Mostrar el registro sencillo del ítem
dc.contributor.author | Serrat Olmos, Manuel David![]() |
es_ES |
dc.contributor.author | Hernández Orallo, Enrique![]() |
es_ES |
dc.contributor.author | Cano Escribá, Juan Carlos![]() |
es_ES |
dc.contributor.author | Tavares de Araujo Cesariny Calafate, Carlos Miguel![]() |
es_ES |
dc.contributor.author | Manzoni, Pietro![]() |
es_ES |
dc.date.accessioned | 2014-06-06T10:36:44Z | |
dc.date.issued | 2013 | |
dc.identifier.issn | 1063-293X | |
dc.identifier.uri | http://hdl.handle.net/10251/37968 | |
dc.description.abstract | Mobile ad hoc networks are infrastructure-less wireless networks that rely on node cooperation to properly work. In this kind of networks, attack detection and reaction is a key issue to the whole network. The most common threat in mobile ad hoc network scenarios consists in the presence of a certain percentage of selfish nodes, which try to reduce the consumption of their own resources to prolong their battery lifetime. Those nodes do not collaborate on forwarding activities, therefore affecting the overall network performance. Watchdogs are well-known mechanisms to detect threats and attacks from misbehaved and selfish nodes in computer networks. The problem behind the use of watchdogs is that while they can be quite effective in detecting selfishness by using their traffic overhearing behaviour, they can also cause a relatively high level of false negatives, thereby reducing their accuracy. This article proposes a collaborative approach for detecting selfish nodes in mobile ad hoc networks. It is based on using a set of collaborative watchdogs, which collaborate to enhance their individual and collective performance. By using both an analytical study and simulation, we demonstrate that our approach is able to improve accuracy and detection speed, while reducing the impact of false-negative events | es_ES |
dc.description.sponsorship | This work was partially supported by the Ministerio de Ciencia e Innovacion, Spain, under grant TIN2011-27543-C03-01. | en_EN |
dc.language | Inglés | es_ES |
dc.publisher | SAGE Publications (UK and US) | es_ES |
dc.relation.ispartof | Concurrent Engineering: Research and Applications | es_ES |
dc.rights | Reserva de todos los derechos | es_ES |
dc.subject | Wireless networks | es_ES |
dc.subject | Mobile ad hoc networks | es_ES |
dc.subject | Cooperative networks | es_ES |
dc.subject | Selfishness | es_ES |
dc.subject | Black hole nodes | es_ES |
dc.subject.classification | ARQUITECTURA Y TECNOLOGIA DE COMPUTADORES | es_ES |
dc.title | A novel approach for the fast detection of black holes in mobile ad hoc networks | es_ES |
dc.type | Artículo | es_ES |
dc.embargo.lift | 10000-01-01 | |
dc.embargo.terms | forever | es_ES |
dc.identifier.doi | 10.1177/1063293X13493448 | |
dc.relation.projectID | info:eu-repo/grantAgreement/MICINN//TIN2011-27543-C03-01/ES/WALKIE-TALKIE: SOPORTE A ENTORNOS DE TRANSPORTE SEGURO, INTELIGENTE Y SOSTENIBLE PARA LA FUTURA GENERACION DE COCHES INTELIGENTES/ | es_ES |
dc.rights.accessRights | Abierto | es_ES |
dc.contributor.affiliation | Universitat Politècnica de València. Departamento de Informática de Sistemas y Computadores - Departament d'Informàtica de Sistemes i Computadors | es_ES |
dc.description.bibliographicCitation | Serrat Olmos, MD.; Hernández Orallo, E.; Cano Escribá, JC.; Tavares De Araujo Cesariny Calafate, CM.; Manzoni, P. (2013). A novel approach for the fast detection of black holes in mobile ad hoc networks. Concurrent Engineering: Research and Applications. 21(3):177-185. https://doi.org/10.1177/1063293X13493448 | es_ES |
dc.description.accrualMethod | S | es_ES |
dc.relation.publisherversion | http://cer.sagepub.com/content/21/3/177.full.pdf+html | es_ES |
dc.description.upvformatpinicio | 177 | es_ES |
dc.description.upvformatpfin | 185 | es_ES |
dc.type.version | info:eu-repo/semantics/publishedVersion | es_ES |
dc.description.volume | 21 | es_ES |
dc.description.issue | 3 | es_ES |
dc.relation.senia | 253252 | |
dc.contributor.funder | Ministerio de Ciencia e Innovación | es_ES |
dc.description.references | Buchegger, S., & Le Boudec, J.-Y. (2005). Self-policing mobile ad hoc networks by reputation systems. IEEE Communications Magazine, 43(7), 101-107. doi:10.1109/mcom.2005.1470831 | es_ES |
dc.description.references | Buttyán, L., & Hubaux, J.-P. (2003). Mobile Networks and Applications, 8(5), 579-592. doi:10.1023/a:1025146013151 | es_ES |
dc.description.references | Groenevelt, R., Nain, P., & Koole, G. (2005). The message delay in mobile ad hoc networks. Performance Evaluation, 62(1-4), 210-228. doi:10.1016/j.peva.2005.07.018 | es_ES |
dc.description.references | Hortelano, J., Calafate, C. T., Cano, J. C., de Leoni, M., Manzoni, P., & Mecella, M. (2010). Black-Hole Attacks in P2P Mobile Networks Discovered through Bayesian Filters. Lecture Notes in Computer Science, 543-552. doi:10.1007/978-3-642-16961-8_77 | es_ES |
dc.description.references | Li, Y., Su, G., Wu, D. O., Jin, D., Su, L., & Zeng, L. (2011). The Impact of Node Selfishness on Multicasting in Delay Tolerant Networks. IEEE Transactions on Vehicular Technology, 60(5), 2224-2238. doi:10.1109/tvt.2011.2149552 | es_ES |
dc.description.references | Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. Proceedings of the 6th annual international conference on Mobile computing and networking - MobiCom ’00. doi:10.1145/345910.345955 | es_ES |
dc.description.references | T.V.P, S., & A, S. (2010). Modeling the Behavior of Selfish Forwarding Nodes to Stimulate Cooperation in MANET. International journal of Network Security & Its Applications, 2(2), 147-160. doi:10.5121/ijnsa.2010.2212 | es_ES |
dc.description.references | Xu, L., Lin, Z., & Ye, A. (2006). Analysis and Countermeasure of Selfish Node Problem in Mobile Ad Hoc Network. 2006 10th International Conference on Computer Supported Cooperative Work in Design. doi:10.1109/cscwd.2006.253072 | es_ES |
dc.description.references | Zhong, S., Chen, J., & Yang, Y. R. (s. f.). Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks. IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428). doi:10.1109/infcom.2003.1209220 | es_ES |
dc.description.references | Zhu, H., Fu, L., Xue, G., Zhu, Y., Li, M., & Ni, L. M. (2010). Recognizing Exponential Inter-Contact Time in VANETs. 2010 Proceedings IEEE INFOCOM. doi:10.1109/infcom.2010.5462263 | es_ES |