Journal Title : International Journal of Modern Trends in Engineering and Science
Paper Title : COCOWA TO DETECT THE SELFISH NODES USING WATCHDOG IN MOBILE ADHOC NETWORK
Volume 03 Issue 12 2016
ISSN no: 2348-3121
Page no: 81-83
Abstract – MANET assume that mobile nodes voluntary cooperate in order to work properly. This cooperation is a cost-intensive activity and some nodes can refuse to cooperate, leading to selfish node behavior. Thus, the overall network performance could be seriously affected. The use of watchdogs is a well-known mechanism to detect selfish nodes. However, the detection process performed by watchdogs can fail, generating false positives and false negatives that can induce to wrong operations. Moreover, relying on local watchdogs alone can lead to poor performance when detecting selfish nodes, in term of precision and speed. This is especially important on networks with sporadic contacts, such as delay tolerant networks (DTNs), where sometimes watchdogs lack of enough time or information to detect the selfish nodes. Thus, we propose CoCoWa as a collaborative approach based on the diffusion of local selfish nodes awareness when a contact occurs, so that information about selfish nodes is quickly propagated. As shown in the paper, this collaborative approach reduces the time and increases the precision when detecting selfish nodes.
Keywords— MANET; COCOWA; DTN
- Abbas.S, Merabti.M, Llewellyn-Jones.D, and Kifayat.K (2013), “Lightweight sybil attack detection in manets,” IEEE System. J,vol. 7, no. 2, pp. 236–248, Jun. 2013.
- Butty.L and Hubaux. J.P (2000), “Enforcing service availability inmobile ad-hoc WANs,” in Proc. 1st Annual Workshop Mobile Ad Hoc Network Computer., 2000, pp. 87–96.
- Bansal.S and Baker.M (2003), “Observation-based cooperation enforcement in adhoc networks” arXiv:cs.NI/0307012, 2003.
- Buchegger.S and Le Boudee. J.-Y (2005), “Self-policing mobile ad hocnetworks by reputation systems,” IEEE Communication. Management., vol. 43,no. 7, pp. 101–107, Jul. 2005.
- Cai.H and Eun.D.Y (2009), “Crossing over the bounded domain: From exponential to power-law intermeeting time in mobile ad hoc networks,” IEEE/ACM Transaction. Network., vol. 17, no. 5, pp. 1578–1591,Oct. 2009.
- Douceur.J.R (2002), “The sybil attack,” in Proc. Revised Papers 1st Int.Workshop Peer-to-Peer Syst., 2002, pp. 251–260.
- Gao.W, Li.Q, Zhao.B, and Cao.G (2009), “Multicasting in delay tolerantnetworks: A social network perspective,” in Proceeding. 10th ACM International Symposium Mobile Ad Hoc Network Computer, 2009, pp. 299–308.
- Hui.P, Crowcroft.J, and Yoneki.E (2008), “Bubble rap: social-based forwardingin delay tolerant networks,” in Proceeding 9th ACM International Symposium Mobile Ad Hoc Network Computer, 2008, pp. 241–250.
- Hortelano.J, Ruiz.J.C, and Manzoni.P (2010), “Evaluating the usefulnessof watchdogs for intrusion detection in VANETs,” in Proceeding.International Conference Communication Workshop, 2010, pp. 1–5.
- Hernandez-Orallo.E, Serrat M.D, Cano J.C, Calafate C.M.T ,and Manzoni.P (2012), “Improving selfish node detection in MANETs using a collaborative watchdog,” IEEE Communication Letter., vol. 16, no. 5,pp. 642–645, May 2012.
- Hern and ez-Orallo, Serrat Olmos M.D, Cano J.C, Calafate C.T, and Manzoni.P (2012), “Evaluation of collaborative selfish node detection in MANETS and DTNs,” in Proceeding. 15th ACM International Conference Modeling, Analog Simulation Wireless Mobile System., New York, NY, USA, 2012, pp. 159–166.
- Kargl.F, Klenk.A, Schlott.S, and Weber.M (2004),“Advanced detectionof selfish or malicious nodes in ad hoc networks,” in Proceeding 1st Europe Conference Security Ad-Hoc Sensor Network, 2004, pp.152–165.
- Li.Q, Zhu.S, and Cao.G (2010), “Routing in socially selfish delay tolerantnetworks,” in Proceeding IEEE Conference Computer Communication, 2010, pp. 857–865.
- Li.Y, Su.G, Wu.D, Jin.D, Su.L, and Zeng.L (2011), “The impact of node selfishness on multicasting in delay tolerant networks,” IEEE Transaction Vehicular. Technology, vol. 60, no. 5, pp. 2224–2238, Jun. 2011.