that a neighbor didn’t give score to it in its SC, it
can complain and introduce this node as a liar.
5. A node may broadcast a null message with the
aim of receiving more scores. For solving this
problem, when a node receives a null message or
meaningless message, it will consider this SID as
a liar.
4 CONCLUSION AND FUTURE
WORKS
In this paper we proposed a new method based on
Game theory. We defined some tables for each node
and gave positive and negative scores to the nodes in
the network. Nodes will receive priority for sending
their messages according to their positive scores and
they make a good history for themselves, and nodes
with negative scores do not have allowance to send
their messages for some periods of time and they will
have bad history. When a node is in the communi-
cation range of another node, it plays sending in the
good history and plays discard in the bad history. We
proved that this strategy is a Nash equilibrium and
non of the players have violation motivation. Also,
we discussed about various attacks against the net-
work according to the various fields of tables and we
proved that our algorithm is resistance against attacks.
Furthermore, we showed that during some periods of
time, nodes wont have motivation to be selfish and
the performance of the network will be in the higher
position.
In our algorithm, we have assumed that the Opp-
Net is implemented in a limited area like a conference
in a department of a university which all of the nodes
are registered in the network, so they can receive pub-
lic and private keys. In a large area OppNet, like a
city, it is almost impossible for nodes to connect to a
third party for receiving public and private keys. De-
veloping a method for sharing a public key in OppNet
and as a result extend our algorithm in a large area is
a part of our work in the future.
Furthermore in this paper, we have considered se-
lective dropping and selfish attacks, but this work can
be developed to detect other attacks. We intend to
study other kinds of attack against opportunistic net-
works and complete our intrusion prevention plan in
the future.
REFERENCES
Alajeely, M., Doss, R., and Ahmad, A. (2015). Security
and trust in opportunistic networks–a survey. In IETE
Technical Review, pages 1–13. Taylor & Francis.
Hoang, T. H. and Huh, E. (2008). Detecting selective
forwarding attacks in wireless sensor networks using
two-hops neighbor knowledge. In Seventh IEEE Inter-
national Symposium on Network Computing and Ap-
plications, 2008. NCA’08, pages 325–331. IEEE.
Jo, M., Han, L., Kim, D., and In, H. (2013). Selfish attacks
and detection in cognitive radio ad-hoc networks. In
IEEE network, volume 27, pages 46–50. IEEE.
Kargl, F., Klenk, A., Schlott, S., and Weber, M. (2004). Ad-
vanced detection of selfish or malicious nodes in ad
hoc networks. In Security in Ad-hoc and Sensor Net-
works, pages 152–165. Springer.
Kumari, S. and Paramasivan, B. (2015). Ant based defense
mechanism for selective forwarding attack in manet.
In 31st IEEE International Conference on Data En-
gineering Workshops (ICDEW), 2015, pages 92–97.
IEEE.
Liao, H. and Ding, S. (2015). Mixed and continuous strat-
egy monitor-forward game based selective forward-
ing solution in wsn. In International Journal of Dis-
tributed Sensor Networks, pages 1–13. Hindawi.
Mittal, S. (2015). Identification technique for all passive
selfish node attacks in a mobile network. In Interna-
tional Journal of Advance Research in Computer Sci-
ence and Management Studies, volume 3, pages 46–
51. IJARCSMS.
Rashidibajgan, S. (2016). A trust structure for detection of
sybil attacks in opportunistic networks. In 11th Inter-
national Conference for Internet Technology and Se-
cured Transactions (ICITST), pages 347–351. IEEE.
Sujitha, R., Scholar, P., and Poornima, N. (2015). Efficient
detection of selfish attacks in cognitive radio networks
using coopon algorithm. In International journal of
advanced research trends in Engineering and technol-
ogy, volume 2, pages 84–91. IJARTET.
Sun, H., Chen, C., and Hsiao, Y. (2007). An efficient coun-
termeasure to the selective forwarding attack in wire-
less sensor networks. In TENCON 2007-2007 IEEE
Region 10 Conference, pages 1–4. IEEE.
A Solution for Prevention of Selective Dropping and Selfish Attacks in Opportunistic Networks
35