International Journal Of Engineering And Computer Science
Wireless ad hoc networks realize end-to-end communications in a cooperative manner. In this paradigm, multiple nodes coordinate to form a multi-hop route, when communication needs to take place between a source and a destination that are not within communication range. Thus, intermediate nodes are willing to carry traffic other than their own. For ad hoc networks deployed in hostile environments, a protocol compliant behavior on behalf of all nodes of the network cannot be assumed. Selfish and/or malicious users may misconfigure their devices to refuse forwarding any traffic, in order to conserve energy resources or degrade the network performance.