastic Processes” A Papoulis, S. UnnikrishnanPillai, TMH, Fourth Edition.