SlideShare a Scribd company logo
1 of 3
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 618
DETECT AND OVERCOME THE SELFISH PROBLEM IN WIFI
NETWORK USING ENERGY SHARING
Preethi.S1
, Srigitha S. Nath2
, Bhargavi.S3
1PG Scholar, Department of ECE, Saveetha Engineering College, Tamil Nadu, India
2Head of Department, Department of ECE, Saveetha Engineering College, Tamil Nadu, India
3PG Scholar, Department of ECE, Saveetha Engineering College, Tamil Nadu, India
Abstract
Wireless Sensor networks and Wireless Ad Hoc networks are upcoming fields that demonstrate merit in the research domain due to
their versatile nature. Our goal is to detect the misbehaviour in wireless LAN and to overcome this problem. Nodes tend to misbehave
when their energy level is below a particular level and this scenario is labelled as selfish behaviour. The main idea of this paper is to
detect this misbehaviour in the shortest time possible and to overcome this problem using Energy sharing.
Keywords- Node misbehaviour, energy sharing, Wi-Fi protocol
-----------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
Ad hoc networks and wireless sensor networks (WSNs) are
different branches of technology that demonstrate remarkable
potential. These systems are comprised of multiple sensor
nodes called motes. These motes can be likened to miniature
data miners. These can be deployed in different environmental
conditions, such as temperature sensing, humidity sensing,
velocity sensing, etc.
The motes can be deployed in vast areas where human
intervention is difficult. Areas like wildlife sanctuaries or
having rough terrain and erratic climatic conditions are regions
where these sensor nodes are deployed maximum.
Being battery operated, these nodes tend to lose their energy
easily. As they are deployed in regions where humans cannot
intervene often, recharging the nodes is highly impossible
.Therefore it is highly essential to make proper use of every
node’s energy. When the energy of a node falls below a given
level it restricts itself from entering into any packet
transmission. This is called selfish behaviour. Certain nodes
might be involved in a large number of transmissions due to
their location in the network. This leads to high energy
depletion of the node within a very short time span. These
nodes lose their energy at a very high level and soon get shut
down. When such nodes shut down, the packet transmission in
the network becomes more difficult since the node was present
in the central locality. At such times, another node takes the
previous node’s place and the transmission continues.
Energy depletion and high packet loss are two main problems
that persist in wireless mobile networks. Due to their mobility
and wireless nature they tend to lose energy in a faster manner
than normal nodes. Since they are battery operated, they
cannot be recharged either. Once these nodes exhibit selfish
behaviour, these nodes can no more be involved in the
transmission. The nodes restrict themselves only to conserve
their remaining energy. This might even lead to Denial of
Service (DoS) problems since the node might occupy a
particular bandwidth but never use it. The packet transmission
is blocked in this area and the only solution is re-routing the
packets through a different route, even though it might not be
the shortest one. This solution again leads to energy waste due
to re-transmission.
2. RELATED WORK
The misbehaviour of node is mainly due to the low energy
level available in the node. CCA threshold is a parameter used
to measure the amount of packets that can be received or sent
successfully by a packet. This CCA threshold measures if that
particular node is capable of sending the packets properly. But
it is also essential that CCA threshold is maintained within a
particular level so as to avoid any collision introduced by the
MAC layer [1]. When the CCA threshold exceeds a particular
level, this leads to new kinds of malicious activities. Here the
energy of the node does not deplete but there is high collision
rate.
Wireless interference takes place in networks which depend
upon the node’s interference for packet transmission. Sniffer
nodes are placed at different locations in order to track the
traffic between nodes. This helps in identifying where packet
drop takes place and where there is high traffic. The sniffer
nodes do not transmit any packet but only monitors the entire
link [3]. This helps in better packet assessment and identifying
the network’s performance. The sniffers used here are passive
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 619
in nature, i.e., they are always in on-state. The drawback here
is the deployment of such sniffer nodes, which needs power
thereby making the energy requirement of the network greater.
The sniffers may be active in nature also[4]. Here again they
are used for the same purpose of monitoring the network. The
only difference is that they are in sleep mode when they do not
have anything to sense. This conserves energy to a large
extent. The nodes wake up only when they sense some activity
in the link and when they have to sense the traffic. The rest of
the time the sniffer nodes are in sleep mode.
3. PROPOSED WORK
In this paper, the selfish behaviour of nodes is identified. The
selfish behaviour of the node is identified by packet drop.
Nodes that have lesser energy than actually necessary for
packet transmission restrict themselves from transmissions.
Therefore the packets that the node receives are dropped
without any consideration. This is the packet drop that has to
be identified by the network. The main reason behind this
packet drop is that, the nodes try to converse their remaining
energy in order to stay alive. Sniffer nodes are available in
between nodes at multiple locations that monitor the traffic
between nodes. Every packet drop by selfish nodes and normal
nodes are monitored by these nodes. Using this packet drop
information only, the selfish behaviour is detected. The selfish
node can be detected only after a few rounds of data
transmission. Packet drop is measured at every round and by
the fourth round the node is characterised as selfish node.
Energy Sharing is used here, which provide energy to the
selfish node, and make the node participate in packet
transmission. In any network environment, one transmitter is
configured as selfish; the other transmitter is regular and acts
as the sole witness. A sniffer node, located in close proximity
of each transmitter, monitors the traffic on corresponding link.
A node achieves selfishness by not sensing carrier before
transmitting. In such a situation the node reserves its energy
for its functioning than actual packet transmission. In such
situations we can use the energy sharing method, in order to
make the node get involved in transmissions.
Energy from the source node or from a nearby node that is
uninvolved in the packet transmission is shared with the
selfish node. Whenever the selfish nodes drop packets, the
previous node re-routes it, thereby leading to more energy
loss. In order to avoid this confusion this energy sharing
method can be used. Once the energy is shared with the selfish
node, it takes active participation in the packet transmission.
There is also the chance that, in case of re-routing the packets,
the route it travels might not be an optimum route or shortest
path. This again causes excessive energy drain in every node
involved in the transmission. The impact of the selfish
behaviour can be varied by simply varying the distance
between the selfish and witness nodes.
4. SIMULATION & RESULTS
The various degree of selfishness is simulated using Ns2,
where the selfish node senses the carrier with only a certain
probability.
Once the node has obtained the required share of energy, it
starts transmitting the data. There might be data drop due to
some other factors. But if once again such selfish behaviour is
encountered again the same method is followed to avoid
packet drop. This helps in reduction of energy used for route
computation, energy spent for packet forwarding and the
energy already lost by the nodes involved
Fig 1 Packet loss
The above figure is the packet loss graph comparing the
existing available protocol and the energy sharing method.
The energy sharing method proves to have lesser packet loss
than the existing protocol.
Fig 2 Packet delivery ratio versus lamda (no of rounds)
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 620
The above graph explains that as the number of rounds (or
times) the data has been sent increases, the packet delivery
ratio also increases. The packet drop takes place only until the
selfish node has not been identified. At a particular limit the
packet drop is completely avoided by sharing energy
wirelessly and thereby the packets are delivered successfully.
5. CONCLUSIONS
This paper proposed a solution to overcome the selfish
problem in the network, whereby selfish nodes were identified
and made into cooperative nodes. This is done by providing
additional energy to the selfish nodes from the source node,
which is helpful in continuing packet transmission in the same
path. This helps in better packet delivery.
REFERENCES
[1]. K. Pelechrinis, G. Yan, S. Eidenbenz, and
S.V.Krishnamurthy, “Detecting Selfish Exploitation of Carrier
Sensing in 802.11Networks,” Proc. IEEE INFOCOM, 2009.
[2]. P. Bahl et al., “DAIR: A Framework for Troubleshooting
Enterprise Wireless Networks Using Desktop Infrastructure,
”Proc. ACM HotNets-IV, 2005.
[3]. A. Kashyap, U. Paul, and S.R. Das, “Deconstructing
Interference Relations in WiFi Networks,” Proc. IEEE
Seventh Comm.Soc. Conf. Sensor Mesh and Ad Hoc Comm.
And Networks(SECON), 2010
[4]. Utpal Paul, Anand Kashyap, Ritesh Maheshwari and
Samir R.Das, “Passive Measurement of interference in Wi-
Fi networks with application in Misbehavior Detection,” IEEE
Trans on mobile computing, vol 12, no.3, march 2013.
[5]. P. Bahl et al., “Enhancing the Security of Corporate Wi-Fi
Networks Using DAIR,” Proc. ACM/USENIX Mobile
Systems, Applications, and Services (MobiSys), 2006.
BIOGRAPHIES
Preethi. S pursuing M.E in Computer and
Communication She has presented papers in a
few conferences.
Srigitha S Nath working as the Head of
Department in Saveetha Engineering College
She has 16 years of teaching experience and
has published 4 papers in international journals.
Bhargavi.S pursuing M.E in Computer and
Communication She has presented papers in
national and international conferences.

More Related Content

What's hot

Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A SurveyEnergy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Surveyijsrd.com
 
Dead node detection in teen protocol
Dead node detection in teen protocolDead node detection in teen protocol
Dead node detection in teen protocoleSAT Journals
 
Dead node detection in teen protocol survey
Dead node detection in teen protocol surveyDead node detection in teen protocol survey
Dead node detection in teen protocol surveyeSAT Publishing House
 
ENERGY EFFICIENCY IN AD HOC NETWORKS
ENERGY EFFICIENCY IN AD HOC NETWORKSENERGY EFFICIENCY IN AD HOC NETWORKS
ENERGY EFFICIENCY IN AD HOC NETWORKSijasuc
 
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor NetworkAnalysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor NetworkIJMER
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkeSAT Journals
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkeSAT Publishing House
 
IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...
IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...
IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...IRJET Journal
 
Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...
Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...
Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...IRJET Journal
 
ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...
ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...
ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...ijasuc
 
An energy saving algorithm to prolong
An energy saving algorithm to prolongAn energy saving algorithm to prolong
An energy saving algorithm to prolongijwmn
 
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...IOSR Journals
 
Improve a Network Life Time by Least Troublesome Topology Repair Algorithm in...
Improve a Network Life Time by Least Troublesome Topology Repair Algorithm in...Improve a Network Life Time by Least Troublesome Topology Repair Algorithm in...
Improve a Network Life Time by Least Troublesome Topology Repair Algorithm in...IJTET Journal
 
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...Editor IJCATR
 
2.a survey on energy balanced clustering approach for homogenous sensor network
2.a survey on energy balanced clustering approach for homogenous sensor network2.a survey on energy balanced clustering approach for homogenous sensor network
2.a survey on energy balanced clustering approach for homogenous sensor networkk srikanth
 

What's hot (20)

Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A SurveyEnergy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
 
Leach wireless sensor ntwrk aa1
Leach wireless sensor ntwrk aa1Leach wireless sensor ntwrk aa1
Leach wireless sensor ntwrk aa1
 
iPGCON14_134
iPGCON14_134iPGCON14_134
iPGCON14_134
 
Dead node detection in teen protocol
Dead node detection in teen protocolDead node detection in teen protocol
Dead node detection in teen protocol
 
Dead node detection in teen protocol survey
Dead node detection in teen protocol surveyDead node detection in teen protocol survey
Dead node detection in teen protocol survey
 
ENERGY EFFICIENCY IN AD HOC NETWORKS
ENERGY EFFICIENCY IN AD HOC NETWORKSENERGY EFFICIENCY IN AD HOC NETWORKS
ENERGY EFFICIENCY IN AD HOC NETWORKS
 
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor NetworkAnalysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor network
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor network
 
IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...
IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...
IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...
 
Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...
Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...
Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...
 
ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...
ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...
ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...
 
An energy saving algorithm to prolong
An energy saving algorithm to prolongAn energy saving algorithm to prolong
An energy saving algorithm to prolong
 
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
 
Improve a Network Life Time by Least Troublesome Topology Repair Algorithm in...
Improve a Network Life Time by Least Troublesome Topology Repair Algorithm in...Improve a Network Life Time by Least Troublesome Topology Repair Algorithm in...
Improve a Network Life Time by Least Troublesome Topology Repair Algorithm in...
 
A250106
A250106A250106
A250106
 
Mh2521282131
Mh2521282131Mh2521282131
Mh2521282131
 
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
 
2.a survey on energy balanced clustering approach for homogenous sensor network
2.a survey on energy balanced clustering approach for homogenous sensor network2.a survey on energy balanced clustering approach for homogenous sensor network
2.a survey on energy balanced clustering approach for homogenous sensor network
 
H0421043049
H0421043049H0421043049
H0421043049
 

Viewers also liked

Power factor correction of 6.6 kv distribution line in lc11 rmhs department, ...
Power factor correction of 6.6 kv distribution line in lc11 rmhs department, ...Power factor correction of 6.6 kv distribution line in lc11 rmhs department, ...
Power factor correction of 6.6 kv distribution line in lc11 rmhs department, ...eSAT Publishing House
 
Pilot aided scheduling for uplink ofdma
Pilot aided scheduling for uplink ofdmaPilot aided scheduling for uplink ofdma
Pilot aided scheduling for uplink ofdmaeSAT Publishing House
 
Stirling engine performance prediction using schmidt
Stirling engine performance prediction using schmidtStirling engine performance prediction using schmidt
Stirling engine performance prediction using schmidteSAT Publishing House
 
I slip algorithm for low latency on hybrid noc architecture
I slip algorithm for low latency on hybrid noc architectureI slip algorithm for low latency on hybrid noc architecture
I slip algorithm for low latency on hybrid noc architectureeSAT Publishing House
 
Radiation effects on heat and mass transfer of a mhd
Radiation effects on heat and mass transfer of a mhdRadiation effects on heat and mass transfer of a mhd
Radiation effects on heat and mass transfer of a mhdeSAT Publishing House
 
Analysis of river flow data to develop stage discharge relationship
Analysis of river flow data to develop stage discharge relationshipAnalysis of river flow data to develop stage discharge relationship
Analysis of river flow data to develop stage discharge relationshipeSAT Publishing House
 
Secure file sharing of dynamic audit services in cloud storage
Secure file sharing of dynamic audit services in cloud storageSecure file sharing of dynamic audit services in cloud storage
Secure file sharing of dynamic audit services in cloud storageeSAT Publishing House
 
Study and comparison of various communication based protective relaying schem...
Study and comparison of various communication based protective relaying schem...Study and comparison of various communication based protective relaying schem...
Study and comparison of various communication based protective relaying schem...eSAT Publishing House
 
Parameter study of stable walking gaits for nao
Parameter study of stable walking gaits for naoParameter study of stable walking gaits for nao
Parameter study of stable walking gaits for naoeSAT Publishing House
 
Finite element analysis of dissimilar welding between
Finite element analysis of dissimilar welding betweenFinite element analysis of dissimilar welding between
Finite element analysis of dissimilar welding betweeneSAT Publishing House
 
Empirical relation to estimate the reduction of root fillet stress in spur ge...
Empirical relation to estimate the reduction of root fillet stress in spur ge...Empirical relation to estimate the reduction of root fillet stress in spur ge...
Empirical relation to estimate the reduction of root fillet stress in spur ge...eSAT Publishing House
 
Nanoparticle based charge trapping memory device applying mos technology a co...
Nanoparticle based charge trapping memory device applying mos technology a co...Nanoparticle based charge trapping memory device applying mos technology a co...
Nanoparticle based charge trapping memory device applying mos technology a co...eSAT Publishing House
 
New approach for generalised unsharp masking alogorithm
New approach for generalised unsharp masking alogorithmNew approach for generalised unsharp masking alogorithm
New approach for generalised unsharp masking alogorithmeSAT Publishing House
 
Effect of spiral grooves in piston bowl on exhaust emissions of direct inject...
Effect of spiral grooves in piston bowl on exhaust emissions of direct inject...Effect of spiral grooves in piston bowl on exhaust emissions of direct inject...
Effect of spiral grooves in piston bowl on exhaust emissions of direct inject...eSAT Publishing House
 
An evaluation of manet protocols in terms of tcp variants based on thier perf...
An evaluation of manet protocols in terms of tcp variants based on thier perf...An evaluation of manet protocols in terms of tcp variants based on thier perf...
An evaluation of manet protocols in terms of tcp variants based on thier perf...eSAT Publishing House
 
A novel work for bin packing problem by ant colony optimization
A novel work for bin packing problem by ant colony optimizationA novel work for bin packing problem by ant colony optimization
A novel work for bin packing problem by ant colony optimizationeSAT Publishing House
 
Assessment of indoor air quality in an automobile industry
Assessment of indoor air quality in an automobile industryAssessment of indoor air quality in an automobile industry
Assessment of indoor air quality in an automobile industryeSAT Publishing House
 
A review on energy efficient clustering routing
A review on energy efficient clustering routingA review on energy efficient clustering routing
A review on energy efficient clustering routingeSAT Publishing House
 
Analysis of physical characteristics of bamboo
Analysis of physical characteristics of bambooAnalysis of physical characteristics of bamboo
Analysis of physical characteristics of bambooeSAT Publishing House
 

Viewers also liked (20)

Power factor correction of 6.6 kv distribution line in lc11 rmhs department, ...
Power factor correction of 6.6 kv distribution line in lc11 rmhs department, ...Power factor correction of 6.6 kv distribution line in lc11 rmhs department, ...
Power factor correction of 6.6 kv distribution line in lc11 rmhs department, ...
 
Pilot aided scheduling for uplink ofdma
Pilot aided scheduling for uplink ofdmaPilot aided scheduling for uplink ofdma
Pilot aided scheduling for uplink ofdma
 
Stirling engine performance prediction using schmidt
Stirling engine performance prediction using schmidtStirling engine performance prediction using schmidt
Stirling engine performance prediction using schmidt
 
I slip algorithm for low latency on hybrid noc architecture
I slip algorithm for low latency on hybrid noc architectureI slip algorithm for low latency on hybrid noc architecture
I slip algorithm for low latency on hybrid noc architecture
 
Radiation effects on heat and mass transfer of a mhd
Radiation effects on heat and mass transfer of a mhdRadiation effects on heat and mass transfer of a mhd
Radiation effects on heat and mass transfer of a mhd
 
Analysis of river flow data to develop stage discharge relationship
Analysis of river flow data to develop stage discharge relationshipAnalysis of river flow data to develop stage discharge relationship
Analysis of river flow data to develop stage discharge relationship
 
Secure file sharing of dynamic audit services in cloud storage
Secure file sharing of dynamic audit services in cloud storageSecure file sharing of dynamic audit services in cloud storage
Secure file sharing of dynamic audit services in cloud storage
 
Study and comparison of various communication based protective relaying schem...
Study and comparison of various communication based protective relaying schem...Study and comparison of various communication based protective relaying schem...
Study and comparison of various communication based protective relaying schem...
 
Parameter study of stable walking gaits for nao
Parameter study of stable walking gaits for naoParameter study of stable walking gaits for nao
Parameter study of stable walking gaits for nao
 
Finite element analysis of dissimilar welding between
Finite element analysis of dissimilar welding betweenFinite element analysis of dissimilar welding between
Finite element analysis of dissimilar welding between
 
Empirical relation to estimate the reduction of root fillet stress in spur ge...
Empirical relation to estimate the reduction of root fillet stress in spur ge...Empirical relation to estimate the reduction of root fillet stress in spur ge...
Empirical relation to estimate the reduction of root fillet stress in spur ge...
 
Nanoparticle based charge trapping memory device applying mos technology a co...
Nanoparticle based charge trapping memory device applying mos technology a co...Nanoparticle based charge trapping memory device applying mos technology a co...
Nanoparticle based charge trapping memory device applying mos technology a co...
 
New approach for generalised unsharp masking alogorithm
New approach for generalised unsharp masking alogorithmNew approach for generalised unsharp masking alogorithm
New approach for generalised unsharp masking alogorithm
 
Effect of spiral grooves in piston bowl on exhaust emissions of direct inject...
Effect of spiral grooves in piston bowl on exhaust emissions of direct inject...Effect of spiral grooves in piston bowl on exhaust emissions of direct inject...
Effect of spiral grooves in piston bowl on exhaust emissions of direct inject...
 
An evaluation of manet protocols in terms of tcp variants based on thier perf...
An evaluation of manet protocols in terms of tcp variants based on thier perf...An evaluation of manet protocols in terms of tcp variants based on thier perf...
An evaluation of manet protocols in terms of tcp variants based on thier perf...
 
A novel work for bin packing problem by ant colony optimization
A novel work for bin packing problem by ant colony optimizationA novel work for bin packing problem by ant colony optimization
A novel work for bin packing problem by ant colony optimization
 
Assessment of indoor air quality in an automobile industry
Assessment of indoor air quality in an automobile industryAssessment of indoor air quality in an automobile industry
Assessment of indoor air quality in an automobile industry
 
A review on energy efficient clustering routing
A review on energy efficient clustering routingA review on energy efficient clustering routing
A review on energy efficient clustering routing
 
Properties of fal g masonry blocks
Properties of fal g masonry blocksProperties of fal g masonry blocks
Properties of fal g masonry blocks
 
Analysis of physical characteristics of bamboo
Analysis of physical characteristics of bambooAnalysis of physical characteristics of bamboo
Analysis of physical characteristics of bamboo
 

Similar to Detect and Overcome Selfish Behavior in Wi-Fi Networks Using Energy Sharing

Quality of service improved in WSNs using Improved Efficient Quality of Servi...
Quality of service improved in WSNs using Improved Efficient Quality of Servi...Quality of service improved in WSNs using Improved Efficient Quality of Servi...
Quality of service improved in WSNs using Improved Efficient Quality of Servi...IJTET Journal
 
Limiting the energy drain in wireless ad hoc sensor networks
Limiting the energy drain in wireless ad hoc sensor networksLimiting the energy drain in wireless ad hoc sensor networks
Limiting the energy drain in wireless ad hoc sensor networkseSAT Publishing House
 
Various Clustering Techniques in Wireless Sensor Network
Various Clustering Techniques in Wireless Sensor NetworkVarious Clustering Techniques in Wireless Sensor Network
Various Clustering Techniques in Wireless Sensor NetworkEditor IJCATR
 
Energy Consumption in Ad Hoc Network With Agents Minimizing the Number of Hop...
Energy Consumption in Ad Hoc Network With Agents Minimizing the Number of Hop...Energy Consumption in Ad Hoc Network With Agents Minimizing the Number of Hop...
Energy Consumption in Ad Hoc Network With Agents Minimizing the Number of Hop...CSCJournals
 
Issues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networksIssues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networkseSAT Publishing House
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Attaining Augmented Overhaul and Profit Maximization in Cognitive Wireless In...
Attaining Augmented Overhaul and Profit Maximization in Cognitive Wireless In...Attaining Augmented Overhaul and Profit Maximization in Cognitive Wireless In...
Attaining Augmented Overhaul and Profit Maximization in Cognitive Wireless In...paperpublications3
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyAli Habeeb
 
Power control in mobile ad hoc network using NS2 simulator
Power control in mobile ad hoc network using NS2 simulatorPower control in mobile ad hoc network using NS2 simulator
Power control in mobile ad hoc network using NS2 simulatorIRJET Journal
 
Design and Implementation a New Energy Efficient Clustering Algorithm Using t...
Design and Implementation a New Energy Efficient Clustering Algorithm Using t...Design and Implementation a New Energy Efficient Clustering Algorithm Using t...
Design and Implementation a New Energy Efficient Clustering Algorithm Using t...ijmnct
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Power saving mechanism for hybrid routing protocol using scheduling technique
Power saving mechanism for hybrid routing protocol using scheduling techniquePower saving mechanism for hybrid routing protocol using scheduling technique
Power saving mechanism for hybrid routing protocol using scheduling techniqueeSAT Publishing House
 

Similar to Detect and Overcome Selfish Behavior in Wi-Fi Networks Using Energy Sharing (20)

Quality of service improved in WSNs using Improved Efficient Quality of Servi...
Quality of service improved in WSNs using Improved Efficient Quality of Servi...Quality of service improved in WSNs using Improved Efficient Quality of Servi...
Quality of service improved in WSNs using Improved Efficient Quality of Servi...
 
Limiting the energy drain in wireless ad hoc sensor networks
Limiting the energy drain in wireless ad hoc sensor networksLimiting the energy drain in wireless ad hoc sensor networks
Limiting the energy drain in wireless ad hoc sensor networks
 
Various Clustering Techniques in Wireless Sensor Network
Various Clustering Techniques in Wireless Sensor NetworkVarious Clustering Techniques in Wireless Sensor Network
Various Clustering Techniques in Wireless Sensor Network
 
Energy Consumption in Ad Hoc Network With Agents Minimizing the Number of Hop...
Energy Consumption in Ad Hoc Network With Agents Minimizing the Number of Hop...Energy Consumption in Ad Hoc Network With Agents Minimizing the Number of Hop...
Energy Consumption in Ad Hoc Network With Agents Minimizing the Number of Hop...
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Issues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networksIssues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networks
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Attaining Augmented Overhaul and Profit Maximization in Cognitive Wireless In...
Attaining Augmented Overhaul and Profit Maximization in Cognitive Wireless In...Attaining Augmented Overhaul and Profit Maximization in Cognitive Wireless In...
Attaining Augmented Overhaul and Profit Maximization in Cognitive Wireless In...
 
Mobile ad hoc networks and its clustering scheme
Mobile ad hoc networks and its clustering schemeMobile ad hoc networks and its clustering scheme
Mobile ad hoc networks and its clustering scheme
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
L 1000 423
L 1000 423L 1000 423
L 1000 423
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
 
Power control in mobile ad hoc network using NS2 simulator
Power control in mobile ad hoc network using NS2 simulatorPower control in mobile ad hoc network using NS2 simulator
Power control in mobile ad hoc network using NS2 simulator
 
Design and Implementation a New Energy Efficient Clustering Algorithm Using t...
Design and Implementation a New Energy Efficient Clustering Algorithm Using t...Design and Implementation a New Energy Efficient Clustering Algorithm Using t...
Design and Implementation a New Energy Efficient Clustering Algorithm Using t...
 
1 7
1 71 7
1 7
 
1 7
1 71 7
1 7
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Power saving mechanism for hybrid routing protocol using scheduling technique
Power saving mechanism for hybrid routing protocol using scheduling techniquePower saving mechanism for hybrid routing protocol using scheduling technique
Power saving mechanism for hybrid routing protocol using scheduling technique
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

Detect and Overcome Selfish Behavior in Wi-Fi Networks Using Energy Sharing

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 618 DETECT AND OVERCOME THE SELFISH PROBLEM IN WIFI NETWORK USING ENERGY SHARING Preethi.S1 , Srigitha S. Nath2 , Bhargavi.S3 1PG Scholar, Department of ECE, Saveetha Engineering College, Tamil Nadu, India 2Head of Department, Department of ECE, Saveetha Engineering College, Tamil Nadu, India 3PG Scholar, Department of ECE, Saveetha Engineering College, Tamil Nadu, India Abstract Wireless Sensor networks and Wireless Ad Hoc networks are upcoming fields that demonstrate merit in the research domain due to their versatile nature. Our goal is to detect the misbehaviour in wireless LAN and to overcome this problem. Nodes tend to misbehave when their energy level is below a particular level and this scenario is labelled as selfish behaviour. The main idea of this paper is to detect this misbehaviour in the shortest time possible and to overcome this problem using Energy sharing. Keywords- Node misbehaviour, energy sharing, Wi-Fi protocol -----------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION Ad hoc networks and wireless sensor networks (WSNs) are different branches of technology that demonstrate remarkable potential. These systems are comprised of multiple sensor nodes called motes. These motes can be likened to miniature data miners. These can be deployed in different environmental conditions, such as temperature sensing, humidity sensing, velocity sensing, etc. The motes can be deployed in vast areas where human intervention is difficult. Areas like wildlife sanctuaries or having rough terrain and erratic climatic conditions are regions where these sensor nodes are deployed maximum. Being battery operated, these nodes tend to lose their energy easily. As they are deployed in regions where humans cannot intervene often, recharging the nodes is highly impossible .Therefore it is highly essential to make proper use of every node’s energy. When the energy of a node falls below a given level it restricts itself from entering into any packet transmission. This is called selfish behaviour. Certain nodes might be involved in a large number of transmissions due to their location in the network. This leads to high energy depletion of the node within a very short time span. These nodes lose their energy at a very high level and soon get shut down. When such nodes shut down, the packet transmission in the network becomes more difficult since the node was present in the central locality. At such times, another node takes the previous node’s place and the transmission continues. Energy depletion and high packet loss are two main problems that persist in wireless mobile networks. Due to their mobility and wireless nature they tend to lose energy in a faster manner than normal nodes. Since they are battery operated, they cannot be recharged either. Once these nodes exhibit selfish behaviour, these nodes can no more be involved in the transmission. The nodes restrict themselves only to conserve their remaining energy. This might even lead to Denial of Service (DoS) problems since the node might occupy a particular bandwidth but never use it. The packet transmission is blocked in this area and the only solution is re-routing the packets through a different route, even though it might not be the shortest one. This solution again leads to energy waste due to re-transmission. 2. RELATED WORK The misbehaviour of node is mainly due to the low energy level available in the node. CCA threshold is a parameter used to measure the amount of packets that can be received or sent successfully by a packet. This CCA threshold measures if that particular node is capable of sending the packets properly. But it is also essential that CCA threshold is maintained within a particular level so as to avoid any collision introduced by the MAC layer [1]. When the CCA threshold exceeds a particular level, this leads to new kinds of malicious activities. Here the energy of the node does not deplete but there is high collision rate. Wireless interference takes place in networks which depend upon the node’s interference for packet transmission. Sniffer nodes are placed at different locations in order to track the traffic between nodes. This helps in identifying where packet drop takes place and where there is high traffic. The sniffer nodes do not transmit any packet but only monitors the entire link [3]. This helps in better packet assessment and identifying the network’s performance. The sniffers used here are passive
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 619 in nature, i.e., they are always in on-state. The drawback here is the deployment of such sniffer nodes, which needs power thereby making the energy requirement of the network greater. The sniffers may be active in nature also[4]. Here again they are used for the same purpose of monitoring the network. The only difference is that they are in sleep mode when they do not have anything to sense. This conserves energy to a large extent. The nodes wake up only when they sense some activity in the link and when they have to sense the traffic. The rest of the time the sniffer nodes are in sleep mode. 3. PROPOSED WORK In this paper, the selfish behaviour of nodes is identified. The selfish behaviour of the node is identified by packet drop. Nodes that have lesser energy than actually necessary for packet transmission restrict themselves from transmissions. Therefore the packets that the node receives are dropped without any consideration. This is the packet drop that has to be identified by the network. The main reason behind this packet drop is that, the nodes try to converse their remaining energy in order to stay alive. Sniffer nodes are available in between nodes at multiple locations that monitor the traffic between nodes. Every packet drop by selfish nodes and normal nodes are monitored by these nodes. Using this packet drop information only, the selfish behaviour is detected. The selfish node can be detected only after a few rounds of data transmission. Packet drop is measured at every round and by the fourth round the node is characterised as selfish node. Energy Sharing is used here, which provide energy to the selfish node, and make the node participate in packet transmission. In any network environment, one transmitter is configured as selfish; the other transmitter is regular and acts as the sole witness. A sniffer node, located in close proximity of each transmitter, monitors the traffic on corresponding link. A node achieves selfishness by not sensing carrier before transmitting. In such a situation the node reserves its energy for its functioning than actual packet transmission. In such situations we can use the energy sharing method, in order to make the node get involved in transmissions. Energy from the source node or from a nearby node that is uninvolved in the packet transmission is shared with the selfish node. Whenever the selfish nodes drop packets, the previous node re-routes it, thereby leading to more energy loss. In order to avoid this confusion this energy sharing method can be used. Once the energy is shared with the selfish node, it takes active participation in the packet transmission. There is also the chance that, in case of re-routing the packets, the route it travels might not be an optimum route or shortest path. This again causes excessive energy drain in every node involved in the transmission. The impact of the selfish behaviour can be varied by simply varying the distance between the selfish and witness nodes. 4. SIMULATION & RESULTS The various degree of selfishness is simulated using Ns2, where the selfish node senses the carrier with only a certain probability. Once the node has obtained the required share of energy, it starts transmitting the data. There might be data drop due to some other factors. But if once again such selfish behaviour is encountered again the same method is followed to avoid packet drop. This helps in reduction of energy used for route computation, energy spent for packet forwarding and the energy already lost by the nodes involved Fig 1 Packet loss The above figure is the packet loss graph comparing the existing available protocol and the energy sharing method. The energy sharing method proves to have lesser packet loss than the existing protocol. Fig 2 Packet delivery ratio versus lamda (no of rounds)
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 620 The above graph explains that as the number of rounds (or times) the data has been sent increases, the packet delivery ratio also increases. The packet drop takes place only until the selfish node has not been identified. At a particular limit the packet drop is completely avoided by sharing energy wirelessly and thereby the packets are delivered successfully. 5. CONCLUSIONS This paper proposed a solution to overcome the selfish problem in the network, whereby selfish nodes were identified and made into cooperative nodes. This is done by providing additional energy to the selfish nodes from the source node, which is helpful in continuing packet transmission in the same path. This helps in better packet delivery. REFERENCES [1]. K. Pelechrinis, G. Yan, S. Eidenbenz, and S.V.Krishnamurthy, “Detecting Selfish Exploitation of Carrier Sensing in 802.11Networks,” Proc. IEEE INFOCOM, 2009. [2]. P. Bahl et al., “DAIR: A Framework for Troubleshooting Enterprise Wireless Networks Using Desktop Infrastructure, ”Proc. ACM HotNets-IV, 2005. [3]. A. Kashyap, U. Paul, and S.R. Das, “Deconstructing Interference Relations in WiFi Networks,” Proc. IEEE Seventh Comm.Soc. Conf. Sensor Mesh and Ad Hoc Comm. And Networks(SECON), 2010 [4]. Utpal Paul, Anand Kashyap, Ritesh Maheshwari and Samir R.Das, “Passive Measurement of interference in Wi- Fi networks with application in Misbehavior Detection,” IEEE Trans on mobile computing, vol 12, no.3, march 2013. [5]. P. Bahl et al., “Enhancing the Security of Corporate Wi-Fi Networks Using DAIR,” Proc. ACM/USENIX Mobile Systems, Applications, and Services (MobiSys), 2006. BIOGRAPHIES Preethi. S pursuing M.E in Computer and Communication She has presented papers in a few conferences. Srigitha S Nath working as the Head of Department in Saveetha Engineering College She has 16 years of teaching experience and has published 4 papers in international journals. Bhargavi.S pursuing M.E in Computer and Communication She has presented papers in national and international conferences.