Abstract
Watchdogs are a well-known mechanism to detect threats and attacks from misbehaved and selfish nodes in computer networks. In infrastructureless networks, such as MANETs, attack detection and reaction is a key issue to the whole network. Watchdog systems overhear traffic and perform analysis using data collected to decide the grade of misbehaviour that their neighbour nodes present, so accuracy and detection speed play a key role in achieving the right level of network security and performance. The problem behind the use of watchdogs is that they can cause a relatively high level of false positives and false negatives, so increasing their accuracy is also basic to successfully implement this technology in real MANET environments. This paper proposes a collaborative approach for detecting black holes and selfish nodes in MANETs, using a set of watchdogs which collaborate to enhance their individual and collective performance. The paper shows that using this collaborative watchdog approach the detection time of misbehaved nodes is reduced and the overall accuracy increased.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Buchegger, S., Le Boudec, J.Y.: Self-policing mobile ad hoc networks by reputation systems. IEEE Communications Magazine (2005)
Buttyan, L., Hubaux, J.P.: Enforcing service availability in mobile ad-hoc wans. In: IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing, MobiHOC (2000)
Buttyan, L., Hubaux, J.P.: Stimulating cooperation in self-organizing mobile ad hoc networks. Mobile Networks and Applications 8(5) (2003)
Hortelano, J., Calafate, C.T., Cano, J.C., de Leoni, M., Manzoni, P., Mecella, M.: Black-hole attacks in p2p mobile networks discovered through bayesian filters. In: Proceedings of OTM Workshops 2010, pp. 543–552 (2010)
Hortelano, J., Cano, J.C., Calafate, C.T., Manzoni, P.: Watchdog intrusion detection systems: Are they feasible in manets? In: XXI Jornadas de Paralelismo, CEDI 2010 (2010)
Kargl, F., Klenk, A., Schlott, S., Weber, M.: Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, vol. 3313, pp. 152–165. Springer, Heidelberg (2005)
Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the Sixth International Conference on Mobile Computing and Networking, MobiCom 2000 (2000)
Sundarajan, T., Shammugam, A.: Modeling the behavior of selfish forwarding nodes to stimulate cooperation in manet. International Journal of Network Security and its Applications (IJNSA) 2(2) (2010)
Toh, C.K., Kim, D., Oh, S., Yoo, H.: The controversy of selfish nodes in ad hoc networks. In: Proc. of the 12th Int. Conf. on Advanced communication technology, ICACT 2010 (2010)
Xu, L., Lon, Z., Ye, A.: Analysis and countermeasures of selfish node problem in mobile ad hoc network. In: Proceedings of the Tenth International Conference on Computer Supported Cooperative Work in Design, CSCWD 2006 (2006)
Zhong, S., Chen, J., Yang, Y.: Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: Proceedings of the Twenty-second Annual Joint Conference of the IEEE Computer And Communications Societies, INFOCOM 2003 (2003)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Serrat-Olmos, M.D., Hernández-Orallo, E., Cano, JC., Calafate, C.T., Manzoni, P. (2013). A Collaborative Bayesian Watchdog for Detecting Black Holes in MANETs. In: Fortino, G., Badica, C., Malgeri, M., Unland, R. (eds) Intelligent Distributed Computing VI. Studies in Computational Intelligence, vol 446. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32524-3_28
Download citation
DOI: https://doi.org/10.1007/978-3-642-32524-3_28
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32523-6
Online ISBN: 978-3-642-32524-3
eBook Packages: EngineeringEngineering (R0)