Open Access   Article Go Back

A Collaborative Contact-Based Watchdog CoCoWa for Detecting Selfish Nodes with Trust Model

G.Satyavathy 1 , P. Anitha2

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-9 , Page no. 120-123, Sep-2015

Online published on Oct 01, 2015

Copyright © G.Satyavathy , P. Anitha . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: G.Satyavathy , P. Anitha, “A Collaborative Contact-Based Watchdog CoCoWa for Detecting Selfish Nodes with Trust Model,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.120-123, 2015.

MLA Style Citation: G.Satyavathy , P. Anitha "A Collaborative Contact-Based Watchdog CoCoWa for Detecting Selfish Nodes with Trust Model." International Journal of Computer Sciences and Engineering 3.9 (2015): 120-123.

APA Style Citation: G.Satyavathy , P. Anitha, (2015). A Collaborative Contact-Based Watchdog CoCoWa for Detecting Selfish Nodes with Trust Model. International Journal of Computer Sciences and Engineering, 3(9), 120-123.

BibTex Style Citation:
@article{Anitha_2015,
author = {G.Satyavathy , P. Anitha},
title = {A Collaborative Contact-Based Watchdog CoCoWa for Detecting Selfish Nodes with Trust Model},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2015},
volume = {3},
Issue = {9},
month = {9},
year = {2015},
issn = {2347-2693},
pages = {120-123},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=653},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=653
TI - A Collaborative Contact-Based Watchdog CoCoWa for Detecting Selfish Nodes with Trust Model
T2 - International Journal of Computer Sciences and Engineering
AU - G.Satyavathy , P. Anitha
PY - 2015
DA - 2015/10/01
PB - IJCSE, Indore, INDIA
SP - 120-123
IS - 9
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2391 2362 downloads 2407 downloads
  
  
           

Abstract

Mobile ad-hoc networks (MANETs) assume that mobile nodes volunteer collaborates in order to work appropriately. This Cooperation is a cost-intensive activity and some nodes can refuse to cooperate, leading to selfish node behaviour. Thus, the complete network performance could be seriously affected. The use of watchdogs is a well-known mechanism to detect selfish nodes. However, the detection process performed by watchdogs can fail, generating false positives and false negatives that can induce to wrong operations. Moreover, relying on local watchdogs alone can lead to poor performance when detecting selfish nodes, in term of precision and speed. This is especially important on networks with sporadic contacts, such as Delay Tolerant Networks (DTNs), where sometimes watchdog’s lack of enough time or information to detect the selfish nodes. Thus, Collaborative Contact-based Watchdog (CoCoWa) is proposed as a collaborative approach based on the diffusion of local selfish nodes awareness when a contact occurs, so that information about selfish nodes is quickly propagated. As shown in the paper, this collaborative approach will make the selfish node as trusted node by using AODV protocol and provide better security.

Key-Words / Index Term

CoCoWa Architecture, Watchdog, Delay Tolerant Networks, Trust model, Security,Routing Protocol, AODV

References

[1] Morigere Subramanya Bhat, Shwetha .D, Manjunath .D and DevarajuJ.T.”Scenario Based Study of on denmand Reactive Routing Protocol for IEEE-802.11 and 802.15.4 Standards” ISSN: 2249-57 Vol 1(2), 128-135 published in October-November 2011.
[2] Ashish Bagwari,Raman Jee,Pankaj Joshi,Sourabh Bisht “Performance of AODV Routing Protocol with increasing the MANET Nodes and its effects on QoS of Mobile Ad hoc Networks” International Conference on Communication Systems and Network Technologies 2012.
[3] Xu Huang, Muhammad Ahmed and Dharmendra Sharma”Protecting from Inside Attacks in Wireless Sensor Networks” Ninth IEEE International Conference on Dependable, Autonomic and Secure Computing 2011.
[4]. Mishra and K. M. Nadkarni, “Security in wireless ad hoc networks – A Survey”, in TheHandbook of Ad Hoc Wireless Networks, M.Ilyas, Ed. Boca Raton: CRC Press, 2002, pp.30.1-30.51.
[5]. P. Papadimitratos and Z. Hass, “Securing Mobile Ad Hoc Networks”, in The Handbook of Ad Hoc Wireless Networks, M. Ilyas, Ed. Boca Raton: CRC Press, 2002, pp. 31.1-31.17
[6] S. Marti, T. Giuli, K. Lai, and M. Baker, ―Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Proc. MobiCom, Aug. 2000.
[7] J.-S. Lee, “A Petri net design of command filters for semiautonomous mobile sensor networks,” IEEE Trans. Ind. Electron., vol. 55, no. 4, pp.1835–1841, Apr. 2008.
[8] J. Parker, J. Undercoffer, J. Pinkston, and A. Joshi, “On intrusion detection and response for mobile ad hoc networks,” in Proc. IEEE Int. Conf.Perform., Computer, Commun, pp. 747–752, 2004.
[9] A. Patcha and A. Mishra, “Collaborative security architecture for black hole attack prevention in mobile ad hoc networks,” in Proc. Radio Wireless Conf, pp. 75–78, 2003.
[10] Sergio Marti, T. J. Giuli, Kevin Lai, and Mary Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Mo-biCom '00: Proceedings of the 6th annual international conference on Mobile computing and networking, pages 255_265, New York, NY, USA, 2000. ACM.
[11] F. Kargl, A. Klenk, M. Weber, and S. Schlott, “Sensors for detection of misbehaving nodes in MANETs,” in Proc. Detection Intrusions Malware Vulnerability Assessment, pp. 83–97, 2004.

[12] Q. Li, S. Zhu, and G. Cao, “Routing in socially selfish delay tolerant networks,” in Proc. IEEE Conf. Comput. Commun, pp. 857–865, 2010.
[13] Y. Li, G. Su, D. Wu, D. Jin, L. Su, and L. Zeng, “The impact of node selfishness on multicasting in delay tolerant networks,” IEEE Trans. Veh. Technol., vol. 60, no. 5, pp. 2224–2238, Jun. 2011.
[14] M. Mahmoud and X. Shen, “ESIP: Secure incentive protocol with limited use of public-key cryptography for multihop wireless networks,” IEEE Trans. Mobile Comput., vol. 10, no. 7, pp. 997–1010, Jul. 2011.