- -

A Fast Model for Evaluating the Detection of Selfish Nodes Using a Collaborative Approach in MANETs

RiuNet: Institutional repository of the Polithecnic University of Valencia

Share/Send to

Cited by

Statistics

A Fast Model for Evaluating the Detection of Selfish Nodes Using a Collaborative Approach in MANETs

Show simple item record

Files in this item

dc.contributor.author Hernández Orallo, Enrique es_ES
dc.contributor.author Serrat Olmos, Manuel David es_ES
dc.contributor.author Cano Escribá, Juan Carlos es_ES
dc.contributor.author Tavares de Araujo Cesariny Calafate, Carlos Miguel es_ES
dc.contributor.author Manzoni, Pietro es_ES
dc.date.accessioned 2014-12-11T10:49:00Z
dc.date.available 2014-12-11T10:49:00Z
dc.date.issued 2014-02
dc.identifier.issn 0929-6212
dc.identifier.uri http://hdl.handle.net/10251/45351
dc.description The final publication is available at Springer via http://dx.doi.org/10.1007/s11277-013-1346-y es_ES
dc.description.abstract Mobilead-hocnetworks(MANETs)relyonnetworkcooperationschemestowork properly. Nevertheless, if nodes have a selfish behaviour and are unwilling to cooperate, the overall network performance could be seriously affected. The use of watchdogs is a well- known mechanism to detect selfish nodes. In this paper we propose a collaborative watchdog approach, which is based on the fast diffusion of selfish nodes awareness. Then, we introduce an analytical model to evaluate the time of detection and the overhead (number of messages) of our collaborative watchdog approach for detecting one selfish node. This model is extended for the case of several selfish nodes, including a mean¿max approximation for a feasible computation when the number of selfish nodes is high. The results show that a collaborative watchdog is a very efficient approach since the detection time of selfish nodes is reduced, and the overall overhead is very low. es_ES
dc.description.sponsorship This work was partially supported by the Ministerio de Ciencia e Innovacion, Spain (Grant TIN2011-27543-C03-01). en_EN
dc.language Inglés es_ES
dc.publisher Springer Verlag (Germany) es_ES
dc.relation Ministerio de Ciencia e Innovacion, Spain [TIN2011-27543-C03-01] es_ES
dc.relation.ispartof Wireless Personal Communications es_ES
dc.rights Reserva de todos los derechos es_ES
dc.subject Wireless networks es_ES
dc.subject MANETs es_ES
dc.subject Performance evaluation es_ES
dc.subject Selfish nodes es_ES
dc.subject.classification ARQUITECTURA Y TECNOLOGIA DE COMPUTADORES es_ES
dc.title A Fast Model for Evaluating the Detection of Selfish Nodes Using a Collaborative Approach in MANETs es_ES
dc.type Artículo es_ES
dc.identifier.doi 10.1007/s11277-013-1346-y
dc.rights.accessRights Abierto es_ES
dc.contributor.affiliation Universitat Politècnica de València. Departamento de Informática de Sistemas y Computadores - Departament d'Informàtica de Sistemes i Computadors es_ES
dc.description.bibliographicCitation Hernández Orallo, E.; Serrat Olmos, MD.; Cano Escribá, JC.; Tavares De Araujo Cesariny Calafate, CM.; Manzoni, P. (2014). A Fast Model for Evaluating the Detection of Selfish Nodes Using a Collaborative Approach in MANETs. Wireless Personal Communications. 74(3):1099-1116. doi:10.1007/s11277-013-1346-y es_ES
dc.description.accrualMethod S es_ES
dc.relation.publisherversion http://link.springer.com/article/10.1007/s11277-013-1346-y es_ES
dc.description.upvformatpinicio 1099 es_ES
dc.description.upvformatpfin 1116 es_ES
dc.type.version info:eu-repo/semantics/publishedVersion es_ES
dc.description.volume 74 es_ES
dc.description.issue 3 es_ES
dc.relation.senia 253218
dc.relation.references Bohnenkamp, H., & Haverkort, B. (2002). The mean value of the maximum. In APM-PROBMIV, LNCS, (Vol. 2399, pp. 37–56). Springer. es_ES
dc.relation.references Buchegger, S., & Le Boudee, J. Y. (2005). Self-policing mobile ad hoc networks by reputation systems. Communications Magazine, IEEE, 43(7), 101–107. es_ES
dc.relation.references Gao, W., Li, Q., Zhao, B., & Cao, G. (2009). Multicasting in delay tolerant networks: A social network perspective. In Proceedings of MobiHoc ’09, (pp. 299–308). es_ES
dc.relation.references Groenevelt, R., Nain, P., & Koole, G. (2005). The message delay in mobile ad hoc networks. Performance Evaluation, 62, 210–228. es_ES
dc.relation.references Hollick, M., Schmitt, J., Seipl, C., & Steinmetz, R. (2004). On the effect of node misbehavior in ad hoc networks. In Proceedings of IEEE international conference on communications, ICC’04 (pp. 3759–3763). IEEE. es_ES
dc.relation.references Hortelano, J., Cano, J. C., Calafate, C. T., de Leoni, M., Manzoni, P., & Mecella, M. (2010). Black hole attacks in p2p mobile networks discovered through bayesian filters. In P2P collaborative distributed virtual environments (P2P CDVE 2010). es_ES
dc.relation.references Hortelano, J., Ruiz, J. C., & Manzoni, P. (2010). Evaluating the uselfusness of watchdogs for intrusion detection in vanets. In ICC’10 workshop on vehicular networking and applications. es_ES
dc.relation.references Hui, P., Crowcroft, J., & Yoneki, E. (2008). Bubble rap: Social-based forwarding in delay tolerant networks. In Proceedings of MobiHoc ’08 (pp. 241–250). ACM. es_ES
dc.relation.references Karagiannis, T., Le Boudec, J. Y., & Vojnović, M. (2007). Power law and exponential decay of inter contact times between mobile devices. In Proceedings of MobiCom ’07 (pp. 183–194). es_ES
dc.relation.references Karaliopoulos, M. (2009). Assessing the vulnerability of DTN data relaying schemes to node selfishness. Communications Letters, IEEE, 13(12), 923–925. es_ES
dc.relation.references Kargl, F., Klenk, A., Schlott, S., & Weber, M. (2004). Advanced detection of selfish or malicious nodes in ad hoc networks. In Proceedings of the 1st European on security in ad-hoc and sensor networks (ESAS 2004) (pp. 152–165). Springer. es_ES
dc.relation.references Li, Q., Zhu, S., & Cao, G. (2010). Routing in socially selfish delay tolerant networks. In Proceedings of INFOCOM’10 (pp. 857–865). IEEE Press, Piscataway, NJ, USA. es_ES
dc.relation.references Li, Y., Su, G., Wu, D., Jin, D., Su, L., & Zeng, L. (2011). The impact of node selfishness on multicasting in delay tolerant networks. Vehicular Technology, IEEE Transactions on, 60(5), 2224–2238. es_ES
dc.relation.references Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of MobiCom ’00 (pp. 255–265). es_ES
dc.relation.references Palazzo, S., Campbell, A. T., & Dias de Amorim, M. (February, 2011). Opportunistic and delay-tolerant networks. EURASIP Journal on Wireless Communications and Networking, 2011, 2 pp. doi: 10.1155/2011/164370 . es_ES
dc.relation.references Paul, K., & Westhoff, D. (2002). Context aware detection of selfish nodes in dsr based ad-hoc networks. In Proceedings of IEEE Globecom. es_ES
dc.relation.references Toh, C., Kim, D., Oh, S., & Yoo, H. (2010). The controversy of selfish nodes in ad hoc networks. In Proceedings of IEEE international conference on advanced communication technology (IEEE ICACT Conference) (Vol. 2, pp. 1087–1092). es_ES
dc.relation.references Zhu, H., Fu, L., Xue, G., Zhu, Y., Li, M., & Ni, L. M. (2010). Recognizing exponential inter-contact time in vanets. In Proceedings of INFOCOM’10 (pp. 101–105). IEEE Press. es_ES


This item appears in the following Collection(s)

Show simple item record