You are on page 1of 17

Hindawi

Security and Communication Networks


Volume 2021, Article ID 9921826, 17 pages
https://doi.org/10.1155/2021/9921826

Research Article
A Survey on the Noncooperative Environment in Smart
Nodes-Based Ad Hoc Networks: Motivations and Solutions

Muhammad Altaf Khan ,1 Moustafa M. Nasralla ,2 Muhammad Muneer Umar ,1


Zeeshan Iqbal ,1 Ghani Ur Rehman ,3 Muhammad Shahzad Sarfraz,4
and Nikumani Choudhury 5
1
Institute of Computing, Kohat University of Science & Technology, Kohat 26000, Pakistan
2
Department of Communications and Networks Engineering, Prince Sultan University, Riyadh, Saudi Arabia
3
Department of Computer Science & Bioinformatics, Khushal Khan Khattak University, Karak, Pakistan
4
Department of Computer Science, National University of Computer and Emerging Sciences, Chiniot Faisalabad Campus,
Chiniot 35400, Islamabad, Pakistan
5
Department of Computer Science & Information System, Birla Institute of Technology & Science, Hyderabad, India

Correspondence should be addressed to Moustafa M. Nasralla; mnasralla@psu.edu.sa

Received 17 March 2021; Accepted 22 May 2021; Published 30 May 2021

Academic Editor: Helena Rifà-Pous

Copyright © 2021 Muhammad Altaf Khan et al. This is an open access article distributed under the Creative Commons Attribution
License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is
properly cited.
In ad hoc networks, the communication is usually made through multiple hops by establishing an environment of cooperation and
coordination among self-operated nodes. Such nodes typically operate with a set of finite and scarce energy, processing,
bandwidth, and storage resources. Due to the cooperative environment in such networks, nodes may consume additional re-
sources by giving relaying services to other nodes. This aspect in such networks coined the situation of noncooperative behavior by
some or all the nodes. Moreover, nodes sometimes do not cooperate with others due to their social likeness or their mobility.
Noncooperative or selfish nodes can last for a longer time by preserving their resources for their own operations. However, such
nodes can degrade the network’s overall performance in terms of lower data gathering and information exchange rates, un-
balanced work distribution, and higher end-to-end delays. This work surveys the main roots for motivating nodes to adapt selfish
behavior and the solutions for handling such nodes. Different schemes are introduced to handle selfish nodes in wireless ad hoc
networks. Various types of routing techniques have been introduced to target different types of ad hoc networks having support
for keeping misbehaving or selfish nodes. The major solutions for such scenarios can be trust-, punishment-, and stimulation-
based mechanisms. Some key protocols are simulated and analyzed for getting their performance metrics to compare
their effectiveness.

1. Introduction used for a variety of drives like gathering environmental data


[3] and controlling smart homes, cities, and industrial
Unlike other traditional data communication networks, ad equipment [4]. Since the nodes in such networks are designed
hoc networks are considered very ideal in scenarios where to be inexpensive and small in size, these nodes have to work
rapid deployment of a network is preferred. The typical with a limited set of resources like storage, battery, processing,
variants of ad hoc networks can be Wireless Sensor Networks and radio frequency power [5, 6].
(WSNs) [1], Mobile Ad hoc Networks (MANETs), Delay Each node in ad hoc networks can operate without the
Tolerant Networks (DTNs), and Vehicular Ad hoc Networks existence of a central router and can be programmed to
(VANETs) [2]. Due to the exceptional features of wirelessly support multihop communication for inexpensive and speedy
connected devices in ad hoc networks, these networks can be utilization. In multihop communication, a source node can
2 Security and Communication Networks

connect another target node through a chain of various in- nodes: The first class of nodes participates in the routing by
termediate nodes. Each node, besides its fundamental func- receiving and acknowledging the reception of packets.
tionalities, also offers relaying services to other nodes to However, these nodes drop the received packets and do not
develop a collective, cooperative environment throughout the forward any data or control packets generated by a source
network. In some wireless ad hoc networks, nodes are node. The second class of nodes does not take part in the
deployed randomly and may move in undecided directions routing and never accepts any route request packets (RREQ).
[7]. Moreover, such nodes form a dynamic topological Some authors also refer to selfish nodes as malicious nodes
structure that allows them to learn their degrees and route in their work [17]. In many literatures, the selfish nodes are
information by periodic exchange of information. Therefore, considered nondestructive or nonmalicious as they only try
each node is desired to adequately coordinate with its to preserve their own resources. However, such nodes can
neighborhood for keeping the route information updated. influence the performance of other nodes and degrade the
The ad hoc networks are unorganized and infra- overall functionality of the network.
structureless networks. The nodes in such types of networks A node can adopt selfish behavior for its own advantage
perform many operations along with the routing func- due to various reasons. In return, a selfish node can highly
tionalities. The term smart node refers to the nodes which degrade the network performance up to a very high peak.
perform their operations autonomously without any input The main issues caused by the existence of selfish nodes can
from others. These nodes intelligently adopt some strategies be higher packet drops, increased energy consumption,
according to their own needs or preferences. In most of the imbalanced load among nodes, and nonavailability of op-
game-theoretic approaches, the nodes are considered to be timal paths for data transmission. Additionally, a selfish
smart during the data routing in the network. These nodes node can be used by some malicious nodes for black hole
are programmed in such a way that they learn from the attacks. In a black hole attack, the packets are intentionally
environment and intelligently take decisions of their own dropped by the attacker nodes for a malicious purpose [18].
interests. Various techniques have been introduced to manage
The devices’ scarcity of various resources in ad hoc selfish nodes in ad hoc networks. Some authors suggest the
networks can be associated with the nature of their exertion act of selfishness as beneficial up to some extent [19].
and physical structure. In WSNs, the nodes’ processing However, there should be a proper mechanism to control or
power and energy are always assumed to be very limited. In allow such behavioral aspects of network nodes. The most
almost all the routing protocols, the energy consumption popular techniques for selfish node management are trust
rate is very deeply tested. Many research proposals are purely management, incentive-based, and evolutionary game-the-
targeting the energy efficiency in WSNs [8–13] and fog oretic mechanisms. In some cases, Intrusion Detection
networks [14], while in DTNs, the size of storage queues is Systems (IDSs) can also be utilized to block noncooperative
assumed to have a vital role. The limited storage of devices nodes in a network. Usually, the researchers propose their
highly degrades the opportunistic nature of data commu- mechanisms to target some particular types of ad hoc
nication in DTNs. Moreover, the nonavailability of the relay networks. These mechanisms can be interchangeably con-
or target node also reduces the network performance. In sidered for other types of the network with some modifi-
VANETs, various parameters are considered as important cations and assumptions.
and limited. Primarily the bandwidth, storage buffers, and The main object of this work is to enlighten the note-
energy are considered as vital in such networks. Moreover, worthy aspect of the noncooperative environment caused by
the high rate of mobility is also a challenge in VANETs [15]. intelligent nodes in ad hoc networks. The primary drives for
In most ad hoc networks, the nodes operate on restricted pushing smart nodes to act selfishly in different flavors of ad
batteries, which bounds the lifetime of the nodes and the hoc networks are discussed and classified. Different domains
entire network. In some cases, the social likeness or dis- causing the noncooperative communication environment
likeness of smart devices also affects data communication targeted by various articles are discussed in this work.
and network efficiency. Moreover, several types of protocols designed for ad hoc
Each node consumes its resources on its own operations networks and having support for selfishness management
and the collective objective of the entire network. To ac- are studied and categorized. At the end of this work, pro-
complish the overall objectives, the nodes must cooperate tocols of different categories are simulated and their per-
with one another during the information exchange and data formance metrics are calculated. The differences and
transmission from a source to a target node. While keeping similarities of experimented protocols are discussed in detail
the aggregate interest, each node consumes an additional and some valuable conclusions are made.
amount of energy and storage queue for giving relaying The article is divided into six sections. In the next
services to other source nodes. This additional resource section, a detailed description of the noncooperative envi-
consumption can lead to shortening the nodes’ life and can ronment in ad hoc networks is given. In this section, the
degrade its own data transfer. A node can eradicate these fundamentals about the selfishness of nodes are discussed.
issues by simply not cooperating with other nodes. Nodes Nodes can adapt selfish behavior due to various motives
having a noncooperative behavior can be called selfish based on their preferences and limitations. A detailed de-
nodes. Selfish nodes prefer to be entertained by other nodes scription of the motivations for the adaption of selfishness is
but in return do not like to consume their resource for given in the third section of this article. The solutions for
others. The study in [16] defines two categories of selfish handling the selfish behavior of nodes are given in the fourth
Security and Communication Networks 3

section. A selfish node can be isolated or/and stimulated by objective. The existence of selfish nodes in such type of
adopting some state-of-the-art schemes. In the fifth section, networks can lead to various unwanted outcomes. A selfish
an analytical study is performed to check the effectiveness of node can increase the number of overall packet drops but
various proposed techniques. In the last section conclusion not giving a relay service to some or all source nodes. The
of our work is given. selfish node can drop the received packets any time which
are needed to be forwarded to the next hop in the network
2. Noncooperative Behavior in Ad towards the destination. Due to this behavior, the load
Hoc Networks distribution is imbalanced among the network nodes.
Consider a senior shown in Figure 1; a single selfish node can
The routing protocols used in ad hoc networks can be involve other normal nodes to become intermediate hops in
categorized as proactive and reactive. In the proactive a data transmission channel, causing the involved nodes to
routing protocols, the nodes learn about the topology of the take the load which is not supposed to be taken. Due to
network and the availability of routes by exchanging some imbalanced load distribution, the energy consumption is
periodic messages. These messages are referred to as to- also not uniform. Some nodes exhaust their energies earlier
pology control messages or HELLO messages. Each node and die before a normal period. The selfish nodes can in-
generates such messages after a particular period of time. crease the end-to-end delays by not allowing a source node
Upon reception of such messages, the node responds with its to get the shortest paths towards the destination.
availability. The generator and the respondent nodes keep The article in [23] takes Dynamic Source Routing (DSR)
their routing tables updated with the help of topology as a case study and determines that the selfishness associated
control messages. Destination Sequence Distance Vector with routing can be classified into three major categories:
(DSDV) and Optimized Link State Routing (OLSR) are the (a) Type 1 Selfish Nodes. The selfish nodes participate in
examples of proactive routing protocols. In reactive routing the normal control data packets’ transmission during
protocols, the message initiating node broadcasts a route the routing discovery and maintenance phases but
request to all the network nodes to discover the network do not become a relay for forwarding normal data
topology. The route discovery is made up by flooding the packets. Such type of nodes is considered very
route request message throughout the entire network. These dangerous for the overall operations in the data
protocols are known as on-demand routing protocols. The routing. These nodes initially participate in the route
destination node upon receiving the route request responds discovery to establish paths but later they start de-
to the source node and a path is established between the two nying the relay service for others. In such cases, the
nodes. Examples of reactive protocols are Dynamic Source packet drops and end-to-end delays are highly in-
Routing (DSR) and Ad hoc On-demand Distance Vector creased. It is also possible that the selfish nodes do
(AODV) [20]. In both types of routing protocols the co- not adopt noncooperative response for all the nodes
ordination and cooperation of nodes are always required. but only selected nodes are targeted. The major
The cooperative operation of the network nodes is always reason can be social likeness or dislikeness.
desired in ad hoc networks. In ad hoc networks node can be
assumed as members of a community in which each member (b) Type 2 Selfish Nodes. The selfish nodes do not par-
inputs something for the fulfillment of the combined ob- ticipate in anything associated with data transmis-
jectives of the community. The contribution to problem sion for other nodes either in the route discovery
solution binds the individual resource consumption with the phase or in the route maintenance phase. Such nodes
aggregate interests of community members. However, nodes only use their energies to be consumed by their own
controlled by humans or programmed with intelligence may data processing and transmission. The routing
lead to some undesired circumstances for having self-in- protocols usually do not consider such types of
terests. The nodes sometimes cannot judge the importance nodes. No route information is gathered from or
of their existence in the community. This self-interest can transferred to this class of selfish nodes. These nodes
lead to noncooperation among the nodes [21]. If the de- can highly degrade the overall data communication
veloped infrastructure does not log the nodes’ data traffic in traffic and network connectivity. However, the
an appropriate manner and allows nodes to smartly adapt routing protocols do not consider these as a major
their strategies, this leads to nodes’ independence. An in- threat to the discovery and maintenance of routes in
dependent node may think that its own resources being an ad hoc network.
meant for its use may lead to selfish behavior. (c) Type 3 Selfish Nodes. Such nodes adjust their co-
The selfishness of a node is somehow similar to a black operation level according to their resource levels.
hole attack in such networks. In the black hole attacks, the These nodes in the beginning act like normal nodes.
attackers intend to drop the data packets whenever they are With the passage of time, the nodes start declination
supposed to forward those packets. The main intention for in their cooperation with others due to a reduction in
pack dropping in black hole attack is to degrade the network their resource levels. In a smart environment, it is
performance or another malicious purpose [22]. However, possible that nodes interrelate their remaining en-
in the case of selfishness, the nodes adopt a noncooperative ergy levels with their selfishness levels. The multiple
behavior only for their own benefit rather than any malicious levels of selfishness, referred to as Multiple Threshold
4 Security and Communication Networks

Selfish preservation in all the ad hoc networks. In Table 1, some ad


Source node hoc networks are given along with the potential motivations
node for their nodes’ being selfish. All the motivational factors for
S
Link breakage pushing smart nodes to change their cooperative behavior
are as follows.

3.1. Energy. Almost in all types of wireless ad hoc networks,


the nodes use batteries as the only power source. These
batteries are usually disposable and non-rechargeable in
Figure 1: Effect of a selfish node in routing. most of the WSNs and similar networks. Nodes are ran-
domly thrown into a field and then left unattended in such
Selfishness (MTS), are well defined by [18, 24]. Such networks. Therefore, battery replacement or recharge cannot
nodes are similarly dangerous as type 1 selfish nodes. be made feasible, while in some cases these batteries can be
The nodes support the route discovery flow for recharged by the operators like in VANETs and MANETs.
forming a topology but later interrupt the data flow However, the energy source in ad hoc networks is always
by dropping data packets. Such type of nodes causes assumed as finite and scarce [11].
the routing protocol to reinitiate the route discovery A node consumes its energy on various types of func-
process or adopt another alternate route for data tionalities. The foremost are data processing, transmission,
transmission. sensing, and reception. Energy consumption can be cate-
gorized as useful or wasteful. Energy consumed on data
The selfish nodes usually adopt their distinct behavior for transmission and reception, data processing, and control
their own interest and do not develop an intention for the messaging in the network can be considered as useful, while
degradation of the network performance. However, it is wasteful energy expenditure is carried by overhearing,
understood that the selfish nodes bring unwanted and rapid generation, and processing of control packets, idle listening,
topological changes in the network which put a very big and retransmission of lost packets [9]. If a node stops or
impact on the overall performance of the network. Some reduces any of these functionalities it can be a detriment in
authors, like Umar et al. [18], use the selfishness of nodes as a various ways. To reduce the energy consumption on data
key for the establishment of paths and load balancing among transmission, it is possible for nodes to not forward others’
the sensor nodes in a WSN. Some authors suggest that data packets. The forwarding nodes usually consume ad-
selfishness can be used in a positive sense and the network ditional energy on the reception of data and then retrans-
can benefit from such behavior of nodes up to some extent mission. The selfish nodes reduce their energy consumption
[19]. A mechanism allowing selfishness can permit some by never opting to give any relay service.
nodes to keep their resource preserved for some vital mo- Suppose a node depletes ax amount of energy on
tives in the future. The nodes having some extra responsi- transmitting a single bit and consumes bx amount of energy
bilities can be permitted to not give any relay service to on the reception of a single bit. As per wireless commu-
others in a selfish manner. nication fundamentals, the value of a must be greater than b,
A node having persistent noncooperative behavior can i.e., a>b [10]. Ignoring all other parameters used in data
raise the rate of packet loss in an ad hoc network up to 100%. communication, i.e., range, etc., a normal node will consume
However, the ratio of packet loss due to a selfish node di- ax + bx amount of energy for forwarding a single bit, while a
minishes with an evolution in the density of normal co- selfish node can save this by only hearing the single bit with
operative nodes in the ad hoc network [24]. Due to this bx amount of energy and does not use amount on
assumption, we can say that the network having a large retransmitting the same bit.
number of nodes will face comparatively less damage due to The selfishness of nodes for the sake of energy preser-
the presence of selfish nodes in it. More precisely, the vation is very common in most of the ad hoc networks. Most
number of selfish nodes can be directly associated with the of the researchers take sensor nodes with disposable batteries
network performance. as their case studies [18, 27]. However, any type of ad hoc
network where the nodes are operated by a finite power
3. Motivations for Selfishness Adoption source can be assumed to have the possibility of a nonco-
operative environment among the nodes. Some authors
A node in any variant of ad hoc networks can adopt self-
marked the selfishness of nodes as the most effective tool for
ishness whenever it is programmed with smartness or
their energy-saving and life-lengthening [18].
controlled by another intelligent entity. The intelligent entity
can be another device, module, program, or human. Self-
ishness is very common in human-operated personal devices 3.2. Storage Buffer. The nodes in ad hoc networks operate on
like smartphones and personal digital assistants [25]. A node limited storage space. It is obvious that the nodes must store
can be adequately programmed so that it becomes inde- the received contents temporarily before their transmission
pendent of other nodes in the network and decides its own to the next hops. Sometimes the nodes need to choose which
functionalities [26]. A smart node can adjust its behavior for data content is useful for them and should be stored in their
several reasons. The foremost reason is the energy storage buffers. Most of the nodes try to keep their storage
Security and Communication Networks 5

Table 1: Types of ad hoc networks and their motivations for the selfishness adoption.
Network type Primary concerns Secondary concerns No concerns
Social likeness can be considered
In most of WSNs, the nodes do not
The nodes operate on limited energy, secondarily. Some intelligent nodes may
WSN move. The mobility does not affect
storage, and bandwidth. prefer some other selected nodes for
the behavior of nodes in WSNs.
cooperation.
Social likeness associated with limited
Energy can also be considered for
storage buffer can be considered. The Privacy and mobility are not
DTN behavioral change. The nodes may
nodes prefer to use their storage buffer for considered in most of the DTNs.
operate on a limited set of energy.
some known nodes.
In most of the VANETs, the data privacy, Bandwidth in some cases may be
Usually, energy and storage are not
VANET social likeness, and mobility of network considered due to the huge amount of
focused in most of the VANETs.
nodes are considered. traffic.
The smart nodes use a limited set of
Smart phones The phone set may have a limited
batteries. The phone may carry some Mobility and bandwidth are not
ad hoc amount of storage for keeping the data
sensitive private data and the users may considered in such networks.
network being forwarded to others.
have some social affiliations
Mobile sensor Limited energy, storage, and mobility of Bandwidth, secondarily, may lead to a Usually, such nodes do not
network nodes may affect the routing behavior. selfish behavior. consider the data privacy.

buffer for their own collected data, which in return does not a determination to save their resources. An example of the
allow another node to be entertained. All the nodes keep the mobile social network can be considered for such a case.
received relayed data saved with them until they get the People like to share common interests which form a com-
connectivity with their next hops. It is possible that the munity via mobile phones. These communities can be
nodes delete the received data before it is transmitted to considered as interest groups of mobile nodes where each
sparing their storage buffer for their own data [28]. The member tends to assist its community members only and
limited buffer size leads to defining appropriate buffer does not like to spare its resources on any stranger node.
management schemes. In some ad hoc networks, like DTNs, Moreover, previous connectivity and behavioral records can
the buffer management policy describes which message to also influence a node to socially like or dislike others [32].
keep and which to discard. This policy of prioritizing
messages for data buffer is assumed to be very fruitful by
[29]. In DTN, the nodes can adopt a selfish behavior due to 3.4. Bandwidth. In a network where nodes transmit bulky
their limited buffer storage which in turn can benefit them data their assigned bandwidth may need to be utilized. The size
for their own data transmission. However, the source nodes of bandwidth is always limited in nature. It is possible that the
needing multiple hops towards their destinations are highly nodes adopt particular cooperation or noncooperative be-
affected. The selfish nodes in such case never bother to havior according to the size of their assigned bandwidth.
request others for relay service with buffer usage for their Sometimes, the nodes cannot entertain any other relay re-
data transmission but in return regret for not giving any quester for data transmission due to the own bulky data [31].
space in their buffer to keep the relay requesters data Bandwidth limitation in most of the ad hoc networks is a
messages. Such act of selfish nodes is also referred to as considerable issue and addressed by many researches. In
routing misbehavior [28]. Figure 2 shows some nodes using WSNs, the sensor nodes operate on a very limited bandwidth
their limited storage buffers during data communication. as they cannot manage a higher data spectrum with their lower
energies and processing capabilities. Many authors proposed
node-level processing to reduce the load on communication
3.3. Social Likeness. Internet-based social networks have bandwidth [33]. Therefore, the nodes, if programmed with
made many interconnected relationships among the users. intelligence, prefer to use their communication channel for
Such networks touch countless aspects of our daily lives and their own data.
enable us to get people having similar mindsets. In social
networks, the selfishness of the user cannot be overlooked in
many terms. The far most reason for selfishness is the 3.5. Mobility Rate. In most of the MANETS, due to the
likeness and dislikeness [30]. Similarly, the smart or hu- mobility of nodes, the topological interconnections change
manly controlled nodes in an ad hoc network can also with the passage of time. If a node moves from one place to
consider the aspect of the social likeness during their another, it may break some connections and may establish
communication. Practically, sometimes the intermediate some new connections. It is palpable that the higher rate of
nodes drop the packets due to not giving any attention to the mobility nodes can exceedingly degrade the network per-
sender node. Social selfishness is usually associated with the formance. Sometimes, a relay node cannot change its lo-
DTNs type of networks in which most of the nodes are either cation in the network to avoid any data loss of the source
operated by humans or installed in vehicles [31]. The nodes node. It is also possible that a source node requests the relay
having no social ties do not cooperate with one another with nodes to not move until the completion of the data
6 Security and Communication Networks

Storage buffer already If X + Y > Z, then the node


keeping Y bytes Capacity
must either discard the
=
stored pending data or
Z bytes
drop the received packet

X bytes received

Node

Figure 2: Use of storage buffer during data transmission.

transmission. Since each smart node considers its own 4.1. Intrusion Detection System. An IDS can be a device or an
benefits, they may act selfishly and change their location embedded program that monitors the data traffic in a
without favoring any source node. Moreover, mobility network and detects any inappropriate behavior violating a
control can be incorporated into the mechanism for fault predefined policy or pattern. A typical IDS provides in-
tolerance [34]. The concept of cooperative mobility and formation about the nodes’ abnormal/malicious behavior in
communication appeared in the related literature in the a network. However, the same can be utilized for the de-
1970s. This key meaning is that each node in the network has tection of selfish nodes in the network. The IDS can be used
two possible modes, i.e., (a) selfish, which does not move for for detection purposes only and cannot be utilized for node
others but only prefers its own optimization, and (b) co- stimulation towards cooperation [41]. There are three major
operative, which takes care of the entire network and tries to classifications of IDSs: misuse-based detection, anomaly-
attain the aggregate goal [35]. based detection, and specification-based detection [22].

3.6. Privacy Concern. During communicating with each 4.2. Trust Management Schemes. Some proposed systems use
other, some nodes may require others’ private data. In a a trust development procedure among the nodes. The trust
general context, we can say that a network of mobile phones levels are defined based on the nodes’ cooperation level in
exists and each phone shares its location with others through the network. The nodes share their experiences about one
some applications. It is possible that a phone reads the another which ultimately let all the nodes understand each
locations of all the connected ones but never likes to share its other’s behavior. The knowledge-sharing about the past
own location. Such type of selfishness can be categorized into experiences of nodes leads them to develop a trust level
privacy or personal data sharing. According to a scheme about each node in the network. The selection of relay relies
proposed by HE et al. [36] for WSNs, clusters may share on the trust level of the next nodes in the potential route [42].
common data with each other while inside clusters some Various typical and sophistical schemes have been intro-
nodes may need to share their private data. duced in this domain. Most of the schemes are considered as
the fundamental and classical schemes for addressing self-
4. Solutions for Selfishness Management ishness in ad hoc networks. The trust is usually associated
with the nodes; however, the same can also be applied with
Many researchers target a primary domain like energy ef- the data. Data trust can be used to verify the authenticity of
ficiency, load balancing, reduced end-to-end delays, and data in the various types of ad hoc networks. Some authors
efficient storage buffer management while designing a selfish give a description of node trust and data trust in the VANETs
node management protocol. Various classifications of selfish [43].
node management schemes have been proposed in the area An old but still the most effective approach, watchdog
of security and routing in ad hoc networks. The schemes can and pathrater [37], is a selfish node detection and punish-
be classified in various ways. In this work, we divide the ment scheme. This approach is used to detect routing faults
selfish node management schemes into four classes: (a) IDS; by monitoring the behavioral aspects of involved network
(b)trust-based mechanism; (c) incentive-based mechanism; nodes. This scheme targets selfish and malicious nodes.
(d) evolution games theoretic approaches. Each class target Watchdog is a detection module while pathrater is used to
some particular types of ad hoc networks and have some block the misbehaving or problematic nodes. Another
pros and cons. For example, in WSNs, lightweight schemes similar approach, CONFIDENT [44], targets the malicious
which do not put extra load on radio transmission are nodes in a network. Four major modules are designed for
preferred. Some articles like [18] suggest credit-incentives- this approach. These modules are programmed in each
based schemes as a more suitable solution handling non- network node to achieve the aggregate goal of the optimal
cooperative environment in WSNs. The mentioned classes performance of the network. Many articles are using these
are explained in Table 2. two techniques as baselines for their proposed mechanisms.
Security and Communication Networks 7

Table 2: Classes of schemes used for selfish node management.


Class type Description Example
Detects and adaptively reports/blocks the noncooperative or misbehaving nodes in the
Detection mechanisms network Marti et al. [37]
Simple and straightforward schemes for treating all the nodes
Some trust levels are defined among the nodes
Shaikh et al.
Trust-based mechanisms Behavioral history of each node is logged and the nodes consider the trust levels among
[38]
them
A reputation level is made based on incentives granted
Reputation-based incentive
Nodes try to get more incentive by offering frequent relaying services for their better He et al. [39]
mechanisms
reputation
A pricing model is made
Credit-based incentive
Nodes are given some values for their data exchange Umar et al. [18]
mechanisms
The relaying service is paid by the source nodes for forwarding their data
A repetitive type of procedure is adopted in such mechanisms
Evolutionary game-theoretic Each node learns with the passage of time and adjusts its strategies to obtain an Gameda et al.
approaches equilibrium point for the entire network [40]
Most of the evolutionary games are applied in cluster-based WSNs

Some trust-based mechanisms like [38] are effective in classes of incentive-based mechanisms are explained in the
group or cluster-based ad hoc networks. The profiles of all following subsections.
the nodes are kept and distributed among all the nodes
through the group heads. The trust values are directly af-
fected by the behavioral aspects of nodes during the com- 4.3.1. Role of Game Theory. For the development of in-
munication and cooperation among the nodes. For effective centive-based mechanisms in ad hoc networks, game theory
and secure routing some trust-based schemes also incor- is given a vital role in the realization of the procedural
porate public keys for trust maintenance. analysis and quantization in the designing phase. Basically,
The protocols laying in this class can also be referred to the game theory is introduced in economics for the eval-
as node punishment-based mechanisms. The ultimate goal uation and processing of financial matters. This area is also
of carrying the detection and trust management in such used in social and biological sciences. However, this theory is
schemes is to punish the noncooperative or misbehaving recently adopted by many researchers for their proposals in
nodes by blocking them in the network. The blocked nodes wireless networks. A game can be considered as a set of
are also called black-listed nodes. Such nodes are not players, strategies of each player, payoff functions, the output
entertained for their own relay request by other nodes. or gains, and the equilibrium function. A typical ad hoc
Moreover, these nodes are not requested for any cooperation wireless network can be aligned with the game theory by
during the data transfer by any source node. taking network nodes as players, strategies as features and
The trust-based schemes are also introduced in the actions of nodes, and the payoff functions as the point where
emerging M2M and IoT architecture. In such types of ad hoc a node can balance its work with its energy consumption
networks, the heterogeneity of nodes is also considered at efficiently. The output can be considered as the outcome in
the base level [45]. terms of various concerns in a network like energy efficiency,
bandwidth usage, nodes’ storage usage, and overhead on
each node. Finally, the equilibrium point in a wireless
4.3. Incentive-Based Mechanism. Many researchers assume network can be considered as a situation in which each node
the incentive-based mechanisms as the most effective gets its optimal position addressing the aggregate benefits of
techniques in the same domain. These approaches consider the entire network.
the network nodes as rational and autonomous of any re- In most of the incentive-based selfish node management
striction for cooperation with one another. The nodes are systems, game theory is used to intelligently handle the
supposed to have their policy for adopting a work contri- nodes’ behavior according to the needs of a network.
bution strategy based on their individual interest. In such Various game types can be incorporated into the incentives
scenarios, the nodes are stimulated by using some incentives schemes. Examples of games are cooperative, noncoopera-
to let them cooperate with each other. The theme of these tive, repetitive, evolutionary, and bargaining games. The
approaches can be simply called “give and take” or “tit-for- selection of a game type for a scheme is dependent on the
tat” procedures. The incentive-based mechanisms can be nature of the network and the requirements. For example,
classified as reputation-based incentives and credit-based repetitive games are suitable for such networks where nodes
incentives. For designing such systems, many researches do not keep all the information in the beginning. Similarly,
proposed the incorporation of game theory in their pro- evolutionary games are considered more effective in cluster-
posed mechanisms. The role of game theory and the two based ad hoc networks.
8 Security and Communication Networks

4.3.2. Reputation-Based Mechanisms. The main theme of of a bargaining model is used in such schemes. The main
such techniques is inspired from the usage of reputation purpose is to make a competitive environment among the
levels of users in web-based services like Amazon and eBay. network nodes. Moreover, the calculation of currency for
The sellers and buyers are assigned some points according to buying and selling is also aligned with some procedures. For
their behavior. The nature of users in such web-based stores example, the key parameters of nodes, i.e., energy, storage,
can be judged by looking into their earned points. A similar and network hierarchical level, etc., can be considered for
concept can be used to evaluate the nodes’ participative fixing the amount of currency.
behavior in ad hoc networks. In the reputation-based In some ad hoc networks, like WSNs, nodes are con-
mechanisms, several reputation stages are made to classify nected to a central control through some hop nodes. Some
the nodes according to their level of participation. Those nodes are directly connected to the central station and do
nodes which do not cooperate or have less than a specified level not need any relaying service. Therefore, such nodes do not
of cooperation are punished by other nodes. Usually, such need to cooperate in any way and do not care about any
nodes are not offered any relay service by others. To obtain an currency maintenance. To overcome such cases, the central
acceptable state of behavior, each node tries to obtain adequate control also takes some exceptional measures by applying a
incentives by adaptively offering its services to other nodes. It is reputation or punishment-based mechanism [18]. Some
a kind of stimulation in which each node is pushed to co- authors also proposed a movement cost for letting the nodes
operate for the sake of its better reputation in the network [39]. move for the sake of an aggregate benefit [34]. The nodes are
The trust and reputation of network nodes cannot be given some benefits for their sacrificial movement in the field
considered similar due to many reasons. The trust is an in a cooperative manner. The main purpose of such in-
active entity while reputation can be considered passive. centives is to stimulate the network nodes for moving in the
Trust is a kind of peer node’s belief and so can be extended area for the sake of fault tolerance.
from a peer to its node, while reputation is the perception
level of nodes about each other. In some articles the trust is
also associated with risk factors and reputation is something 4.4. Evolutionary Games. In evolutionary games, the nodes
based on the history of a node. primarily do not use their strategic reasoning in the initial
Paper [46] points out the major issues associated with the stage. All the nodes in the network learn from their experi-
reputation-based incentives mechanisms. The foremost issue ences and then develop a model to design their strategies. This
is that these approaches do not adequately handle the node game is also known as a repetitive model in which the network
assessment process. The second issue is that the structuring of nodes learn with the passage of time [40]. In the same manner
groups of nodes cannot be designed efficiently in ad hoc with the passage of time the nodes evolve their behavior and
networks. The third issue with reputation-based mechanisms adjust the cooperation at an optimal level where both the
is that the nodes used their radio transmission excessively for individual node and the entire network are benefitted. The
obtaining information about each other. Therefore, many most stable situation in such type of mechanism is referred to
authors suggest the usage of credit-incentive-based mecha- as an evolutionary stable strategy or evolutionary equilibrium.
nisms for controlling the nodes’ behavior in a network. Most of the evolutionary-based mechanisms are designed for
cluster-based WSNs [8, 40]. The evolutionary games can also
be incorporated into the trust-based and incentive-based
4.3.3. Credit-Based Mechanisms. These schemes are also mechanism. Table 3 shows some proposed schemes for
called pricing-based schemes. Such schemes consider the handling selfish nodes in ad hoc networks.
data transmission and relaying support by network nodes as Table 4 shows some classical mechanisms which are
a service that must be paid. In credit-based incentive considered useful as guidelines and base techniques for
schemes, the worth for handling buy and sell or lease and developing new schemes. Most of these are taken as baselines
rent mechanism is obtained by several forms of values. Some for the development of advanced techniques for selfishness
of these are referred to as virtual currency, scores, money, management in ad hoc networks.
and points. The pricing schemes also need an additional log
for keeping the record of exchanges of these values. Each 5. Analysis of Proposed Schemes and Discussion
node upon giving relaying service obtains an amount of
virtual currency from the source nodes. Each relaying node In this work, a comparative analysis of five different pro-
earns this currency and uses it for its data transfer. Nodes tocols is made by taking a WSN as a model network. These
having no or fewer values of currency cannot be able to pay protocols are DSR[ref], DSR with selfish nodes [18], Reward-
the relaying service and so cannot transmit their data. In based Mechanism (RwBM) [18], GREET [40], and GTMS
such a scenario, each node tries to maintain a trade-off [38]. The results are made by varying three major param-
between its resource consumption and virtual currency eters, i.e., the number of nodes, pause time, and the ratio of
collections. Such techniques give nodes a degree of intelli- selfish nodes. The results are calculated for taking the five
gence for optimization of their resources along with the performance metrics in the network, i.e., energy con-
network performance [46]. sumption, end-to-end delays, throughput, packet delay ratio
The credit-incentive schemes can be applied in many (PDR), and packet loss ratio. The work is simulated in
ways. Some articles introduced a bargaining environment NS2.35 under Ubuntu operating system. The key parameters
between the relaying and the source nodes. The game theory for simulation are listed in Table 5.
Security and Communication Networks 9

Table 3: Proposed schemes for selfish node management in ad hoc networks.


Article Mechanism Description
(i) A route selection problem is modeled by using a game-theoretic approach.
Attiah et al. [8],
Evolutionary game (ii) The replicator dynamics mechanism is used to indicate that the nodes can be trained from
2018
their strategies and hence modify their strategies sets with time.
(i) The work combines a lightweight neural network with specification rules for anomaly
Subba et al. [41], detection to identify misbehaving nodes in the network.
Detection
2018 (ii) A Bayesian game is designed which takes the IDS and the sensor nodes as two
noncooperative players.
Umar et al. [18], (i) Virtual currency referred to as scores is used for selfish node stimulation.
Incentive-based
2018 (ii) Scores are calculated by taking many nodes’ and network’s parameters.
(i) The selection of cluster heads is done by using the multiple constraint aware glow worm
Raja et al. [42], swarm optimization approach (MC-GSO). Every node is evaluated in the network according
Trust management
2018 to this approach.
(ii) Various objectives are achieved for the trust metrics during the cluster head selection.
(i) Particularly designed for clustered WSN with an aim to balance the consumption of energy
Yang et al. [47], among all the nodes.
Incentive-based
2017 (ii) A convex payoff function is designed for the behavior of each node. The game is derived
with the help of this convex optimization.
Gemeda et al. [40], Evolutionary game- (i) Targets cluster-based WSNs.
2017 based (ii) Mainly focus on the cluster heads manipulation and selection process.
(i) Nodes are pushed to cooperate in routing by using some incentives.
Yu [48], 2016 Incentive-based
(ii) Some values are exchanged for getting data communication and relay services.
(i) The work is proposed for VANETs where the trustworthiness of both mobile sensor nodes
and transmitted data is evaluated.
Li et al. [43], 2015 Trust management
(ii) The recommendation trust and functional trust are categorized to indicate nodes’
performance.
(i) A trust-aware routing frame is designed by incorporating lightweight and proficient attacks
Duan et al. [17], resistant mechanism.
Trust management
2014 (ii) The common features associated with attacks in terms of trust awareness are addressed.
(iii) The trust derivation is based on the analysis of results.
Chen et al. [21], (i) The cooperation level of each node is calculated and the selfish nodes are punished by
Detection
2013 blocking them in the network.
Xu and Guo [49], (i) Particularly target opportunistic networks.
Incentive-based
2012 (ii) The incentive exchange is made through various rounds of a bargaining game.
(i) Uses highly expandable cluster and hierarchical trust-based management protocol for
Bao et al. [50], 2012 Detection
efficiently detecting the malicious and the selfish.

Table 4: Fundamental/classical selfishness management schemes.


Article Mechanism Description
Reputation and (i) Well-known as watchdog and pathrater
Marti et al. [37], 2000
detection (ii) Watchdog detects misbehaving nodes and pathrater blocks targeted nodes
Boudec and le [44], (i) CONFIDENT, a reactive routing protocol that uses four major modules for
Trust and detection
2002 detection and blockage of selfish nodes
(i) Only the cooperative nodes are allowed to transfer their data
Buttyan and hubaux Detection and incentive-
(ii) The concept of virtual currency is used by introducing packet trade and packet
[51], 2003 based
purs
(i) A credit-based incentive exchange scheme is used
Zhong et al. [52], 2003 Incentive-based
(ii) The scheme particularly targets mobility in MANETs like networks
Evolutionary game- (i) Nodes operate according to a predefined set of states
Chen et al. [26], 2011
based (ii) The nodes adjust their selfishness level with time

5.1. Energy Consumption. Since energy consumption is al- considering either the routing energy consumption or the
ways considered in ad hoc networks, almost all the protocols average energy consumption. In routing energy consump-
designed for such networks are evaluated in terms of the tion, the network layer of the protocol is checked only to
nodes’ life. The energy consumption rate can be affected by determine the energies of nodes in a network, while the
the simulation parameters and the routing protocol design. average energy consumption is the mean value of all nodes’
A network energy consumption can be evaluated by consumed energies. Energy can be calculated by taking the
10 Security and Communication Networks

Table 5: Simulation parameters.


Parameter Value
Area 500 × 500
Network type WSN
Number of nodes 50–300
Ratio of selfish nodes Up to 5%
Node distribution Random
Comparisons DSR, DSR with selfish nodes, GREET, GTMS, and RwBM
Initial energy 100
Rx power 0.3
Tx power 0.6
Size of the packet header 4 bytes
RSc header size (RwBM) 4 bytes
IBSc header size (RwBM) 4 bytes
Movement trace Off
Cluster size (GREET) Game-based (varying)
Cluster size (GTMS) 9 nodes
Traffic source CBR
Packet protocol TCP
Threshold distance for CNs (RwBM) 50
Threshold participation (RwBM) 0.4
Threshold lambda (RwBM) 0.5

sum of transmit, idle, receive, and sleep power in all layers in 30


a simulation environment. The existence of selfish nodes in
an ad hoc network can highly affect the rate of energy 25
consumption in the overall network.
Avg. energy (joules)

20
In Figure 3 the average energy consumed over 15 dif-
ferent time pauses of the experimented protocols is recor- 15
ded. For this experiment, a set of 100 nodes with 5% selfish
nodes are taken. The DSR protocol is mainly designed for ad 10
hoc networks having mobile nodes. In WSN DSR does not
utilize its features for handling the mobility of nodes. 5
Therefore, its performance may be not optimal as compared
to specialized protocols designed for WSNs having static 0
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
nodes. The performance of SELFISH-DSR is the worst in the # of nodes
figure. It is because there is no such selfish node handling
mechanism. GTMS is quite responsive by giving a moderate DSR GREET
level of results for energy consumption. This mechanism SELFISH-DSR GTMS
RwBM
mainly utilizes the trust reciprocity among the nodes. The
technique is much better than DSR and SELFISH-DSR Figure 3: Average energy consumption at twenty time pauses.
protocols. However, due to a simple mechanism for repu-
tation and mutual trust mechanism, GTMS is giving In Figure 4, there are 5% selfish nodes and values are
comparatively lower results than GREET and RwBM pro- noted at time pause 10. All the mechanisms are giving
tocols. GREET has the lowest level of energy consumption at consistent values except the SELFISH-DSR. Since there is no
most of the time. Since this protocol is cluster-based and mechanism for the selfishness of nodes, energy consumption
mainly designed to evaluate all the previous strategies of is increasing with the increased number of nodes. The
nodes, it has put less communication overhead on nodes for number of selfish nodes is proportional to the number of
passing control and information messages. RwBM initially nodes but the placement of selfish nodes over the same area
loads the scoring mechanism which takes some time to give greatly affects the performance of SELFISH-DSR. GTMS is
the accurate result values. In initial pause times, it is giving giving similar results as in the previous experiment of pause
very low values which indicates that the communication is times. However, its performance is declining with a number
not started properly. GREET, compared with RwBM, gives of nodes higher than 200. We can assume that the trust
comparatively the best results for many time pauses. mechanism may start failing with a large number of nodes. It
However, due to its cluster-based type, after a longer period, is also possible that the trust mechanism with densely
the increase in energy consumption can be noted due to the deployed nodes may not be efficiently effective. The in-
rapid elimination of nodes from the network. In cluster- centive-based mechanism, RwBM, is giving almost similar
based networks, all the nodes may start dying rapidly one values for all the variations in the number of nodes. RwBM
after another. has a mechanism to deal with the nodes’ individual
Security and Communication Networks 11

40 45
35 40
35
30

Avg. energy (joules)


Avg. energy (joules)

30
25
25
20
20
15 15
10 10
5 5

0 0
50 100 150 200 250 300 4 8 12 16 20
# of nodes # of selfish nodes
RwBM GREET
DSR GREET
SELFISH-DSR GTMS
SELFISH-DSR GTMS
RwBM Figure 5: Average energy consumption with an increased number
of selfish nodes.
Figure 4: Average energy consumption with an increasing number
of sensor nodes.

350
importance based on the nodes’ density in the network.
Therefore, the mechanism aligns the values of incentives 300
according to the number of nodes and the average energy
Throughput (KPBS)

250
consumption is not affected by the increased number of
nodes, while GREET has very impressive results by giving 200
the least values in this experiment. The energy consumption 150
by nodes is decreased with the increased number of nodes. It
is because the mechanism is based on evolutions and the 100
nodes learn from each other and the time period. As the
50
number of nodes is increased, the optimal point or the
nodes’ maturity level is obtained earlier, and the optimal 0
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
strategies are adopted by all the nodes well in time.
# of nodes
Figure 5 shows the third experiment relating the average
energy consumption of the nodes in a WSN. There are 100 DSR GREET
sensor nodes and the time pause used for recording values is SELFISH-DSR GTMS
10. The response for an increased number of selfish nodes is RwBM
notable in all the protocols. SELFISH-DSR is giving support Figure 6: Average throughput at twenty time pauses.
for selfishness; therefore, the energy consumption is highly
increased with each rise in the number of selfish nodes. The
performance of GTMS is also not well with the higher taken in a smooth flow and equally treated in GTMS.
number of selfish nodes. It is because of the mutual repu- Therefore, the throughput of this protocol is slightly in-
tation and trust mechanism. Each node mutual with a selfish creasing with time and becomes consistent after time pause
node also changes its behavior. GREET and RwBM are 9. The throughputs of RwBM and GREET are very unpre-
giving similar results. These protocols have incorporated dictable but higher than GTMS and DSR protocols. RwBM
appropriate mechanisms for handling selfish nodes in the does not give any value at time pause 1 in our simulation
network; therefore, both are giving very little hike in the environment due to its score loading and configuration
energy consumption against the increased number of selfish process. Later due to scores’ exchange and periodic updating
nodes. of each node the throughput highly fluctuates. GREET
initially has similar throughput as in RwBM. In GREET, the
nodes learn repetitively by using an evolutionary game.
5.2. Throughput. Throughput is the total quantity of data Therefore, the throughput is lower and cannot be predicted
that reaches a destination node from the source node at a at initial pause times. Later once the nodes learn from the
particular time. It can be used to determine the effectiveness environment, after time pause 5, the nodes adjust their
of a routing scheme. utility functions and deliver a better throughput.
In Figure 6, the average throughput of SELFISH-DSR is The effect of a varying number of nodes on the
very low at 6 kbps for almost all the pause times. It is giving experimented protocols is shown in Figure 7. The values are
lower throughput than a normal DSR in a network without recorded at time pause 10 and the ratio of selfish nodes is 5%.
any selfish node. The throughput of GTMS is moderate and The results are similar to the previous figure. The evolution
consistent due to its communication style. The nodes are game-based approach, GREET, is giving a very positive
12 Security and Communication Networks

350 250

300
200
Throughput (KBPS)

250

Throughput (KBPS)
200 150

150
100
100

50 50

0
50 100 150 200 250 300 0
4 8 12 16 20
# of nodes
# of selfish nodes
DSR GREET
RwBM GREET
SELFISH-DSR GTMS
SELFISH-DSR GTMS
RwBM
Figure 8: Average throughput with an increased number of selfish
Figure 7: Average throughput with an increasing number of sensor nodes.
nodes.

response to the increased number of nodes. RwBM is giving 14


similar fluctuating results for each experiment. Here again,
we can conclude that the RwBM, due to its scoring 12
mechanism, gives slightly random results. However, RwBM 10
is giving much better results than GTMS and DSR. The
Delays (MS)

throughput of GTMS is also increased in this experiment. 8


In the last experiment for throughput, shown in Figure 8, 6
100 nodes are taken. The performance of GTMS is very low
with an increased number of selfish nodes. It cannot manage 4
the higher number of selfish nodes that leads to a lower value
2
of the throughput. RwBM and GREET are also marginally
affected. However, this decrease in the throughput can be 0
considered as a very minor effect. In this experiment, the 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
GREET outperforms due to its advanced mechanism. Pause time
DSR GREET
SELFISH-DSR GTMS
5.3. End-to-End Delays. In ad hoc networks, the high data RwBM
rates are not essentially required but delay constraint is
Figure 9: Average end-to-end delays at twenty time pauses.
greatly considered. If the required information is delayed,
then it might be not useful in the network. Therefore, we
calculate the average delay rate in each protocol to determine and the act of selfishness is not handled properly. Moreover,
their performance. The packet end-to-end delay is the in cluster scenarios it is common to have higher delays in the
meantime that a packet consumes to reach the destination initial stages. RwBM and GREET are giving similar results
from a source node. In our scenario of WSN, we are taking after time pause 6. RwBM does not give the values in our
the base station as the destination node. Delays in a network simulation environment which is most likely due to the
usually associate the speed of MAC control exchange, buffer scoring mechanism and the adjustment of selfishness by
queues, radio transmission, and routing mechanisms. In our each individual node. Moreover, the work is taking all the
assessment, we are comparing the routing mechanism and parameters of nodes which takes some time to be com-
all other parameters are considered as similar. municated and configured properly. One of the nodes is
In Figure 9, nodes are taken. The ratio of selfish nodes is configured and the scoring mechanism is loaded; then the
5%. The experiments indicate that the end-to-end delays for delays become similar at all the time intervals.
DSR are higher than other protocols. DSR can be more Figure 10 shows the end-to-end delays with respect to an
efficient if used in a mobile node environment. Moreover, increased number of nodes in a network. The results show
reactive protocols are less efficient than proactive protocols that GREET is the only protocol that gives no effect to the
in delays matric. The reputation and trust levels in GTMS are delays with the changed number of nodes. RwBM is also
developed over time. Each node considers the history of its giving somehow similar results. RwBM also uses a card
connected hops; therefore, in the higher pause times, the system which may take some time to process. In the card
delay is decreased. GREET initially produces higher delays system, some nodes are blocked. Node blockage can also
due to its learning nature. The nodes cannot respond quickly increase the delays in a network by breaking some routes.
Security and Communication Networks 13

25 30

25
20

20

Delays (MS)
Delays (MS)

15
15
10
10

5 5

0 0
50 100 150 200 250 300 4 8 12 16 20
# of nodes # of selfish nodes

DSR GREET RwBM GREET


SELFISH-DSR GTMS SELFISH-DSR GTMS
RwBM Figure 11: Average end-to-end delays with an increased number of
Figure 10: Average end-to-end delays with an increasing number selfish nodes.
of sensor nodes.
0.95
However, the change is noted at 200 and 300 nodes in the 0.9
experiments. GTMS is giving similar results till 150 nodes. It
is also affected by the higher number of nodes in many 0.85
PDR (recv/sent)

experiments. 0.8
Figure 11 shows the end-to-end delays with an increased 0.75
number of selfish nodes in the network. A set of 100 nodes is
0.7
taken for these experiments. The response ratio of delays in
all the protocols is similar. Each protocol is giving a negative 0.65
result due to the increased number of selfish nodes. In 0.6
comparison, GREET and RwBM are giving the best results in
0.55
these experiments. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Pause time
DSR GREET
5.4. Packet Delivery Ratio. PDR is the ratio of the number of SELFISH-DSR GTMS
data packets sent by a source node to the number of data RwBM
packets received by the source node. This metric can be used
Figure 12: Packet delivery ratio at twenty time pauses.
to measure the success or loss rate and characterizes the
efficiency and correctness of routing protocols in ad hoc
networks. The higher PDR indicates the better performance PDR is decreasing in SELFISH-DSR only due to its in-
of a protocol. completeness. In GREET, every node is a selfish node;
Figure 12 shows the PDR for each node at different time therefore, the increased number of selfish nodes does not
pauses. 100 nodes with 5% selfish nodes are taken. Almost all affect any change in its PDR value. RwBM, as usually, is
the protocols except SELFISH-DSR are giving similar PDR. giving uneven PDR for each number of selfish nodes. It is
Initially, GREET gives lower PDR due to its learning phase. due to the provision for selfishness level adjustment and
RwBM is giving appropriate values for PDR after time pause scoring and card system in the mechanism. GTMS is
4. SELFISH-DSR does not keep any selfishness management; comparatively giving very interesting results by producing
therefore, its performance in this experiment is the worst. higher PDR values for the higher number of selfish nodes.
Figure 13 shows the PDR for each protocol with the Nodes operate on trust levels and selfishness is managed
increased number of nodes in the network. Here again, the through reputations and trust reciprocation among the
results of all the protocols are similar except SELFISH-DSR nodes.
which has lower but consistent PDR for all the sets of nodes.
As the number of nodes is increased, the PDR value is also
increased. It is due to the availability of multiple routes and 5.5. Packet Loss Ratio. The packet loss ratio is used to get the
the decreasing possibility of packet losses. All the results are failure rate of reception of transmitted packets. This value
taken at time pause 10 and the ratio of selfish nodes is set to can be associated with signal degradation, the existence of
5%. misbehaving or selfish nodes, and routing mechanisms. In
The number of selfish nodes, if increased, also does not Figures 15, 16, and 17, the results are reflected by the results
affect the experimented protocols as shown in Figure 14. The for PDR already discussed. Here in these experiments, the
14 Security and Communication Networks

0.75 0.45

0.7 0.4

Packet loss (lost/sent)


PDR (recv/sent)

0.65 0.35

0.6 0.3

0.55 0.25
50 100 150 200 250 300 50 100 150 200 250 300
# of nodes # of nodes

DSR GREET DSR GREET


SELFISH-DSR GTMS SELFISH-DSR GTMS
RwBM RWBM

Figure 13: Packet delivery ratio with an increasing number of Figure 16: Packet loss ratio with an increasing number of sensor
sensor nodes. nodes.

0.75 0.45
Packet loss (lost/sent)

0.7 0.4
PDR (recv/sent)

0.35
0.65

0.3
0.6

0.25
4 8 12 16 20
0.55
4 8 12 16 20 # of selfish nodes
# of selfish nodes RWBM GREET
RwBM GREET SELFISH-DSR GTMS
SELFISH-DSR GTMS Figure 17: Packet loss ratio with an increased number of selfish
Figure 14: Packet delivery ratio with an increased number of selfish nodes.
nodes.
packet loss ratio for SELFISH-DSR is comparatively higher
than other protocols. All other protocols are giving similar
0.45 results in these experiments.
0.4
0.35
Packet loss (lost/sent)

6. Conclusion
0.3
The existence of selfish nodes is widespread in wireless
0.25
networks, particularly in ad hoc networks where an intel-
0.2 ligent program or human controls the nodes. The nodes can
0.15 be programmed to preserve their individual resources by not
cooperating in the aggregate network goals. Several schemes
0.1
have been introduced to overcome the issues of having such
0.05 nodes in an ad hoc network. The selfish nodes can be
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Pause time
managed either by blocking them or by stimulating them to
participate in the network. In recent literature, credit-based
DSR GREET incentive schemes are considered more effective and efficient
SELFISH-DSR GTMS for handling misbehaving or noncooperative nodes in ad
RwBM
hoc networks. Game theory is also used to realize the design
Figure 15: Packet loss ratio at twenty time pauses. and implementation of incentive-based schemes.
Security and Communication Networks 15

The incentive-based schemes can be used by opting for networks for disaster response scenarios,” International Journal
artificial neural networks (ANN) instead of the application of Distributed Sensor Networks, vol. 11, no. 10, Article ID 647037,
of game theory. The repeated games can be replaced with an 2015.
ANN module in which the neurons are trained with the [3] M. M. Nasralla, N. Khan, and M. G. Martini, “Content-aware
passage of time. Moreover, the prevailing schemes can be downlink scheduling for LTE wireless systems: a survey and
performance comparison of key approaches,” Computer
interchangeably used in other forms of ad hoc networks. For
Communications, vol. 130, pp. 78–100, 2018.
example, a scheme designed for WSNs can be used in [4] C. Zhang and J. Wang, “Energy-efficient resource allocation
MANETs by handling the mobility or can be used in Internet for energy harvesting-based cognitive machine-to-machine
of Things by considering various factors like heterogeneity communications,” IEEE Transactions on Cognitive Commu-
and mobility. Moreover, the types of games can be changed nications and Networking, vol. 5, no. 3, pp. 595–607, 2019.
in such schemes for better optimization of the network [5] N. Choudhury, R. Matam, M. Mukherjee, and J. Lloret, “LBS:
performance. a beacon synchronization scheme with higher schedulability
The simulation results show that the network perfor- for ieee 802.15.4 cluster-tree-based IoT applications,” IEEE
mance is highly degraded without any mechanism for Internet of Things Journal, vol. 6, no. 5, 2019.
selfishness, as reflected by SELFISH-DSR protocol. The trust [6] N. Choudhury and R. Matam, “Distributed beacon scheduling
management scheme, GTMS, is giving acceptable results by for IEEE 802.15. 4 cluster-tree topology,” in Proceedings of the
addressing the target scenarios. However, it has relatively 2016 IEEE Annual India Conference (INDICON), pp. 1–6,
New York, NY, USA, December 2016.
lower performance in almost all the experiments except the
[7] L. Buttyan and J.-P. Hubaux, “Enforcing service availability in
PDR and packet loss ratio experiments. GREET is out- mobile ad-hoc WANs,” in Proceedings of the First Annual
performing in many experiments due to its advanced Workshop on Mobile and Ad Hoc Networking and Computing.
technique of letting the nodes understand the situation and MobiHOC (Cat. No.00EX444), Catania, Italy, July 2000.
adjust their cooperation level according to their benefits and [8] A. Attiah, M. F. Amjad, M. Chatterjee, and C. Zou, “An
the network needs. RwBM is also giving very good results evolutionary routing game for energy balance in Wireless
due to its sophisticated technique by considering all the Sensor Networks,” Computer Networks, vol. 138, pp. 31–43,
nodes’ parameters and a state-of-the-art design of incentives 2018.
for data communication. According to our experimental [9] O. Younis and S. Fahmy, “HEED: a hybrid, energy-efficient,
results, we can conclude that the selfishness of nodes can be distributed clustering approach for ad hoc sensor networks,”
managed by either the incentive-based or the evolutionary- IEEE Transactions on Mobile Computing, vol. 3, no. 4,
based mechanisms. However, it must be noted that these pp. 366–379, 2004.
[10] X. Wu, G. Chen, and S. K. Das, “Avoiding energy holes in
experiments are made according to our understanding and
wireless sensor networks with nonuniform node distribu-
cannot be considered as perfect. More work can be done in tion,” IEEE Transactions On Parallel And Distributed Systems,
the analysis and comparisons of various protocols designed vol. 19, no. 5, pp. 710–720, 2008.
in the domain of selfish node management in ad hoc [11] G. S. Brar, S. Rani, V. Chopra, R. Malhotra, H. Song, and
networks. S. H. Ahmed, “Energy efficient direction-based PDORP
routing protocol for WSN,” IEEE Access, vol. 4, pp. 3182–
Data Availability 3194, 2016.
[12] M. M. Nasralla, I. Garcı́a-Magariño, and J. Lloret, “MASE-
No data were used to support this study. MUL: a simulation tool for MovementAware manet sched-
uling strategies for multimedia communications,” Wireless
Conflicts of Interest Communications and Mobile Computing, vol. 2021, Article ID
6651402, 12 pages, 2021.
The authors declare that they have no conflicts of interest. [13] K. M. S. Huq, S. Mumtaz, J. Rodriguez et al., “Enhanced C-ran
using D2D network,” IEEE Communications Magazine,
vol. 55, no. 3, pp. 100–107, 2017.
Acknowledgments [14] M. Mukherjee, R. Matam, L. Shu et al., “Security and privacy
in fog computing: Challenges,” IEEE Access, vol. 5,
The authors acknowledge Prince Sultan University and
pp. 19293–19304, 2017.
Smart Systems Engineering Lab for their valuable support [15] H. Gong, L. Yu, and X. Zhang, “Social contribution-based
and provision of research facilities that were essential for routing protocol for vehicular network with selfish nodes,”
completing this work. Furthermore, the authors acknowl- International Journal of Distributed Sensor Networks, vol. 10,
edge the support of PSU for paying the Article Processing no. 4, Article ID 753024, 2014.
Charges (APC) of this publication. [16] S. N. Shah and R. H. Jhaveri, “A survey of various approaches
to detect selfishness in wireless adhoc networks,” in Pro-
References ceedings of the Green Computing and Internet of Things
(ICGCIoT), Greater Noida, India, January 2015.
[1] N. Choudhury, R. Matam, M. Mukherjee, and L. Shu, “Beacon [17] J. Duan, D. Yang, H. Zhu, S. Zhang, and J. Zhao, “TSRF: a
synchronization and duty-cycling in ieee 802.15.4 cluster-tree trust-aware secure routing framework in wireless sensor
networks: a review,” IEEE Internet of Things Journal, vol. 5, networks,” International Journal of Distributed Sensor Net-
no. 3, pp. 1765–1788, 2018. works, vol. 10, no. 1, Article ID 209436, 2014.
[2] D. G. Reina, M. Askalani, S. L. Toral, F. Barrero, [18] M. M. Umar, S. Khan, R. Ahmad, and D. Singh, “Game
E. Asimakopoulou, and N. Bessis, “A survey on multihop ad hoc theoretic reward based adaptive data communication in
16 Security and Communication Networks

wireless sensor networks,” IEEE Access, vol. 6, no. 1, IEEE Global Telecommunications Conference, 2008. IEEE
pp. 28073–28084, 2018. GLOBECOM, New Orleans, Louisiana, December 2008.
[19] H.-Y. Shi, “Game theory for wireless sensor networks: a [35] A. Al-Fuqaha, B. Khan, A. Rayes, M. Guizani, O. Awwad, and
survey,” Sensors, vol. 12, no. 7, Article ID 90559097, 2012. G. B. Brahim, “Opportunistic channel selection strategy for
[20] H. A. Muhammad, T. A. Yahiy, and N. Al-Salihi, “Com- better QoS in cooperative networks with cognitive radio
parative study between reactive and proactive protocols of capabilities,” IEEE Journal On Selected Areas In Communi-
(MANET) in terms of power consumption and quality of cations, vol. 26, no. 1, pp. 156–167, 2008.
service,” in Proceedings of the International Conference on [36] W. He, X. Liu, H. Nguyen, K. Nahrstedt, and T. Abdelzaher,
Computer Networks, Madurai, India, December 2019. “Pda: privacy-preserving data aggregation in wireless sensor
[21] B. Chen, J.-L. Mao, N. Guo, G.-H. Qiao, and N. Dai, “An networks,” in Proceedings of the INFOCOM 2007. 26th IEEE
incentive detection mechanism for cooperation of nodes International Conference on Computer Communications,
selfish behavior in wireless sensor networks,” in Proceedings of Washington, DC, May 2007.
the 2013 25th Chinese Control and Decision Conference [37] S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating routing
(CCDC), Guiyang, China, May 2013. misbehavior in mobile ad hoc networks,” in Proceedings of the
[22] I. Butun, S. D. Morgera, and R. Sankar, “A survey of intrusion MOBICOM, Article ID 255265, New York, NY, USA, 2000.
detection systems in wireless sensor networks,” IEEE Com- [38] R. A. Shaikh, H. Jameel, B. J. d’Auriol, H. Sungyoung Lee, and
munications Surveys & Tutorials, vol. 16, no. 1, pp. 266–282, Y. J. Young-Jae Song, “Group-based trust management
2014. scheme for clustered wireless sensor networks,” IEEE
[23] K. Balakrishnan, J. Deng, and V. K. Varshney, “TWOACK: Transactions on Parallel and Distributed Systems, vol. 20,
preventing selfishness in mobile ad hoc networks,” in Pro- no. 11, pp. 1698–1712, 2009.
ceedings of the IEEE Wireless Communications and Net- [39] Q. He, D. Wu, and P. Khosla, “SORI: a secure and objective
working Conference, New Orleans, LA, USA, May 2005. reputation-based incentive scheme for ad-hoc networks,”
[24] [. G. Kampitaki, E. D. Karapistoli, and A. A. Economides, IEEE Wireless Communications and Networking Conference,
“Evaluating selfishness impact on MANETs,” in Proceedings of vol. 2, 2004.
the International Conference on Telecommunications and [40] K. A. Gemeda, G. Gianini, and M. Libsie, “An evolutionary
Multimedia, Xi’an, China, July 2014. cluster-game approach for wireless sensor networks in non-
[25] A. Mei and J. Stefa, “Give2Get: forwarding in social mobile collaborative settings,” Pervasive and Mobile Computing,
wireless networks of selfish individuals,” IEEE Transactions on vol. 42, 2017.
Dependable and Secure Computing, vol. 9, no. 4, pp. 569–582, [41] B. Subba, S. Biswas, and S. Karmakar, “A game theory based
2012. multi layered intrusion detection framework for wireless
[26] Z. Chen, Y. Qiu, J. Liu, and L. Xu, “Incentive mechanism for sensor networks,” International Journal of Wireless Infor-
selfish nodes in wireless sensor networks based on evolu- mation Networks, vol. 25, 2018.
tionary game,” Computers & Mathematics with Applications, [42] R. Raja and P. G. Kumar, “Designing a novel framework for
vol. 62, no. 9, pp. 3378–3388, 2011. evaluation of trust in mobile ad-hoc networks,” Journal of
[27] M. Manjula and P. Elango, “A survey of selfish nodes be- Computational and Theoretical Nanoscience, vol. 15, no. 1,
haviour in Mobile Adhoc network,” International Journal of pp. 338–344, 2018.
Computer Trends and Technology (IJCTT), vol. 4, no. 6, [43] W. Li and H. Song, “ART: an attack-resistant trust man-
pp. 1848–1851, 2013. agement scheme for securing vehicular ad hoc networks,”
[28] S. J. Borah, S. K. Dhurandher, I. Woungang, and V. Kumar, “A IEEE Transactions on Intelligent Transportation Systems,
game theoretic context-based routing protocol for opportu- vol. 17, no. 4, pp. 960–969, 2015.
nistic networks in an IoT scenario,” Computer Networks, [44] S. B. Boudec and J.-Y. Le, “Performance analysis of the
vol. 129, pp. 572–584, 2017. CONFIDANT protocol,” in Proceedings of the 3rd ACM In-
[29] J. F. Naves, I. M. Moraes, C. V. Albuquerque, and L. e. lrf, ternational Symposium on Mobile Ad Hoc Networking &
“Politicas de gerenciamento de buffer eficientes para redes Computing - MobiHoc ’02, New York; NY; USA, July 2002.
tolerantes a atrasos e desconexoes,” Simp´osio Brasileiro de [45] Y. B. Saied, A. Olivereau, D. Zeghlache, and M. Laurent,
Redes de Computadores (SBRC 2012), vol. 15, pp. 293–305, “Trust management system design for the Internet of Things: a
2012. context-aware and multi-service approach,” Computers &
[30] C. Sinha, “Providing social likeness within a messaging Security, vol. 39, pp. 351–365, 2013.
context”. U.S Patent 8600901, 3 December 2013.. [46] H. Janzadeh, K. Fayazbakhsh, M. Dehghan, and M. S. Fallah,
[31] Q. Li, W. Gao, S. Zhu, and G. Cao, “A routing protocol for “A secure credit-based cooperation stimulating mechanism
socially selfish delay tolerant networks,” Ad Hoc Networks, for MANETs using hash chains,” Future Generation Computer
vol. 10, no. 8, pp. 1619–1632, 2012. Systems, vol. 25, no. 8, pp. 926–934, 2009.
[32] Y. Li, G. Su, D. O. Wu, D. Jin, L. Su, and L. Zeng, “The impact [47] L. Yang, Y. Lu, L. Xiong, Y. Tao, and Y. Zhong, “A game
of node selfishness on multicasting in delay tolerant net- theoretic approach for balancing energy consumption in
works,” IEEE Transactions on Vehicular Technology, vol. 60, clustered wireless sensor networks,” Sensors, vol. 17, no. 11,
no. 5, Article ID 22242238, 2011. p. 2654, 2017.
[33] J. M. Sánchez-Matamoros, J. M.-d. Dios, and A. Ollero, [48] Q. L. X. Yu, “An incentive mechanism game theory based for
“Cooperative localization and tracking with a camerabased cooperation in wireless ad hoc networks,” in Proceedings of the
WSN,” in Proceedings of the 2009 IEEE International Con- 9th International Congress on Image and Signal Processing,
ference on Mechatronics, Málaga, Spain, April 2009. BioMedical Engineering and Informatics (CISP-BMEI),
[34] G. Brahim, A. Al-Fuqaha, M. Guizani, and B. Khan, “A model Datong, China, October 2016.
for cooperative mobility and budgeted QoS in MANETs with [49] Q. Xu, Z. Su, and S. Guo, “A game theoretical incentive
heterogenous autonomy requirements,” in Proceedings of the scheme for relay selection services in mobile social networks,”
Security and Communication Networks 17

IEEE Transactions on Vehicular Technology, vol. 65, no. 8,


pp. 6692–6702, 2016.
[50] F. Bao, I.-R. Chen, M. Chang, and J.-H. Cho, “Hierarchical
trust management for wireless sensor networks and its ap-
plications to trust-based routing and intrusion detection,”
IEEE Transactions On Network And Service Management,
vol. 9, no. 2, pp. 169–183, 2012.
[51] L. Buttyán and J.-P. Hubaux, “Stimulating cooperation in self-
organizing mobile ad hoc networks,” Mobile Networks and
Applications, vol. 8, no. 5, pp. 579–592, 2003.
[52] S. Zhong, J. Chen, and Y. R. Yang, “Sprite: a simple, cheat-
proof, credit-based system for mobile adhoc networks,” in
Proceedings of the IEEE INFOCOM 2003. Twenty-Second
Annual Joint Conference of the IEEE Computer and Com-
munications Societies (IEEE Cat. No.03CH37428), San Fran-
cisco, CA, USA, March 2003.

You might also like