A Collaborative Bayesian Watchdog for Detecting Black Holes in MANETs
Watchdogs are a well-known mechanism to detect threats and attacks from misbehaved and selfish nodes in computer networks. In infrastructureless networks, such as MANETs, attack detection and reaction is a key issue to the whole network. Watchdog systems overhear traffic and perform analysis using data collected to decide the grade of misbehaviour that their neighbour nodes present, so accuracy and detection speed play a key role in achieving the right level of network security and performance. The problem behind the use of watchdogs is that they can cause a relatively high level of false positives and false negatives, so increasing their accuracy is also basic to successfully implement this technology in real MANET environments. This paper proposes a collaborative approach for detecting black holes and selfish nodes in MANETs, using a set of watchdogs which collaborate to enhance their individual and collective performance. The paper shows that using this collaborative watchdog approach the detection time of misbehaved nodes is reduced and the overall accuracy increased.
Unable to display preview. Download preview PDF.
- 1.Buchegger, S., Le Boudec, J.Y.: Self-policing mobile ad hoc networks by reputation systems. IEEE Communications Magazine (2005)Google Scholar
- 2.Buttyan, L., Hubaux, J.P.: Enforcing service availability in mobile ad-hoc wans. In: IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing, MobiHOC (2000)Google Scholar
- 3.Buttyan, L., Hubaux, J.P.: Stimulating cooperation in self-organizing mobile ad hoc networks. Mobile Networks and Applications 8(5) (2003)Google Scholar
- 4.Hortelano, J., Calafate, C.T., Cano, J.C., de Leoni, M., Manzoni, P., Mecella, M.: Black-hole attacks in p2p mobile networks discovered through bayesian filters. In: Proceedings of OTM Workshops 2010, pp. 543–552 (2010)Google Scholar
- 5.Hortelano, J., Cano, J.C., Calafate, C.T., Manzoni, P.: Watchdog intrusion detection systems: Are they feasible in manets? In: XXI Jornadas de Paralelismo, CEDI 2010 (2010)Google Scholar
- 6.Kargl, F., Klenk, A., Schlott, S., Weber, M.: Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, vol. 3313, pp. 152–165. Springer, Heidelberg (2005)Google Scholar
- 7.Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the Sixth International Conference on Mobile Computing and Networking, MobiCom 2000 (2000)Google Scholar
- 8.Sundarajan, T., Shammugam, A.: Modeling the behavior of selfish forwarding nodes to stimulate cooperation in manet. International Journal of Network Security and its Applications (IJNSA) 2(2) (2010)Google Scholar
- 9.Toh, C.K., Kim, D., Oh, S., Yoo, H.: The controversy of selfish nodes in ad hoc networks. In: Proc. of the 12th Int. Conf. on Advanced communication technology, ICACT 2010 (2010)Google Scholar
- 10.Xu, L., Lon, Z., Ye, A.: Analysis and countermeasures of selfish node problem in mobile ad hoc network. In: Proceedings of the Tenth International Conference on Computer Supported Cooperative Work in Design, CSCWD 2006 (2006)Google Scholar
- 11.Zhong, S., Chen, J., Yang, Y.: Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: Proceedings of the Twenty-second Annual Joint Conference of the IEEE Computer And Communications Societies, INFOCOM 2003 (2003)Google Scholar