A Collaborative Contact-Based Watchdog CoCoWa for Detecting Selfish Nodes with Trust Model
Keywords:
CoCoWa Architecture, Watchdog, Delay Tolerant Networks, Trust model, Security, Routing Protocol, AODVAbstract
Mobile ad-hoc networks (MANETs) assume that mobile nodes volunteer collaborates in order to work appropriately. This Cooperation is a cost-intensive activity and some nodes can refuse to cooperate, leading to selfish node behaviour. Thus, the complete network performance could be seriously affected. The use of watchdogs is a well-known mechanism to detect selfish nodes. However, the detection process performed by watchdogs can fail, generating false positives and false negatives that can induce to wrong operations. Moreover, relying on local watchdogs alone can lead to poor performance when detecting selfish nodes, in term of precision and speed. This is especially important on networks with sporadic contacts, such as Delay Tolerant Networks (DTNs), where sometimes watchdog’s lack of enough time or information to detect the selfish nodes. Thus, Collaborative Contact-based Watchdog (CoCoWa) is proposed as a collaborative approach based on the diffusion of local selfish nodes awareness when a contact occurs, so that information about selfish nodes is quickly propagated. As shown in the paper, this collaborative approach will make the selfish node as trusted node by using AODV protocol and provide better security.
References
Morigere Subramanya Bhat, Shwetha .D, Manjunath .D and DevarajuJ.T.”Scenario Based Study of on denmand Reactive Routing Protocol for IEEE-802.11 and 802.15.4 Standards” ISSN: 2249-57 Vol 1(2), 128-135 published in October-November 2011.
Ashish Bagwari,Raman Jee,Pankaj Joshi,Sourabh Bisht “Performance of AODV Routing Protocol with increasing the MANET Nodes and its effects on QoS of Mobile Ad hoc Networks” International Conference on Communication Systems and Network Technologies 2012.
Xu Huang, Muhammad Ahmed and Dharmendra Sharma”Protecting from Inside Attacks in Wireless Sensor Networks” Ninth IEEE International Conference on Dependable, Autonomic and Secure Computing 2011.
. Mishra and K. M. Nadkarni, “Security in wireless ad hoc networks – A Survey”, in TheHandbook of Ad Hoc Wireless Networks, M.Ilyas, Ed. Boca Raton: CRC Press, 2002, pp.30.1-30.51.
. P. Papadimitratos and Z. Hass, “Securing Mobile Ad Hoc Networks”, in The Handbook of Ad Hoc Wireless Networks, M. Ilyas, Ed. Boca Raton: CRC Press, 2002, pp. 31.1-31.17
S. Marti, T. Giuli, K. Lai, and M. Baker, ―Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Proc. MobiCom, Aug. 2000.
J.-S. Lee, “A Petri net design of command filters for semiautonomous mobile sensor networks,” IEEE Trans. Ind. Electron., vol. 55, no. 4, pp.1835–1841, Apr. 2008.
J. Parker, J. Undercoffer, J. Pinkston, and A. Joshi, “On intrusion detection and response for mobile ad hoc networks,” in Proc. IEEE Int. Conf.Perform., Computer, Commun, pp. 747–752, 2004.
A. Patcha and A. Mishra, “Collaborative security architecture for black hole attack prevention in mobile ad hoc networks,” in Proc. Radio Wireless Conf, pp. 75–78, 2003.
Sergio Marti, T. J. Giuli, Kevin Lai, and Mary Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Mo-biCom '00: Proceedings of the 6th annual international conference on Mobile computing and networking, pages 255_265, New York, NY, USA, 2000. ACM.
F. Kargl, A. Klenk, M. Weber, and S. Schlott, “Sensors for detection of misbehaving nodes in MANETs,” in Proc. Detection Intrusions Malware Vulnerability Assessment, pp. 83–97, 2004.
Q. Li, S. Zhu, and G. Cao, “Routing in socially selfish delay tolerant networks,” in Proc. IEEE Conf. Comput. Commun, pp. 857–865, 2010.
Y. Li, G. Su, D. Wu, D. Jin, L. Su, and L. Zeng, “The impact of node selfishness on multicasting in delay tolerant networks,” IEEE Trans. Veh. Technol., vol. 60, no. 5, pp. 2224–2238, Jun. 2011.
M. Mahmoud and X. Shen, “ESIP: Secure incentive protocol with limited use of public-key cryptography for multihop wireless networks,” IEEE Trans. Mobile Comput., vol. 10, no. 7, pp. 997–1010, Jul. 2011.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
