Abstract
Selfish node behavior can diminish the reliability of a mobile ad hoc network (MANET) or a wireless sensor network (WSN). Efficient detection of such behavior is therefore essential. One approach is to construct a reputation scheme, which has network nodes determine and share reputation values associated with each node; these values can next be used as input to a routing algorithm to avoid end-to-end routes containing ill-reputed nodes. The main problem lies in handling possibly conflicting evidence of a particular node’s behavior so as to enable rapid detection of all selfish nodes. To this end, we explore the Dempster-Shafer Theory of Evidence (DST) as part of a novel framework called DST-SDF and discuss some of its advantages and disadvantages. It differs from existing reputation schemes in that the well-known but faulty watchdog mechanism is dispensed with, and end-to-end acknowledgments are used instead. Sample simulation results illustrate the merits of DST-SDF under two proposed working modes related to the applied rule of evidence combination.
Chapter PDF
References
Shafer, G.: A Mathematical Theory of Evidence. Princeton University Press, Princeton (1976)
Zadeh, L.A.: A Simple View of the Dempster-Shafer Theory of Evidence and its Implication for the Rule of Combination. The AI Magazine 7, 85–90 (1986)
Yager, R.R., Kacprzyk, J., Fedrizzi, M.: Advances in the Dempster-Shafer Theory of Evidence, New York. John Wiley & Sons, Inc., Chichester (1994)
Sentz, K., Ferson, S.: Combination of Evidence in Dempster-Shafer Theory. SAND2002-0835 Technical Report. Sandia National Laboratories, New Mexico (2002)
Martini, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th annual international conference on Mobile computing and networking, pp. 255–265 (2000)
Buttyan, L., Hubaux, J.P.: Nuglets – A Virtual Currency to Stimulate Cooperation in Self Organized Mobile Ad Hoc Networks, Technical Report DSC/2001, EPFL, Lausanne (2001)
Zhong, S., Chen, J., Yang, R.: Sprite: A Simple, Cheatproof Credit-Based System for Mobile Ad hoc Networks, In: Proceedings IEEE Infocom, San Francisco CA (2003)
Buchegger, S., Le Boundec, J.Y.: Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes – Fairness In Distributed Ad-hoc NeTworks. In: Proceedings of IEEE/ACM MobiHOC, Lausanne, Switzerland, pp. 226–236 (2002)
Michiardi, P., Molva, R.: CORE: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks. In: Proceedings IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security, Portoroz, Slovenia, pp. 107–121 (2002)
He, Q., Wu, D., Khosla, P.: SORI: A Secure and Objective Reputation-Based Incentive Scheme for Ad Hoc Networks. In: Proceedings IEEE Wireless Communication and Networking Conference, Pittsburgh, PA, USA, pp. 825–830 (2004)
Bansal, S., Baker, M.: Observation-Based Cooperation Enforcement in Ad Hoc Networks, Technical Report Arxiv preprint cs. NI/0307012 (2003)
Refaei, T.M., Srivastava, V., Dasilva, L., Eltoweissy, M.: A Reputation-based Mechanism for Isolating Selfish Nodes in Ad Hoc Networks. In: Proceedings of the Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, San Diego, CA, USA, pp. 3–11 (2005)
Hu, J., Burmeister, M.: LARS: A Locally Aware Reputation System for Mobile Ad Hoc Networks. In: Proceedings of the 44th annual Southeast Regional Conference, Melbourne, Florida, pp. 119–123 (2006)
Fie, W., Yijun, M., Benxiong, H.: COSR: Cooperative On-Demand Source Route Protocol in MANET. In: Proceedings of the International Symposium on Communication and Information Technologies, Bangkok, Thailand, pp. 890–893 (2006)
Bin, Y., Munindar, P.S.: Detecting Deception in Reputation Management. In: Proceedings of the second international joint conference on Autonomous agents and multiagent systems, Melbourne, pp. 73–80 (2003)
Dong, Y., Deborah, F.: Alert Confidence Fusion in Intrusion Detection Systems with Extended Dempster-Shafer Theory. In: Proceedings of the 43rd ACM Southeast Conference, Kennesaw, GA, USA (2005)
Johnson, D.B., Maltz, D.A.: Hu Yih-Chun: The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks, DSR (2004), http://www.ietf.org/internet-drafts/draft-ietf-manet-dsr-10.txt
Konorski, J., Orlikowski, R.: Distributed Reputation System for Multihop Mobile Ad Hoc Networks. In: Proceedings of the 5th Polish-German Teletraffic Symposium, PGTS 2008, Berlin, Germany, pp. 161–167 (2008)
Felegyhazi, M., Hubaux, J.P., Buttyan, L.: Nash equilibria of packet forwarding strategies in wireless ad hoc networks. IEEE Transactions on Mobile Computing 5, 463–476 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 IFIP International Federation for Information Processing
About this paper
Cite this paper
Konorski, J., Orlikowski, R. (2009). DST-Based Detection of Non-cooperative Forwarding Behavior of MANET and WSN Nodes. In: Wozniak, J., Konorski, J., Katulski, R., Pach, A.R. (eds) Wireless and Mobile Networking. WMNC 2009. IFIP Advances in Information and Communication Technology, vol 308. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03841-9_17
Download citation
DOI: https://doi.org/10.1007/978-3-642-03841-9_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-03840-2
Online ISBN: 978-3-642-03841-9
eBook Packages: Computer ScienceComputer Science (R0)