[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2387238.2387266acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
research-article

Evaluation of collaborative selfish node detection in MANETS and DTNs

Published: 21 October 2012 Publication History

Abstract

Mobile ad-hoc Networks (MANETs) and Delay Tolerant Networks (DTN) rely on network cooperation schemes to work properly. Nevertheless, if nodes have a selfish behaviour and are unwilling to cooperate, the overall network performance could be seriously affected. The use of watchdogs is a well-known mechanism to detect selfish nodes. Nevertheless, the detection process performed by watchdogs can fail, generating false positives and false negatives that can induce a wrong behaviour.
In this paper we propose a collaborative watchdog approach based on the diffusion of selfish nodes awareness, that reduces the impact of false positives and false negatives. In order to evaluate the efficiency of our approach, we introduce an analytical model to evaluate the time of detection and the induced overhead of our collaborative watchdog. The results confirm the efficiency of our approach since the detection time of selfish nodes is reduced, the overall overhead is very low, and the impact of false positives and false negatives is minimised.

References

[1]
S. Buchegger and J.-Y. Le Boudee. Self-policing mobile ad hoc networks by reputation systems. Communications Magazine, IEEE, 43(7):101 -- 107, jul. 2005.
[2]
H. Cai and D. Y. Eun. Crossing over the bounded domain: From exponential to power-law intermeeting time in mobile ad hoc networks. Networking, IEEE/ACM Transactions on, 17(5):1578 --1591, oct. 2009.
[3]
A. Chaintreau, P. Hui, J. Crowcroft, C. Diot, R. Gass, and J. Scott. Impact of human mobility on opportunistic forwarding algorithms. IEEE Transactions on Mobile Computing, 6:606--620, Jun 2007.
[4]
W. Gao, Q. Li, B. Zhao, and G. Cao. Multicasting in delay tolerant networks: a social network perspective. In Proceedings of MobiHoc '09, pages 299--308, 2009.
[5]
R. Groenevelt, P. Nain, and G. Koole. The message delay in mobile ad hoc networks. Performance Evaluation, 62:210--228, October 2005.
[6]
E. Hernández-Orallo, M. D. Serrat, J.-C. Cano, C. M. T. Calafate, and P. Manzoni. Improving selfish node detection in manets using a collaborative watchdog. IEEE Communications Letters, 16(5):642--645, 2012.
[7]
M. Hollick, J. Schmitt, C. Seipl, and R. Steinmetz. On the effect of node misbehavior in ad hoc networks. In Proceedings of IEEE International Conference on Communications, ICC'04, pages 3759--3763, 2004.
[8]
J. Hortelano, J.-C. Cano, C. T. Calafate, M. de Leoni, P. Manzoni, and M. Mecella. Black hole attacks in p2p mobile networks discovered through bayesian filters. In In P2P Collaborative Distributed Virtual Environments (P2P CDVE 2010), 2010.
[9]
J. Hortelano, J. C. Ruiz, and P. Manzoni. Evaluating the uselfusness of watchdogs for intrusion detection in vanets. In In ICC'10 Workshop on Vehicular Networking and Applications, 2010.
[10]
T. Karagiannis, J.-Y. Le Boudec, and M. Vojnović. Power law and exponential decay of inter contact times between mobile devices. In Proceedings of MobiCom '07, pages 183--194. ACM, 2007.
[11]
M. Karaliopoulos. Assessing the vulnerability of dtn data relaying schemes to node selfishness. Communications Letters, IEEE, 13(12):923 --925, december 2009.
[12]
F. Kargl, A. Klenk, S. Schlott, and M. Weber. Advanced detection of selfish or malicious nodes in ad hoc networks. In In Proceedings of the 1st European on Security in Ad-Hoc and Sensor Networks, pages 152--165. Springer Verlag, 2004.
[13]
Y. Li, G. Su, D. Wu, D. Jin, L. Su, and L. Zeng. The impact of node selfishness on multicasting in delay tolerant networks. Vehicular Technology, IEEE Transactions on, 60(5):2224 --2238, jun 2011.
[14]
S. Marti, T. J. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of MobiCom '00, pages 255--265, 2000.
[15]
A. Passarella and M. Conti. Characterising aggregate inter-contact times in heterogeneous opportunistic networks. In Proceedings of the 10th international conference on Networking, pages 301--313, 2011.
[16]
K. Paul and D. Westhoff. Context aware detection of selfish nodes in dsr based ad-hoc networks. In In Proceedings of IEEE Globecom, 2002.
[17]
C. Toh, D. Kim, S. Oh, and H. Yoo. The controversy of selfish nodes in ad hoc networks. In Proceeding of Advanced Communication Technology (ICACT), 2010, volume 2, pages 1087 --1092, feb. 2010.
[18]
Y. Yoo, S. Ahn, and D. Agrawal. A credit-payment scheme for packet forwarding fairness in mobile ad hoc networks. In Proceedings of IEEE ICC, volume 5, pages 3005 -- 3009 Vol. 5, may 2005.
[19]
H. Zhu, L. Fu, G. Xue, Y. Zhu, M. Li, and L. M. Ni. Recognizing exponential inter-contact time in vanets. In Proceedings of INFOCOM'10, pages 101--105, 2010.

Cited By

View all
  • (2022)Selfish node management in opportunistic mobile networks with improved social based watchdog and dynamic power AODV protocolInternational Journal of Information Technology10.1007/s41870-022-01030-814:6(3253-3264)Online publication date: 16-Jul-2022
  • (2021)Effective and Prominent Approaches for Malicious Node Detection in MANET2021 International Conference on Computational Intelligence and Computing Applications (ICCICA)10.1109/ICCICA52458.2021.9697234(1-6)Online publication date: 26-Nov-2021
  • (2018)A Survey on Human-Centric Communications in Non-Cooperative Wireless Relay NetworksIEEE Communications Surveys & Tutorials10.1109/COMST.2018.279142820:2(914-944)Online publication date: Oct-2019
  • Show More Cited By

Index Terms

  1. Evaluation of collaborative selfish node detection in MANETS and DTNs

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      MSWiM '12: Proceedings of the 15th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems
      October 2012
      428 pages
      ISBN:9781450316286
      DOI:10.1145/2387238
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 21 October 2012

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. dtns
      2. manets
      3. selfish nodes
      4. wireless network

      Qualifiers

      • Research-article

      Conference

      MSWiM '12
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 398 of 1,577 submissions, 25%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)10
      • Downloads (Last 6 weeks)8
      Reflects downloads up to 13 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2022)Selfish node management in opportunistic mobile networks with improved social based watchdog and dynamic power AODV protocolInternational Journal of Information Technology10.1007/s41870-022-01030-814:6(3253-3264)Online publication date: 16-Jul-2022
      • (2021)Effective and Prominent Approaches for Malicious Node Detection in MANET2021 International Conference on Computational Intelligence and Computing Applications (ICCICA)10.1109/ICCICA52458.2021.9697234(1-6)Online publication date: 26-Nov-2021
      • (2018)A Survey on Human-Centric Communications in Non-Cooperative Wireless Relay NetworksIEEE Communications Surveys & Tutorials10.1109/COMST.2018.279142820:2(914-944)Online publication date: Oct-2019
      • (2017)Enhanced system for selfish node revival based on watchdog mechanism2017 International Conference on Trends in Electronics and Informatics (ICEI)10.1109/ICOEI.2017.8300943(332-337)Online publication date: May-2017
      • (2017)A social-based watchdog system to detect selfish nodes in opportunistic mobile networksFuture Generation Computer Systems10.1016/j.future.2017.10.049Online publication date: Nov-2017
      • (2016)ONSIDE-SELF: A Selfish Node Detection and Incentive Mechanism for Opportunistic DisseminationInternet of Things (IoT) in 5G Mobile Technologies10.1007/978-3-319-30913-2_14(317-332)Online publication date: 21-Apr-2016
      • (2015)CoCoWa: A Collaborative Contact-Based Watchdog for Detecting Selfish NodesIEEE Transactions on Mobile Computing10.1109/TMC.2014.234362714:6(1162-1175)Online publication date: 1-Jun-2015
      • (2014)Survey on Cooperation Incentive Mechanisms in MANETsApplied Mechanics and Materials10.4028/www.scientific.net/AMM.513-517.1811513-517(1811-1818)Online publication date: Feb-2014
      • (2014)A statistical learning reputation system for opportunistic networks2014 IFIP Wireless Days (WD)10.1109/WD.2014.7020822(1-6)Online publication date: Nov-2014
      • (2014)A novel hybrid incentive mechanism for node cooperation in mobile cyber-physical systemsInternational Journal of Parallel, Emergent and Distributed Systems10.1080/17445760.2013.85219429:3(316-336)Online publication date: 1-May-2014
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media