Sie sind auf Seite 1von 1

Detection of Selfish Nodes in Networks Using CoopMAC Protocol with ARQ

AIM
The main aim of this project is to use the CoopMAC protocol that has been recently proposed as a possible implementation of cooperation protocols in the medium access control (MAC) layer of a wireless network. The nodes which are selfish in nature can be recognized before the transmission of the data such that the data can be transmitted to the destination very fastly and without any data loss. CoopMAC has been recently proposed as a possible implementation of cooperation protocols in the medium access control (MAC) layer of a wireless network. However, some nodes may refrain from cooperation for selfish purposes, e.g. in order to save energy, in what is called selfish behavior or misbehavior. This protocol violation worsens other nodes performance and can be avoided if other nodes detect and punish (e.g. banning from the network) misbehaving nodes.

Introduction
The nodes which are selfish in nature can be recognized before the transmission of the data such that the data can be transmitted to the destination very fastly and without any data loss. CoopMAC has been recently proposed as a possible implementation of cooperation protocols in the medium access control (MAC) layer of a wireless network. However, some nodes may refrain from cooperation for selfish purposes, e.g. in order to save energy, in what is called selfish behavior or misbehavior. This protocol violation worsens other nodes performance and can be avoided if other nodes detect and punish (e.g. banning from the network) misbehaving nodes. This project is to use the CoopMAC protocol that has been recently proposed as a possible implementation of cooperation protocols in the medium access control (MAC) layer of a wireless network. The node which are selfish in nature can be detected before the transmission of the data . This shall be done such that the nodes which are selfish in nature can be unused for the data transmission and hence the data can be transmitted to the destination by using the nodes which are unselfish in nature. The selfish nodes can be detected by getting acknowledgements from each of the nodes and hence the data shall be transferred by using the unselfish nodes.

FUNCTIONAL REQUIREMENTS
FUNCTIONAL REQUIREMENTS: There is an interface between transmission and without reordering of packets. There is an interface between transmission and with Reordering of packets. Segmentation can be done. Timer Control can be done automatically. Packet Reordering can be done automatically. In functional requirements we have specific modules to study the system.

PROCESS

CONCLUSION
For the considered problem of misbehavior detection in a cooperative ad hoc network, we showed that SPRT provides the minimum average detection delay for bounded FA and MD probabilities while UMP attains the minimum MD probability for a bounded FA probability with a fixed detection delay. SPRT is best suited to environments where fastest detection of misbehaving nodes is required. On the other hand, UMP is best suited to environments that tolerate detection delay to attain the minimum MD probability.