Skip to main content
Log in

Reputation-Based Cooperative Detection Model of Selfish Nodes in Cluster-Based QoS-OLSR Protocol

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The QOLSR is a multimedia protocol that was designed on top of the optimized link state routing (OLSR) protocol for mobile ad hoc network. It considers the quality of service (QoS) of the nodes during the selection of the multi-point relay (MPRs) nodes. One of the drawbacks of this protocol is the presence of selfish nodes that degrade the network lifetime. The limited energy and resources, and the absence of any motivation mechanism cause mobile nodes to behave selfishly during the MPRs selection. A new MPR selection based on cluster head election was proposed in previous work to increase network lifetime. In this paper, we consider the selfishness during the election and selection process by proposing the use of reputation system that will motivate nodes to participate during the selection of MPRs, where the reputation is calculated based on VCG mechanism design. After solving the selfishness during network formation, we have discovered that nodes can misbehave after being selected/elected. Such a passive malicious behavior could lead to a denial of service attack due to the drop of packets. As a solution, we propose a hierarchal cooperative watchdog detection model for the cluster-based QOLSR, where nodes cooperate in a hierarchical manner to detect selfish nodes. Moreover, to motivate watchdogs to monitor and cooperate with each other, incentives are given and calculated using cooperative game theory, where Shapley value is used to compute the contribution of each watchdog on the final decision. Simulation results show that the novel cluster-based QoS-OLSR model can give incentive to nodes to behave normally without sacrificing the quality of service of the network. In addition, the hierarchical cooperative detection model shows a more reliable and efficient detection of selfish nodes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

References

  1. Baccelli, E. (2005). OLSR trees: A simple clustering mechanism for OLSR. In Proceedings of the 4th IFIP annual Mediterranean ad hoc networking conference (pp. 265–274).

  2. Badis, H., & Agha, K. A. (2005). QOLSR, QoS routing for ad hoc wireless networks using OLSR. European Transactions on Telecommunications, 16, 427–442.

    Article  Google Scholar 

  3. Bansal, S., & Baker, M. (2003). Observation based cooperation enforcement in ad hoc networks. Technical Report (pp. 1–10).

  4. Bansal, S., & Baker, M. (2003). Securing the OLSR protocol. In Proceedings of the 2nd IFIP annual Mediterranean ad hoc networking workshop (pp. 1–10).

  5. Benslimane, A., Khoury, R. E., Azouzi, R. E., & Pierre, S. (2006). Energy power-aware routing in OLSR protocol. In Proceedings of the 1st mobile computing and wireless communication international conference (MCWC) (pp. 14–19).

  6. Bettstetter, C., Hartenstein, H., & PerezCosta, X. (2003). Stochastic properties of the random waypoint mobility model. In: ACM/Kluwer wireless networks, special issue on modeling and analysis of mobile networks.

  7. Buchegger, S., & Le Boudec, J. Y. (2003). Analysis of the CONFIDANT protocol: cooperation of nodes fairness in dynamic ad-hoc networks. In Proceedings of the 2nd IFIP annual Mediterranean ad hoc networking workshop (pp. 1–10).

  8. Camp, T., Boleng, J., & Davies, V. (2002). A survey of mobility models for ad hoc network research. Wireless Communication & Mobile Computing, 2, 483–502.

    Article  Google Scholar 

  9. Canourgues, L., Lephayand, J., Soyer, L., & Beylot, A.-L. (2008). A scalable adaptation of the OLSR protocol for large clustered mobile ad hoc networks. In Proceedings of the 7th IFIP annual Mediterranean ad hoc networking conference (pp. 97–108).

  10. Carruthers, R., & Nikolaidis, I. (2005). Certain limitations of reputation based schemes in mobile environments. In Proceedings of ACM symposium on applied Computing (pp. 2–11).

  11. Chriqi, A., Otrok, H., & Robert, J.-M. (2009). SC-OLSR: Secure clustering-based OLSR model for ad hoc networks. In Proceedings of 5th IEEE international conference on wireless and mobile computing, networking and communications (WiMob 2009).

  12. Clausen, T., & Jacquet, P. (2003). Optimized link state routing protocol (OLSR). RFC 3626, Internet Engineering Task Force, October 2003.

  13. He, Q., Wu, D., & Khosla, P. (2004). SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks. In IEEE INFOCOM (vol. 2, pp. 825–830), San Francisco, CA, USA.

  14. Hollick, M., Schmitt, J., & Seipl, C. (2004). On the effect of node misbehaviour in ad hoc network. In Proceedings of the IEEE conference on communication (vol. 6, pp. 3759–3763).

  15. Komninos, N., Vergados, D., & Douligeris, C. (2007). Detecting unauthorized and compromised nodes in mobile ad hoc networks. Ad hoc Networks-Elsevier, 5, 289–298.

    Article  Google Scholar 

  16. Kunz, T. (2008). Energy-efficient variations of OLSR. In Proceedings of the International wireless communications and mobile computing conference (IWCMC) (pp. 517–522).

  17. Li, Z., & Shen, H. (2012). Game-theoretic analysis of cooperation incentive strategies in mobile ad hoc networks. IEEE Transactions on Mobile Computing, 11, 1287–1303.

    Article  Google Scholar 

  18. Lin, H., Hu, J., Ma, J., Xu, L., & Nagar, A. (2013) A role based privacy-aware secure routing protocol for wireless mesh networks. Wireless Personal Communications. doi:10.1007/s11277-013-1171-3.

  19. Mahfoudh, S., & Minet, P. (2007). A comparative study of energy efficient routing trategies based on OLSR. In Proceedings of the 22nd international conference on advanced information networking and applications (pp. 1253–1259).

  20. Mans, B., & Shrestha, N. (2004). Performance evaluation of approximation algorithms for multipoint relay selection. In Proceedings of the 3rd IFIP annual Mediterranean ad-hoc network workshop (pp. 480–491).

  21. Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of ACM symposium on applied computing (pp. 103–106).

  22. Michiardi, I., & Molva, R. (2002). CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proceedings of IFIP CMS02, communication and multimedia security conference, September 2002.

  23. Mohammed, N., Otrok, H., Wang, L., Debbabi, M., & Bhattacharya, P. (2011). Mechanism design-based secure leader election model for intrusion detection in MANET. IEEE Transactions on Dependable and Secure Computing, 8, 89–103.

    Article  Google Scholar 

  24. Otrok, H., Debbabi, M., Assi, C., & Bhattacharya, P. (2007). A cooperative approach for analyzing intrusions in mobile ad hoc networks. In Proceedings of 27th international conference on distributed computing systems workshops.

  25. Otrok, H., Mourad, A., Robert, J. M., Moati, N., & Sanadiki, H. (2010). A cluster-based model for QoS-OLSR protocol. In Proceedings of IEEE wireless communications & networking conference (WCNC) (pp. 1–6).

  26. Rango, F. D., Fotino, M., & Marano, S. (2008). EE-OLSR: Energy efficient OLSR routing protocol for mobile ad hoc networks. In Proceedings of the military communications conference (MILCOM) (pp. 1–7).

  27. Robert, J. M., Otrok, H., & Chriqi, A. (2012). RBC-OLSR: Reputation-based clustering OLSR protocol for wireless ad hoc networks. Journal Computer, Communication, 35, 488–499.

    Article  Google Scholar 

  28. Ros, F. J., & Ruiz, P. M. (2007). Cluster-based OLSR extensions to reduce control overhead in mobile ad hoc networks. In Proceedings of the 2007 international conference on wireless communications and mobile computing (IWCMC) (pp. 202–207).

  29. Roth, A. E. (1988). The shapley value: Essays in the honor of Lloyd S.Shapley. Cambridge: Cambridge University Press.

    Book  Google Scholar 

  30. Villasenor-Gonzalez, L., Ge, G. Y., & Lament, L. (2005). HOLSR: A hierarchical proactive routing mechanism for mobile ad hoc networks. IEEE Communications Magazine, 43, 118–125.

    Article  Google Scholar 

  31. Vuppala, S., Bandyopadhyay, A., Choudhury, P., & De, T. (2010). A simulation analysis of node selfishness in MANET using NS-3. International Journal of Recent Trends in Engineering and Technology, 1, 103–106.

    Google Scholar 

  32. Wang, F., Mo, Y., & Huang, B. (2006). COSR: Cooperative on demand secure route protocol in MANET. In Proceedings of IEEE ISCIT (pp. 890–893), China.

  33. Zhong, S., Chen, J., Yang, Y. (2003). Sprite: A simple, cheat-proof, creditbased system for mobile ad-hoc networks. In Proceedings of IEEE INFOCOM (vol. 3, pp. 1987–1997), San Francisco, CA, USA.

Download references

Acknowledgments

This work is supported by the Lebanese American University(LAU), CNRS (Lebanon), Khalifa University of Science, Technology & Research, and NSERC (Canada).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Azzam Mourad.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Moati, N., Otrok, H., Mourad, A. et al. Reputation-Based Cooperative Detection Model of Selfish Nodes in Cluster-Based QoS-OLSR Protocol. Wireless Pers Commun 75, 1747–1768 (2014). https://doi.org/10.1007/s11277-013-1419-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-013-1419-y

Keywords

Navigation