Skip to main content
Log in

A Fast Model for Evaluating the Detection of Selfish Nodes Using a Collaborative Approach in MANETs

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Mobile ad-hoc networks (MANETs) rely on network cooperation schemes to work properly. Nevertheless, if nodes have a selfish behaviour and are unwilling to cooperate, the overall network performance could be seriously affected. The use of watchdogs is a well-known mechanism to detect selfish nodes. In this paper we propose a collaborative watchdog approach, which is based on the fast diffusion of selfish nodes awareness. Then, we introduce an analytical model to evaluate the time of detection and the overhead (number of messages) of our collaborative watchdog approach for detecting one selfish node. This model is extended for the case of several selfish nodes, including a mean–max approximation for a feasible computation when the number of selfish nodes is high. The results show that a collaborative watchdog is a very efficient approach since the detection time of selfish nodes is reduced, and the overall overhead is very low.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Notes

  1. Note that each state number \(i\) can mapped as \(i=d(t)\cdot (C+1)+c(t)+1\).

  2. For simplicity, we omit the time in the states (that is \((d,c) = (d(t),c(t))\)).

References

  1. Bohnenkamp, H., & Haverkort, B. (2002). The mean value of the maximum. In APM-PROBMIV, LNCS, (Vol. 2399, pp. 37–56). Springer.

  2. Buchegger, S., & Le Boudee, J. Y. (2005). Self-policing mobile ad hoc networks by reputation systems. Communications Magazine, IEEE, 43(7), 101–107.

    Article  Google Scholar 

  3. Gao, W., Li, Q., Zhao, B., & Cao, G. (2009). Multicasting in delay tolerant networks: A social network perspective. In Proceedings of MobiHoc ’09, (pp. 299–308).

  4. Groenevelt, R., Nain, P., & Koole, G. (2005). The message delay in mobile ad hoc networks. Performance Evaluation, 62, 210–228.

    Article  Google Scholar 

  5. Hollick, M., Schmitt, J., Seipl, C., & Steinmetz, R. (2004). On the effect of node misbehavior in ad hoc networks. In Proceedings of IEEE international conference on communications, ICC’04 (pp. 3759–3763). IEEE.

  6. Hortelano, J., Cano, J. C., Calafate, C. T., de Leoni, M., Manzoni, P., & Mecella, M. (2010). Black hole attacks in p2p mobile networks discovered through bayesian filters. In P2P collaborative distributed virtual environments (P2P CDVE 2010).

  7. Hortelano, J., Ruiz, J. C., & Manzoni, P. (2010). Evaluating the uselfusness of watchdogs for intrusion detection in vanets. In ICC’10 workshop on vehicular networking and applications.

  8. Hui, P., Crowcroft, J., & Yoneki, E. (2008). Bubble rap: Social-based forwarding in delay tolerant networks. In Proceedings of MobiHoc ’08 (pp. 241–250). ACM.

  9. Karagiannis, T., Le Boudec, J. Y., & Vojnović, M. (2007). Power law and exponential decay of inter contact times between mobile devices. In Proceedings of MobiCom ’07 (pp. 183–194).

  10. Karaliopoulos, M. (2009). Assessing the vulnerability of DTN data relaying schemes to node selfishness. Communications Letters, IEEE, 13(12), 923–925.

    Article  Google Scholar 

  11. Kargl, F., Klenk, A., Schlott, S., & Weber, M. (2004). Advanced detection of selfish or malicious nodes in ad hoc networks. In Proceedings of the 1st European on security in ad-hoc and sensor networks (ESAS 2004) (pp. 152–165). Springer.

  12. Li, Q., Zhu, S., & Cao, G. (2010). Routing in socially selfish delay tolerant networks. In Proceedings of INFOCOM’10 (pp. 857–865). IEEE Press, Piscataway, NJ, USA.

  13. Li, Y., Su, G., Wu, D., Jin, D., Su, L., & Zeng, L. (2011). The impact of node selfishness on multicasting in delay tolerant networks. Vehicular Technology, IEEE Transactions on, 60(5), 2224–2238.

    Article  Google Scholar 

  14. Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of MobiCom ’00 (pp. 255–265).

  15. Palazzo, S., Campbell, A. T., & Dias de Amorim, M. (February, 2011). Opportunistic and delay-tolerant networks. EURASIP Journal on Wireless Communications and Networking, 2011, 2 pp. doi:10.1155/2011/164370.

  16. Paul, K., & Westhoff, D. (2002). Context aware detection of selfish nodes in dsr based ad-hoc networks. In Proceedings of IEEE Globecom.

  17. Toh, C., Kim, D., Oh, S., & Yoo, H. (2010). The controversy of selfish nodes in ad hoc networks. In Proceedings of IEEE international conference on advanced communication technology (IEEE ICACT Conference) (Vol. 2, pp. 1087–1092).

  18. Zhu, H., Fu, L., Xue, G., Zhu, Y., Li, M., & Ni, L. M. (2010). Recognizing exponential inter-contact time in vanets. In Proceedings of INFOCOM’10 (pp. 101–105). IEEE Press.

Download references

Acknowledgments

This work was partially supported by the Ministerio de Ciencia e Innovación, Spain (Grant TIN2011-27543-C03-01).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Juan-Carlos Cano.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Hernández-Orallo, E., Olmos, M.D.S., Cano, JC. et al. A Fast Model for Evaluating the Detection of Selfish Nodes Using a Collaborative Approach in MANETs. Wireless Pers Commun 74, 1099–1116 (2014). https://doi.org/10.1007/s11277-013-1346-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-013-1346-y

Keywords

Navigation