[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

A Collaborative Bayesian Watchdog for Detecting Black Holes in MANETs

  • Conference paper
Intelligent Distributed Computing VI

Abstract

Watchdogs are a well-known mechanism to detect threats and attacks from misbehaved and selfish nodes in computer networks. In infrastructureless networks, such as MANETs, attack detection and reaction is a key issue to the whole network. Watchdog systems overhear traffic and perform analysis using data collected to decide the grade of misbehaviour that their neighbour nodes present, so accuracy and detection speed play a key role in achieving the right level of network security and performance. The problem behind the use of watchdogs is that they can cause a relatively high level of false positives and false negatives, so increasing their accuracy is also basic to successfully implement this technology in real MANET environments. This paper proposes a collaborative approach for detecting black holes and selfish nodes in MANETs, using a set of watchdogs which collaborate to enhance their individual and collective performance. The paper shows that using this collaborative watchdog approach the detection time of misbehaved nodes is reduced and the overall accuracy increased.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 103.50
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 129.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
GBP 129.99
Price includes VAT (United Kingdom)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Buchegger, S., Le Boudec, J.Y.: Self-policing mobile ad hoc networks by reputation systems. IEEE Communications Magazine (2005)

    Google Scholar 

  2. Buttyan, L., Hubaux, J.P.: Enforcing service availability in mobile ad-hoc wans. In: IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing, MobiHOC (2000)

    Google Scholar 

  3. Buttyan, L., Hubaux, J.P.: Stimulating cooperation in self-organizing mobile ad hoc networks. Mobile Networks and Applications 8(5) (2003)

    Google Scholar 

  4. Hortelano, J., Calafate, C.T., Cano, J.C., de Leoni, M., Manzoni, P., Mecella, M.: Black-hole attacks in p2p mobile networks discovered through bayesian filters. In: Proceedings of OTM Workshops 2010, pp. 543–552 (2010)

    Google Scholar 

  5. Hortelano, J., Cano, J.C., Calafate, C.T., Manzoni, P.: Watchdog intrusion detection systems: Are they feasible in manets? In: XXI Jornadas de Paralelismo, CEDI 2010 (2010)

    Google Scholar 

  6. Kargl, F., Klenk, A., Schlott, S., Weber, M.: Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, vol. 3313, pp. 152–165. Springer, Heidelberg (2005)

    Google Scholar 

  7. Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the Sixth International Conference on Mobile Computing and Networking, MobiCom 2000 (2000)

    Google Scholar 

  8. Sundarajan, T., Shammugam, A.: Modeling the behavior of selfish forwarding nodes to stimulate cooperation in manet. International Journal of Network Security and its Applications (IJNSA) 2(2) (2010)

    Google Scholar 

  9. Toh, C.K., Kim, D., Oh, S., Yoo, H.: The controversy of selfish nodes in ad hoc networks. In: Proc. of the 12th Int. Conf. on Advanced communication technology, ICACT 2010 (2010)

    Google Scholar 

  10. Xu, L., Lon, Z., Ye, A.: Analysis and countermeasures of selfish node problem in mobile ad hoc network. In: Proceedings of the Tenth International Conference on Computer Supported Cooperative Work in Design, CSCWD 2006 (2006)

    Google Scholar 

  11. Zhong, S., Chen, J., Yang, Y.: Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: Proceedings of the Twenty-second Annual Joint Conference of the IEEE Computer And Communications Societies, INFOCOM 2003 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manuel D. Serrat-Olmos .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Serrat-Olmos, M.D., Hernández-Orallo, E., Cano, JC., Calafate, C.T., Manzoni, P. (2013). A Collaborative Bayesian Watchdog for Detecting Black Holes in MANETs. In: Fortino, G., Badica, C., Malgeri, M., Unland, R. (eds) Intelligent Distributed Computing VI. Studies in Computational Intelligence, vol 446. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32524-3_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32524-3_28

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32523-6

  • Online ISBN: 978-3-642-32524-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics