Selfishness in Mobile Ad-hoc Networks: A Literature Review on Detection Techniques and Prevention Mechanisms

Constant connectivity is one of the most challenging requirements modern communication networks promise to satisfy. 5G and Beyond applications and the proliferation of Internet of Things (IoT) applications make mobile networks one of the most discussed research topics of the present, while research...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE access 2023-01, Vol.11, p.1-1
Hauptverfasser: Kampitaki, Dimitra G., Economides, Anastasios A.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1
container_issue
container_start_page 1
container_title IEEE access
container_volume 11
creator Kampitaki, Dimitra G.
Economides, Anastasios A.
description Constant connectivity is one of the most challenging requirements modern communication networks promise to satisfy. 5G and Beyond applications and the proliferation of Internet of Things (IoT) applications make mobile networks one of the most discussed research topics of the present, while research is already moving towards the design specifications and development of 6G services and solutions. Using multi-hop patterns, mobile nodes can move around always maintaining their connectivity in a pervasive and ubiquitous manner. New possibilities emerge from this progress, whereas long known challenges still exist and evolve. One of them is the selfishness or unwillingness of some nodes to spend resources to serve the communication requests of other nodes, not in a malicious but rather in a self-conservative manner. While intentional misbehavior of nodes is considered a security issue, selfishness is studied separately in the relevant literature and has attracted a lot of research attention. In this review we attempt to present the leading research on the detection techniques and the preventive mechanisms employed by previous studies to address the selfishness problem in mobile ad hoc networks, and to identify the trends during the past few years, focusing primarily on the routing layer. We follow a systematic methodology to identify, select, categorize, and analyze the relevant research and we use a concept-centric approach to present the results forming a comprehensive starting point for future research.
doi_str_mv 10.1109/ACCESS.2023.3305262
format Article
fullrecord <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_ieee_primary_10216965</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10216965</ieee_id><doaj_id>oai_doaj_org_article_8e61dec1bb304abeb653208b8d1ab607</doaj_id><sourcerecordid>2855722773</sourcerecordid><originalsourceid>FETCH-LOGICAL-c409t-61d4201718643f123e7fd59c342656efccb1a80c54b79221eb2ef62999a50c143</originalsourceid><addsrcrecordid>eNpNkctOwzAQRSMEEgj4AlhYYp3iR-wk7KryqlQeorC2bGdCXdIY7LQVf4_bVKjeeDQz986MTpJcEDwgBJfXw9HobjodUEzZgDHMqaAHyQklokwZZ-JwLz5OzkOY4_iKmOL5SdJMoaltmLUQArItenLaNoCGVTpzBj1Dt3b-K9ygIZrYDrzqlh7QG6wsrJFr0S10YDobo3cws9b-LCEg1Vbo1cMK2m3lKVZUa8MinCVHtWoCnO_-0-Tj_u599JhOXh7Go-EkNRkuu1SQKqOY5KQQGasJZZDXFS8Ny6jgAmpjNFEFNjzTeUkpAU2hFrQsS8WxIRk7Tca9b-XUXH57u1D-Vzpl5Tbh_KdUvrOmAVlAnAaGaM1wpjRowRnFhS4qorTAefS66r2-vdtc18m5W_o2ri9pwXlOaZ6z2MX6LuNdCB7q_6kEyw0l2VOSG0pyRymqLnuVBYA9xYZX3OMPR-GNig</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2855722773</pqid></control><display><type>article</type><title>Selfishness in Mobile Ad-hoc Networks: A Literature Review on Detection Techniques and Prevention Mechanisms</title><source>Directory of Open Access Journals</source><source>IEEE Xplore Open Access Journals</source><source>EZB Electronic Journals Library</source><creator>Kampitaki, Dimitra G. ; Economides, Anastasios A.</creator><creatorcontrib>Kampitaki, Dimitra G. ; Economides, Anastasios A.</creatorcontrib><description>Constant connectivity is one of the most challenging requirements modern communication networks promise to satisfy. 5G and Beyond applications and the proliferation of Internet of Things (IoT) applications make mobile networks one of the most discussed research topics of the present, while research is already moving towards the design specifications and development of 6G services and solutions. Using multi-hop patterns, mobile nodes can move around always maintaining their connectivity in a pervasive and ubiquitous manner. New possibilities emerge from this progress, whereas long known challenges still exist and evolve. One of them is the selfishness or unwillingness of some nodes to spend resources to serve the communication requests of other nodes, not in a malicious but rather in a self-conservative manner. While intentional misbehavior of nodes is considered a security issue, selfishness is studied separately in the relevant literature and has attracted a lot of research attention. In this review we attempt to present the leading research on the detection techniques and the preventive mechanisms employed by previous studies to address the selfishness problem in mobile ad hoc networks, and to identify the trends during the past few years, focusing primarily on the routing layer. We follow a systematic methodology to identify, select, categorize, and analyze the relevant research and we use a concept-centric approach to present the results forming a comprehensive starting point for future research.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2023.3305262</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>5G and Beyond communications ; 5G mobile communication ; 6G communications ; 6G mobile communication ; Ad hoc networks ; Communication networks ; Design specifications ; Internet of Things ; Literature reviews ; Mobile ad hoc networks ; mobile communication ; Mobile computing ; Next generation networking ; Nodes ; Routing ; Routing protocols ; Security ; Surveys ; Taxonomy</subject><ispartof>IEEE access, 2023-01, Vol.11, p.1-1</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c409t-61d4201718643f123e7fd59c342656efccb1a80c54b79221eb2ef62999a50c143</citedby><cites>FETCH-LOGICAL-c409t-61d4201718643f123e7fd59c342656efccb1a80c54b79221eb2ef62999a50c143</cites><orcidid>0000-0001-8056-1024 ; 0000-0002-5643-142X</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10216965$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,776,780,860,2095,27612,27903,27904,54911</link.rule.ids></links><search><creatorcontrib>Kampitaki, Dimitra G.</creatorcontrib><creatorcontrib>Economides, Anastasios A.</creatorcontrib><title>Selfishness in Mobile Ad-hoc Networks: A Literature Review on Detection Techniques and Prevention Mechanisms</title><title>IEEE access</title><addtitle>Access</addtitle><description>Constant connectivity is one of the most challenging requirements modern communication networks promise to satisfy. 5G and Beyond applications and the proliferation of Internet of Things (IoT) applications make mobile networks one of the most discussed research topics of the present, while research is already moving towards the design specifications and development of 6G services and solutions. Using multi-hop patterns, mobile nodes can move around always maintaining their connectivity in a pervasive and ubiquitous manner. New possibilities emerge from this progress, whereas long known challenges still exist and evolve. One of them is the selfishness or unwillingness of some nodes to spend resources to serve the communication requests of other nodes, not in a malicious but rather in a self-conservative manner. While intentional misbehavior of nodes is considered a security issue, selfishness is studied separately in the relevant literature and has attracted a lot of research attention. In this review we attempt to present the leading research on the detection techniques and the preventive mechanisms employed by previous studies to address the selfishness problem in mobile ad hoc networks, and to identify the trends during the past few years, focusing primarily on the routing layer. We follow a systematic methodology to identify, select, categorize, and analyze the relevant research and we use a concept-centric approach to present the results forming a comprehensive starting point for future research.</description><subject>5G and Beyond communications</subject><subject>5G mobile communication</subject><subject>6G communications</subject><subject>6G mobile communication</subject><subject>Ad hoc networks</subject><subject>Communication networks</subject><subject>Design specifications</subject><subject>Internet of Things</subject><subject>Literature reviews</subject><subject>Mobile ad hoc networks</subject><subject>mobile communication</subject><subject>Mobile computing</subject><subject>Next generation networking</subject><subject>Nodes</subject><subject>Routing</subject><subject>Routing protocols</subject><subject>Security</subject><subject>Surveys</subject><subject>Taxonomy</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>DOA</sourceid><recordid>eNpNkctOwzAQRSMEEgj4AlhYYp3iR-wk7KryqlQeorC2bGdCXdIY7LQVf4_bVKjeeDQz986MTpJcEDwgBJfXw9HobjodUEzZgDHMqaAHyQklokwZZ-JwLz5OzkOY4_iKmOL5SdJMoaltmLUQArItenLaNoCGVTpzBj1Dt3b-K9ygIZrYDrzqlh7QG6wsrJFr0S10YDobo3cws9b-LCEg1Vbo1cMK2m3lKVZUa8MinCVHtWoCnO_-0-Tj_u599JhOXh7Go-EkNRkuu1SQKqOY5KQQGasJZZDXFS8Ny6jgAmpjNFEFNjzTeUkpAU2hFrQsS8WxIRk7Tca9b-XUXH57u1D-Vzpl5Tbh_KdUvrOmAVlAnAaGaM1wpjRowRnFhS4qorTAefS66r2-vdtc18m5W_o2ri9pwXlOaZ6z2MX6LuNdCB7q_6kEyw0l2VOSG0pyRymqLnuVBYA9xYZX3OMPR-GNig</recordid><startdate>20230101</startdate><enddate>20230101</enddate><creator>Kampitaki, Dimitra G.</creator><creator>Economides, Anastasios A.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0001-8056-1024</orcidid><orcidid>https://orcid.org/0000-0002-5643-142X</orcidid></search><sort><creationdate>20230101</creationdate><title>Selfishness in Mobile Ad-hoc Networks: A Literature Review on Detection Techniques and Prevention Mechanisms</title><author>Kampitaki, Dimitra G. ; Economides, Anastasios A.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c409t-61d4201718643f123e7fd59c342656efccb1a80c54b79221eb2ef62999a50c143</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>5G and Beyond communications</topic><topic>5G mobile communication</topic><topic>6G communications</topic><topic>6G mobile communication</topic><topic>Ad hoc networks</topic><topic>Communication networks</topic><topic>Design specifications</topic><topic>Internet of Things</topic><topic>Literature reviews</topic><topic>Mobile ad hoc networks</topic><topic>mobile communication</topic><topic>Mobile computing</topic><topic>Next generation networking</topic><topic>Nodes</topic><topic>Routing</topic><topic>Routing protocols</topic><topic>Security</topic><topic>Surveys</topic><topic>Taxonomy</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kampitaki, Dimitra G.</creatorcontrib><creatorcontrib>Economides, Anastasios A.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Xplore Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kampitaki, Dimitra G.</au><au>Economides, Anastasios A.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Selfishness in Mobile Ad-hoc Networks: A Literature Review on Detection Techniques and Prevention Mechanisms</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2023-01-01</date><risdate>2023</risdate><volume>11</volume><spage>1</spage><epage>1</epage><pages>1-1</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>Constant connectivity is one of the most challenging requirements modern communication networks promise to satisfy. 5G and Beyond applications and the proliferation of Internet of Things (IoT) applications make mobile networks one of the most discussed research topics of the present, while research is already moving towards the design specifications and development of 6G services and solutions. Using multi-hop patterns, mobile nodes can move around always maintaining their connectivity in a pervasive and ubiquitous manner. New possibilities emerge from this progress, whereas long known challenges still exist and evolve. One of them is the selfishness or unwillingness of some nodes to spend resources to serve the communication requests of other nodes, not in a malicious but rather in a self-conservative manner. While intentional misbehavior of nodes is considered a security issue, selfishness is studied separately in the relevant literature and has attracted a lot of research attention. In this review we attempt to present the leading research on the detection techniques and the preventive mechanisms employed by previous studies to address the selfishness problem in mobile ad hoc networks, and to identify the trends during the past few years, focusing primarily on the routing layer. We follow a systematic methodology to identify, select, categorize, and analyze the relevant research and we use a concept-centric approach to present the results forming a comprehensive starting point for future research.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2023.3305262</doi><tpages>1</tpages><orcidid>https://orcid.org/0000-0001-8056-1024</orcidid><orcidid>https://orcid.org/0000-0002-5643-142X</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2169-3536
ispartof IEEE access, 2023-01, Vol.11, p.1-1
issn 2169-3536
2169-3536
language eng
recordid cdi_ieee_primary_10216965
source Directory of Open Access Journals; IEEE Xplore Open Access Journals; EZB Electronic Journals Library
subjects 5G and Beyond communications
5G mobile communication
6G communications
6G mobile communication
Ad hoc networks
Communication networks
Design specifications
Internet of Things
Literature reviews
Mobile ad hoc networks
mobile communication
Mobile computing
Next generation networking
Nodes
Routing
Routing protocols
Security
Surveys
Taxonomy
title Selfishness in Mobile Ad-hoc Networks: A Literature Review on Detection Techniques and Prevention Mechanisms
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-24T21%3A34%3A39IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Selfishness%20in%20Mobile%20Ad-hoc%20Networks:%20A%20Literature%20Review%20on%20Detection%20Techniques%20and%20Prevention%20Mechanisms&rft.jtitle=IEEE%20access&rft.au=Kampitaki,%20Dimitra%20G.&rft.date=2023-01-01&rft.volume=11&rft.spage=1&rft.epage=1&rft.pages=1-1&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2023.3305262&rft_dat=%3Cproquest_ieee_%3E2855722773%3C/proquest_ieee_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2855722773&rft_id=info:pmid/&rft_ieee_id=10216965&rft_doaj_id=oai_doaj_org_article_8e61dec1bb304abeb653208b8d1ab607&rfr_iscdi=true