Research Article

A Survey on the Noncooperative Environment in Smart Nodes-Based Ad Hoc Networks: Motivations and Solutions

Table 3

Proposed schemes for selfish node management in ad hoc networks.

ArticleMechanismDescription

Attiah et al. [8], 2018Evolutionary game(i) A route selection problem is modeled by using a game-theoretic approach.
(ii) The replicator dynamics mechanism is used to indicate that the nodes can be trained from their strategies and hence modify their strategies sets with time.

Subba et al. [41], 2018Detection(i) The work combines a lightweight neural network with specification rules for anomaly detection to identify misbehaving nodes in the network.
(ii) A Bayesian game is designed which takes the IDS and the sensor nodes as two noncooperative players.

Umar et al. [18], 2018Incentive-based(i) Virtual currency referred to as scores is used for selfish node stimulation.
(ii) Scores are calculated by taking many nodes’ and network’s parameters.

Raja et al. [42], 2018Trust management(i) The selection of cluster heads is done by using the multiple constraint aware glow worm swarm optimization approach (MC-GSO). Every node is evaluated in the network according to this approach.
(ii) Various objectives are achieved for the trust metrics during the cluster head selection.

Yang et al. [47], 2017Incentive-based(i) Particularly designed for clustered WSN with an aim to balance the consumption of energy among all the nodes.
(ii) A convex payoff function is designed for the behavior of each node. The game is derived with the help of this convex optimization.

Gemeda et al. [40], 2017Evolutionary game-based(i) Targets cluster-based WSNs.
(ii) Mainly focus on the cluster heads manipulation and selection process.

Yu [48], 2016Incentive-based(i) Nodes are pushed to cooperate in routing by using some incentives.
(ii) Some values are exchanged for getting data communication and relay services.

Li et al. [43], 2015Trust management(i) The work is proposed for VANETs where the trustworthiness of both mobile sensor nodes and transmitted data is evaluated.
(ii) The recommendation trust and functional trust are categorized to indicate nodes' performance.

Duan et al. [17], 2014Trust management(i) A trust-aware routing frame is designed by incorporating lightweight and proficient attacks resistant mechanism.
(ii) The common features associated with attacks in terms of trust awareness are addressed.
(iii) The trust derivation is based on the analysis of results.

Chen et al. [21], 2013Detection(i) The cooperation level of each node is calculated and the selfish nodes are punished by blocking them in the network.
Xu and Guo [49], 2012Incentive-based(i) Particularly target opportunistic networks.
(ii) The incentive exchange is made through various rounds of a bargaining game.

Bao et al. [50], 2012Detection(i) Uses highly expandable cluster and hierarchical trust-based management protocol for efficiently detecting the malicious and the selfish.