Selfishness in Mobile Ad-hoc Networks: A Literature Review on Detection Techniques and Prevention Mechanisms
Constant connectivity is one of the most challenging requirements modern communication networks promise to satisfy. 5G and Beyond applications and the proliferation of Internet of Things (IoT) applications make mobile networks one of the most discussed research topics of the present, while research...
Gespeichert in:
Veröffentlicht in: | IEEE access 2023-01, Vol.11, p.1-1 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | IEEE access |
container_volume | 11 |
creator | Kampitaki, Dimitra G. Economides, Anastasios A. |
description | Constant connectivity is one of the most challenging requirements modern communication networks promise to satisfy. 5G and Beyond applications and the proliferation of Internet of Things (IoT) applications make mobile networks one of the most discussed research topics of the present, while research is already moving towards the design specifications and development of 6G services and solutions. Using multi-hop patterns, mobile nodes can move around always maintaining their connectivity in a pervasive and ubiquitous manner. New possibilities emerge from this progress, whereas long known challenges still exist and evolve. One of them is the selfishness or unwillingness of some nodes to spend resources to serve the communication requests of other nodes, not in a malicious but rather in a self-conservative manner. While intentional misbehavior of nodes is considered a security issue, selfishness is studied separately in the relevant literature and has attracted a lot of research attention. In this review we attempt to present the leading research on the detection techniques and the preventive mechanisms employed by previous studies to address the selfishness problem in mobile ad hoc networks, and to identify the trends during the past few years, focusing primarily on the routing layer. We follow a systematic methodology to identify, select, categorize, and analyze the relevant research and we use a concept-centric approach to present the results forming a comprehensive starting point for future research. |
doi_str_mv | 10.1109/ACCESS.2023.3305262 |
format | Article |
fullrecord | <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_ieee_primary_10216965</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10216965</ieee_id><doaj_id>oai_doaj_org_article_8e61dec1bb304abeb653208b8d1ab607</doaj_id><sourcerecordid>2855722773</sourcerecordid><originalsourceid>FETCH-LOGICAL-c409t-61d4201718643f123e7fd59c342656efccb1a80c54b79221eb2ef62999a50c143</originalsourceid><addsrcrecordid>eNpNkctOwzAQRSMEEgj4AlhYYp3iR-wk7KryqlQeorC2bGdCXdIY7LQVf4_bVKjeeDQz986MTpJcEDwgBJfXw9HobjodUEzZgDHMqaAHyQklokwZZ-JwLz5OzkOY4_iKmOL5SdJMoaltmLUQArItenLaNoCGVTpzBj1Dt3b-K9ygIZrYDrzqlh7QG6wsrJFr0S10YDobo3cws9b-LCEg1Vbo1cMK2m3lKVZUa8MinCVHtWoCnO_-0-Tj_u599JhOXh7Go-EkNRkuu1SQKqOY5KQQGasJZZDXFS8Ny6jgAmpjNFEFNjzTeUkpAU2hFrQsS8WxIRk7Tca9b-XUXH57u1D-Vzpl5Tbh_KdUvrOmAVlAnAaGaM1wpjRowRnFhS4qorTAefS66r2-vdtc18m5W_o2ri9pwXlOaZ6z2MX6LuNdCB7q_6kEyw0l2VOSG0pyRymqLnuVBYA9xYZX3OMPR-GNig</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2855722773</pqid></control><display><type>article</type><title>Selfishness in Mobile Ad-hoc Networks: A Literature Review on Detection Techniques and Prevention Mechanisms</title><source>Directory of Open Access Journals</source><source>IEEE Xplore Open Access Journals</source><source>EZB Electronic Journals Library</source><creator>Kampitaki, Dimitra G. ; Economides, Anastasios A.</creator><creatorcontrib>Kampitaki, Dimitra G. ; Economides, Anastasios A.</creatorcontrib><description>Constant connectivity is one of the most challenging requirements modern communication networks promise to satisfy. 5G and Beyond applications and the proliferation of Internet of Things (IoT) applications make mobile networks one of the most discussed research topics of the present, while research is already moving towards the design specifications and development of 6G services and solutions. Using multi-hop patterns, mobile nodes can move around always maintaining their connectivity in a pervasive and ubiquitous manner. New possibilities emerge from this progress, whereas long known challenges still exist and evolve. One of them is the selfishness or unwillingness of some nodes to spend resources to serve the communication requests of other nodes, not in a malicious but rather in a self-conservative manner. While intentional misbehavior of nodes is considered a security issue, selfishness is studied separately in the relevant literature and has attracted a lot of research attention. In this review we attempt to present the leading research on the detection techniques and the preventive mechanisms employed by previous studies to address the selfishness problem in mobile ad hoc networks, and to identify the trends during the past few years, focusing primarily on the routing layer. We follow a systematic methodology to identify, select, categorize, and analyze the relevant research and we use a concept-centric approach to present the results forming a comprehensive starting point for future research.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2023.3305262</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>5G and Beyond communications ; 5G mobile communication ; 6G communications ; 6G mobile communication ; Ad hoc networks ; Communication networks ; Design specifications ; Internet of Things ; Literature reviews ; Mobile ad hoc networks ; mobile communication ; Mobile computing ; Next generation networking ; Nodes ; Routing ; Routing protocols ; Security ; Surveys ; Taxonomy</subject><ispartof>IEEE access, 2023-01, Vol.11, p.1-1</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c409t-61d4201718643f123e7fd59c342656efccb1a80c54b79221eb2ef62999a50c143</citedby><cites>FETCH-LOGICAL-c409t-61d4201718643f123e7fd59c342656efccb1a80c54b79221eb2ef62999a50c143</cites><orcidid>0000-0001-8056-1024 ; 0000-0002-5643-142X</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10216965$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,776,780,860,2095,27612,27903,27904,54911</link.rule.ids></links><search><creatorcontrib>Kampitaki, Dimitra G.</creatorcontrib><creatorcontrib>Economides, Anastasios A.</creatorcontrib><title>Selfishness in Mobile Ad-hoc Networks: A Literature Review on Detection Techniques and Prevention Mechanisms</title><title>IEEE access</title><addtitle>Access</addtitle><description>Constant connectivity is one of the most challenging requirements modern communication networks promise to satisfy. 5G and Beyond applications and the proliferation of Internet of Things (IoT) applications make mobile networks one of the most discussed research topics of the present, while research is already moving towards the design specifications and development of 6G services and solutions. Using multi-hop patterns, mobile nodes can move around always maintaining their connectivity in a pervasive and ubiquitous manner. New possibilities emerge from this progress, whereas long known challenges still exist and evolve. One of them is the selfishness or unwillingness of some nodes to spend resources to serve the communication requests of other nodes, not in a malicious but rather in a self-conservative manner. While intentional misbehavior of nodes is considered a security issue, selfishness is studied separately in the relevant literature and has attracted a lot of research attention. In this review we attempt to present the leading research on the detection techniques and the preventive mechanisms employed by previous studies to address the selfishness problem in mobile ad hoc networks, and to identify the trends during the past few years, focusing primarily on the routing layer. We follow a systematic methodology to identify, select, categorize, and analyze the relevant research and we use a concept-centric approach to present the results forming a comprehensive starting point for future research.</description><subject>5G and Beyond communications</subject><subject>5G mobile communication</subject><subject>6G communications</subject><subject>6G mobile communication</subject><subject>Ad hoc networks</subject><subject>Communication networks</subject><subject>Design specifications</subject><subject>Internet of Things</subject><subject>Literature reviews</subject><subject>Mobile ad hoc networks</subject><subject>mobile communication</subject><subject>Mobile computing</subject><subject>Next generation networking</subject><subject>Nodes</subject><subject>Routing</subject><subject>Routing protocols</subject><subject>Security</subject><subject>Surveys</subject><subject>Taxonomy</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>DOA</sourceid><recordid>eNpNkctOwzAQRSMEEgj4AlhYYp3iR-wk7KryqlQeorC2bGdCXdIY7LQVf4_bVKjeeDQz986MTpJcEDwgBJfXw9HobjodUEzZgDHMqaAHyQklokwZZ-JwLz5OzkOY4_iKmOL5SdJMoaltmLUQArItenLaNoCGVTpzBj1Dt3b-K9ygIZrYDrzqlh7QG6wsrJFr0S10YDobo3cws9b-LCEg1Vbo1cMK2m3lKVZUa8MinCVHtWoCnO_-0-Tj_u599JhOXh7Go-EkNRkuu1SQKqOY5KQQGasJZZDXFS8Ny6jgAmpjNFEFNjzTeUkpAU2hFrQsS8WxIRk7Tca9b-XUXH57u1D-Vzpl5Tbh_KdUvrOmAVlAnAaGaM1wpjRowRnFhS4qorTAefS66r2-vdtc18m5W_o2ri9pwXlOaZ6z2MX6LuNdCB7q_6kEyw0l2VOSG0pyRymqLnuVBYA9xYZX3OMPR-GNig</recordid><startdate>20230101</startdate><enddate>20230101</enddate><creator>Kampitaki, Dimitra G.</creator><creator>Economides, Anastasios A.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0001-8056-1024</orcidid><orcidid>https://orcid.org/0000-0002-5643-142X</orcidid></search><sort><creationdate>20230101</creationdate><title>Selfishness in Mobile Ad-hoc Networks: A Literature Review on Detection Techniques and Prevention Mechanisms</title><author>Kampitaki, Dimitra G. ; Economides, Anastasios A.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c409t-61d4201718643f123e7fd59c342656efccb1a80c54b79221eb2ef62999a50c143</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>5G and Beyond communications</topic><topic>5G mobile communication</topic><topic>6G communications</topic><topic>6G mobile communication</topic><topic>Ad hoc networks</topic><topic>Communication networks</topic><topic>Design specifications</topic><topic>Internet of Things</topic><topic>Literature reviews</topic><topic>Mobile ad hoc networks</topic><topic>mobile communication</topic><topic>Mobile computing</topic><topic>Next generation networking</topic><topic>Nodes</topic><topic>Routing</topic><topic>Routing protocols</topic><topic>Security</topic><topic>Surveys</topic><topic>Taxonomy</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kampitaki, Dimitra G.</creatorcontrib><creatorcontrib>Economides, Anastasios A.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Xplore Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kampitaki, Dimitra G.</au><au>Economides, Anastasios A.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Selfishness in Mobile Ad-hoc Networks: A Literature Review on Detection Techniques and Prevention Mechanisms</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2023-01-01</date><risdate>2023</risdate><volume>11</volume><spage>1</spage><epage>1</epage><pages>1-1</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>Constant connectivity is one of the most challenging requirements modern communication networks promise to satisfy. 5G and Beyond applications and the proliferation of Internet of Things (IoT) applications make mobile networks one of the most discussed research topics of the present, while research is already moving towards the design specifications and development of 6G services and solutions. Using multi-hop patterns, mobile nodes can move around always maintaining their connectivity in a pervasive and ubiquitous manner. New possibilities emerge from this progress, whereas long known challenges still exist and evolve. One of them is the selfishness or unwillingness of some nodes to spend resources to serve the communication requests of other nodes, not in a malicious but rather in a self-conservative manner. While intentional misbehavior of nodes is considered a security issue, selfishness is studied separately in the relevant literature and has attracted a lot of research attention. In this review we attempt to present the leading research on the detection techniques and the preventive mechanisms employed by previous studies to address the selfishness problem in mobile ad hoc networks, and to identify the trends during the past few years, focusing primarily on the routing layer. We follow a systematic methodology to identify, select, categorize, and analyze the relevant research and we use a concept-centric approach to present the results forming a comprehensive starting point for future research.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2023.3305262</doi><tpages>1</tpages><orcidid>https://orcid.org/0000-0001-8056-1024</orcidid><orcidid>https://orcid.org/0000-0002-5643-142X</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2169-3536 |
ispartof | IEEE access, 2023-01, Vol.11, p.1-1 |
issn | 2169-3536 2169-3536 |
language | eng |
recordid | cdi_ieee_primary_10216965 |
source | Directory of Open Access Journals; IEEE Xplore Open Access Journals; EZB Electronic Journals Library |
subjects | 5G and Beyond communications 5G mobile communication 6G communications 6G mobile communication Ad hoc networks Communication networks Design specifications Internet of Things Literature reviews Mobile ad hoc networks mobile communication Mobile computing Next generation networking Nodes Routing Routing protocols Security Surveys Taxonomy |
title | Selfishness in Mobile Ad-hoc Networks: A Literature Review on Detection Techniques and Prevention Mechanisms |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-24T21%3A34%3A39IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Selfishness%20in%20Mobile%20Ad-hoc%20Networks:%20A%20Literature%20Review%20on%20Detection%20Techniques%20and%20Prevention%20Mechanisms&rft.jtitle=IEEE%20access&rft.au=Kampitaki,%20Dimitra%20G.&rft.date=2023-01-01&rft.volume=11&rft.spage=1&rft.epage=1&rft.pages=1-1&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2023.3305262&rft_dat=%3Cproquest_ieee_%3E2855722773%3C/proquest_ieee_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2855722773&rft_id=info:pmid/&rft_ieee_id=10216965&rft_doaj_id=oai_doaj_org_article_8e61dec1bb304abeb653208b8d1ab607&rfr_iscdi=true |