Abstract
The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node may exhibit is selfishness. A selfish node wants to preserve own resources while using the services of others and consuming their resources. One way of preventing selfishness in a MANET is a detection and exclusion mechanism. In this paper, we focus on the detection phase and present different kinds of sensors that can be used to find selfish nodes. First we present simulation results that show the negative effects which selfish nodes cause in MANET. In the related work section we will analyze some of the detection mechanisms proposed in literature so far. Our new detection mechanisms described next are called activity-based overhearing, iterative probing, and unambiguous probing. Simulation-based analysis of these mechanisms show that they are highly effective and can reliably detect a multitude of selfish behaviors.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Johnson, D.B., Maltz, D.A., Hu, Y.-C., Jetcheva, J.G.: The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR) (April 2003), http://www.ietf.org/internet-drafts/draft-ietf-manet-dsr-09.txt
Perkins, C.E. (ed.): Ad Hoc Networking. Addison-Wesley, Reading (2001)
Schneier, B.: Modeling security threats. Dr Dobb’s Journal (December 1999), also available as: http://www.ddj.com/documents/s=896/ddj9912a/9912a.htm
Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: A secure On-Demand Routing Protocol for Ad hoc Networks. In: Proceedings of MobiCom 2002, Atlanta, Georgia, USA (September 2002)
Papadimitratos, P., Haas, Z.J.: Secure Routing for Mobile Ad hoc Networks. In: SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San Antonio, TX (January 2002), also available as: http://wnl.ece.cornell.edu/Publications/cnds02.pdf
Papadimitratos, P., Haas, Z.J.: Secure Routing for Mobile Ad Hoc Networks. Working Session on Security in Wireless Ad Hoc Networks, EPFL, published in Mobile Computing and Communications Review 6(4) (June 2002)
Papadimitratos, P., Haas, Z.J.: Securing Mobile Ad Hoc Networks. In: Ilyas, M. (ed.) Handbook of Ad Hoc Wireless Networks. CRC Press, Boca Raton (2002)
Papadimitratos, P., Haas, Z.J., Samar, P.: The Secure Routing Protocol (SRP) for Ad Hoc Networks (December 2002), draft-papadimitratos-secure-routing-protocol-00.txt
Papadimitratos, P., Haas, Z.J.: Secure Link State Routing for Mobile Ad Hoc Networks. In: IEEE Workshop on Security and Assurance in Ad hoc Networks, in conjunction with the 2003 International Symposium on Applications and the Internet, Orlando, FL (January 2003)
Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: A Secure Routing Protocol for Ad Hoc Networks. In: Proceedings of 2002 IEEE International Conference on Network Protocols (ICNP) (November 2002), also available as: http://signl.cs.umass.edu/pubs/aran.icnp02.ps
Zapata, M.G.: Secure Ad hoc On-Demand Distance Vector Routing. ACM Mobile Computing and Communications Review (MC2R) 6(3), 106–107 (2002), also available as: http://doi.acm.org/10.1145/581291.581312
Zapata, M.G., Asokan, N.: Securing Ad hoc Routing Protocols. In: Proceedings of the 2002 ACM Workshop on Wireless Security (WiSe 2002), September 2002, pp. 1–10 (2002), also available as: http://doi.acm.org/10.1145/570681.570682
Broch, J., Maltz, D.A., Johnson, D.B., Hu, Y.-C., Jetcheva, J.: A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. In: Mobile Computing and Networking, pp. 85–97 (1998), also available as: http://citeseer.nj.nec.com/broch98performance.html
Buttyán, L., Hubaux, J.-P.: Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks. Technical Report DSC/2001/001, EPFL-DI-ICA (January 2001)
Buttyán, L., Hubaux, J.-P.: Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks. ACM/Kluwer Mobile Networks and Applications 8(5) (October 2003)
Anderson, R., Kuhn, M.: Tamper Resistance - a Cautionary Note. In: Proceedings of the Second Usenix Workshop on Electronic Commerce, November 1996, pp. 1–11 (1996), also available as: http://citeseer.nj.nec.com/article/anderson96tamper.html
Anderson, R., Kuhn, M.: Low cost attacks on tamper resistant devices. In: IWSP: International Workshop on Security Protocols. LNCS (1997), also available as: http://citeseer.nj.nec.com/anderson97low.html
Zhong, S., Chen, J., Yang, Y.R.: Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: Proceedings of IEEE Infocom 2003, San Francisco, CA (April 2003)
Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Mobile Computing and Networking, pp. 255–265 (2000), also available as: http://citeseer.nj.nec.com/marti00mitigating.html
Zhang, Y., Lee, W.: Intrusion detection in wireless ad-hoc networks. In: Mobile Computing and Networking, pp. 275–283 (2000), also available as: http://citeseer.nj.nec.com/zhang00intrusion.html
Zhang, Y., Lee, W., Huang, Y.-A.: Intrusion Detection Techniques for Mobile Wireless Networks. ACM Wireless Networks (WINET), 9 (to appear, 2003), also available as: http://www.wins.hrl.com/people/ygz/papers/winet03.pdf
Michiardi, P., Molva, R.: Prevention of Denial of Service attacks and Selfishness in Mobile Ad Hoc Networks, http://www.eurecom.fr/~michiard/pub/michiardi_adhoc_dos.ps
Michiardi, P., Molva, R.: A Collaborative Reputation mechanism to enforce node cooperation in Mobile Ad Hoc Networks. In: Proceedings of the 6th IFIP Communication and Multimedia Security Conference, Portorosz, Slovenia (September 2002)
Buchegger, S., Le Boudec, J.-Y.: Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks. In: Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-based Processing, Canary Islands, Spain, January 2002, pp. 403–410. IEEE Computer Society, Los Alamitos (2002), http://citeseer.nj.nec.com/article/buchegger02nodes.html
Buchegger, S., Le Boudec, J.-Y.: Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes - Fairness in Distributed Ad-hoc Networks. In: Proceedings of IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), Lausanne, CH (June 2002)
Kargl, F.: Sicherheit in Mobilen Ad hoc Netzwerken. PhD thesis, University of Ulm, Ulm, Germany (2003), also available as: http://medien.informatik.uni-ulm.de/frank/research/dissertation.pdf
Awerbuch, B., Holmer, D., Nita-Rotaru, C., Rubens, H.: An On-Demand Secure Routing Protocol Resilient to Byzantine Failures. In: ACM Workshop on Wireless Security (WiSe), Atlanta, Georgia (September 2002), also available as: http://citeseer.nj.nec.com/article/awerbuch02demand.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kargl, F., Klenk, A., Schlott, S., Weber, M. (2005). Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds) Security in Ad-hoc and Sensor Networks. ESAS 2004. Lecture Notes in Computer Science, vol 3313. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30496-8_13
Download citation
DOI: https://doi.org/10.1007/978-3-540-30496-8_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24396-0
Online ISBN: 978-3-540-30496-8
eBook Packages: Computer ScienceComputer Science (R0)