5 research outputs found

    A novel approach for the fast detection of black holes in mobile ad hoc networks

    Full text link
    Mobile ad hoc networks are infrastructure-less wireless networks that rely on node cooperation to properly work. In this kind of networks, attack detection and reaction is a key issue to the whole network. The most common threat in mobile ad hoc network scenarios consists in the presence of a certain percentage of selfish nodes, which try to reduce the consumption of their own resources to prolong their battery lifetime. Those nodes do not collaborate on forwarding activities, therefore affecting the overall network performance. Watchdogs are well-known mechanisms to detect threats and attacks from misbehaved and selfish nodes in computer networks. The problem behind the use of watchdogs is that while they can be quite effective in detecting selfishness by using their traffic overhearing behaviour, they can also cause a relatively high level of false negatives, thereby reducing their accuracy. This article proposes a collaborative approach for detecting selfish nodes in mobile ad hoc networks. It is based on using a set of collaborative watchdogs, which collaborate to enhance their individual and collective performance. By using both an analytical study and simulation, we demonstrate that our approach is able to improve accuracy and detection speed, while reducing the impact of false-negative eventsThis work was partially supported by the Ministerio de Ciencia e Innovacion, Spain, under grant TIN2011-27543-C03-01.Serrat Olmos, MD.; Hernández Orallo, E.; Cano Escribá, JC.; Tavares De Araujo Cesariny Calafate, CM.; Manzoni, P. (2013). A novel approach for the fast detection of black holes in mobile ad hoc networks. Concurrent Engineering: Research and Applications. 21(3):177-185. https://doi.org/10.1177/1063293X13493448S177185213Buchegger, S., & Le Boudec, J.-Y. (2005). Self-policing mobile ad hoc networks by reputation systems. IEEE Communications Magazine, 43(7), 101-107. doi:10.1109/mcom.2005.1470831Buttyán, L., & Hubaux, J.-P. (2003). Mobile Networks and Applications, 8(5), 579-592. doi:10.1023/a:1025146013151Groenevelt, R., Nain, P., & Koole, G. (2005). The message delay in mobile ad hoc networks. Performance Evaluation, 62(1-4), 210-228. doi:10.1016/j.peva.2005.07.018Hortelano, J., Calafate, C. T., Cano, J. C., de Leoni, M., Manzoni, P., & Mecella, M. (2010). Black-Hole Attacks in P2P Mobile Networks Discovered through Bayesian Filters. Lecture Notes in Computer Science, 543-552. doi:10.1007/978-3-642-16961-8_77Li, Y., Su, G., Wu, D. O., Jin, D., Su, L., & Zeng, L. (2011). The Impact of Node Selfishness on Multicasting in Delay Tolerant Networks. IEEE Transactions on Vehicular Technology, 60(5), 2224-2238. doi:10.1109/tvt.2011.2149552Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. Proceedings of the 6th annual international conference on Mobile computing and networking - MobiCom ’00. doi:10.1145/345910.345955T.V.P, S., & A, S. (2010). Modeling the Behavior of Selfish Forwarding Nodes to Stimulate Cooperation in MANET. International journal of Network Security & Its Applications, 2(2), 147-160. doi:10.5121/ijnsa.2010.2212Xu, L., Lin, Z., & Ye, A. (2006). Analysis and Countermeasure of Selfish Node Problem in Mobile Ad Hoc Network. 2006 10th International Conference on Computer Supported Cooperative Work in Design. doi:10.1109/cscwd.2006.253072Zhong, S., Chen, J., & Yang, Y. R. (s. f.). Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks. IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428). doi:10.1109/infcom.2003.1209220Zhu, H., Fu, L., Xue, G., Zhu, Y., Li, M., & Ni, L. M. (2010). Recognizing Exponential Inter-Contact Time in VANETs. 2010 Proceedings IEEE INFOCOM. doi:10.1109/infcom.2010.546226

    Black-hole attacks in P2P mobile networks discovered through bayesian filters

    No full text
    MANETs (Mobile Ad-hoc NETworks) are an example of Peer-to-Peer (P2P) mobile networks in which security attacks, as black-hole ones, may cause serious dangers to the whole system. The watchdog is a well-known sensor usually adopted for detecting black-holes in such networks, but typical watchdogs are characterized by a relatively high number of false positive and negative cases, which can affect the effectiveness and efficiency to deal with intrusions.This paper proposes a novel approach for detecting black-hole attacks and selfish nodes in mobile P2P networks by using a watchdog sensor and a bayesian filtering. We demonstrate the validity of the approach through testing

    Black-Hole Attacks in P2P Mobile Networks Discovered through Bayesian Filters

    No full text
    MANETs (Mobile Ad-hoc NETworks) are an example of Peer-to-Peer (P2P) mobile networks in which security attacks, as black-hole ones, may cause serious dangers to the whole system. The watchdog is a well-known sensor usually adopted for detecting black-holes in such networks, but typical watchdogs are characterized by a relatively high number of false positive and negative cases, which can affect the effectiveness and efficiency to deal with intrusions.This paper proposes a novel approach for detecting black-hole attacks and selfish nodes in mobile P2P networks by using a watchdog sensor and a bayesian filtering. We demonstrate the validity of the approach through testing

    Watchdogs colaborativos para la detección de nodos maliciosos en redes MANET

    Full text link
    En esta Tesis de Master se ha trabajado en la detección de nodos maliciosos que pudieran estar presentes en redes móviles ad-hoc (MANETs), utilizando watchdogs en los nodos que las forman, de tal manera que dichos watchdogs colaboran entre ellos para mejorar la rapidez y exactitud de la detección.Serrat Olmos, MD. (2011). Watchdogs colaborativos para la detección de nodos maliciosos en redes MANET. http://hdl.handle.net/10251/15673Archivo delegad
    corecore