Skip to main content

Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks

  • Conference paper
Book cover Security in Ad-hoc and Sensor Networks (ESAS 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3313))

Included in the following conference series:

Abstract

The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node may exhibit is selfishness. A selfish node wants to preserve own resources while using the services of others and consuming their resources. One way of preventing selfishness in a MANET is a detection and exclusion mechanism. In this paper, we focus on the detection phase and present different kinds of sensors that can be used to find selfish nodes. First we present simulation results that show the negative effects which selfish nodes cause in MANET. In the related work section we will analyze some of the detection mechanisms proposed in literature so far. Our new detection mechanisms described next are called activity-based overhearing, iterative probing, and unambiguous probing. Simulation-based analysis of these mechanisms show that they are highly effective and can reliably detect a multitude of selfish behaviors.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Johnson, D.B., Maltz, D.A., Hu, Y.-C., Jetcheva, J.G.: The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR) (April 2003), http://www.ietf.org/internet-drafts/draft-ietf-manet-dsr-09.txt

  2. Perkins, C.E. (ed.): Ad Hoc Networking. Addison-Wesley, Reading (2001)

    Google Scholar 

  3. Schneier, B.: Modeling security threats. Dr Dobb’s Journal (December 1999), also available as: http://www.ddj.com/documents/s=896/ddj9912a/9912a.htm

  4. Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: A secure On-Demand Routing Protocol for Ad hoc Networks. In: Proceedings of MobiCom 2002, Atlanta, Georgia, USA (September 2002)

    Google Scholar 

  5. Papadimitratos, P., Haas, Z.J.: Secure Routing for Mobile Ad hoc Networks. In: SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San Antonio, TX (January 2002), also available as: http://wnl.ece.cornell.edu/Publications/cnds02.pdf

  6. Papadimitratos, P., Haas, Z.J.: Secure Routing for Mobile Ad Hoc Networks. Working Session on Security in Wireless Ad Hoc Networks, EPFL, published in Mobile Computing and Communications Review 6(4) (June 2002)

    Google Scholar 

  7. Papadimitratos, P., Haas, Z.J.: Securing Mobile Ad Hoc Networks. In: Ilyas, M. (ed.) Handbook of Ad Hoc Wireless Networks. CRC Press, Boca Raton (2002)

    Google Scholar 

  8. Papadimitratos, P., Haas, Z.J., Samar, P.: The Secure Routing Protocol (SRP) for Ad Hoc Networks (December 2002), draft-papadimitratos-secure-routing-protocol-00.txt

    Google Scholar 

  9. Papadimitratos, P., Haas, Z.J.: Secure Link State Routing for Mobile Ad Hoc Networks. In: IEEE Workshop on Security and Assurance in Ad hoc Networks, in conjunction with the 2003 International Symposium on Applications and the Internet, Orlando, FL (January 2003)

    Google Scholar 

  10. Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: A Secure Routing Protocol for Ad Hoc Networks. In: Proceedings of 2002 IEEE International Conference on Network Protocols (ICNP) (November 2002), also available as: http://signl.cs.umass.edu/pubs/aran.icnp02.ps

  11. Zapata, M.G.: Secure Ad hoc On-Demand Distance Vector Routing. ACM Mobile Computing and Communications Review (MC2R) 6(3), 106–107 (2002), also available as: http://doi.acm.org/10.1145/581291.581312

    Article  Google Scholar 

  12. Zapata, M.G., Asokan, N.: Securing Ad hoc Routing Protocols. In: Proceedings of the 2002 ACM Workshop on Wireless Security (WiSe 2002), September 2002, pp. 1–10 (2002), also available as: http://doi.acm.org/10.1145/570681.570682

  13. Broch, J., Maltz, D.A., Johnson, D.B., Hu, Y.-C., Jetcheva, J.: A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. In: Mobile Computing and Networking, pp. 85–97 (1998), also available as: http://citeseer.nj.nec.com/broch98performance.html

  14. Buttyán, L., Hubaux, J.-P.: Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks. Technical Report DSC/2001/001, EPFL-DI-ICA (January 2001)

    Google Scholar 

  15. Buttyán, L., Hubaux, J.-P.: Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks. ACM/Kluwer Mobile Networks and Applications 8(5) (October 2003)

    Google Scholar 

  16. Anderson, R., Kuhn, M.: Tamper Resistance - a Cautionary Note. In: Proceedings of the Second Usenix Workshop on Electronic Commerce, November 1996, pp. 1–11 (1996), also available as: http://citeseer.nj.nec.com/article/anderson96tamper.html

  17. Anderson, R., Kuhn, M.: Low cost attacks on tamper resistant devices. In: IWSP: International Workshop on Security Protocols. LNCS (1997), also available as: http://citeseer.nj.nec.com/anderson97low.html

  18. Zhong, S., Chen, J., Yang, Y.R.: Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: Proceedings of IEEE Infocom 2003, San Francisco, CA (April 2003)

    Google Scholar 

  19. Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Mobile Computing and Networking, pp. 255–265 (2000), also available as: http://citeseer.nj.nec.com/marti00mitigating.html

  20. Zhang, Y., Lee, W.: Intrusion detection in wireless ad-hoc networks. In: Mobile Computing and Networking, pp. 275–283 (2000), also available as: http://citeseer.nj.nec.com/zhang00intrusion.html

  21. Zhang, Y., Lee, W., Huang, Y.-A.: Intrusion Detection Techniques for Mobile Wireless Networks. ACM Wireless Networks (WINET), 9 (to appear, 2003), also available as: http://www.wins.hrl.com/people/ygz/papers/winet03.pdf

  22. Michiardi, P., Molva, R.: Prevention of Denial of Service attacks and Selfishness in Mobile Ad Hoc Networks, http://www.eurecom.fr/~michiard/pub/michiardi_adhoc_dos.ps

  23. Michiardi, P., Molva, R.: A Collaborative Reputation mechanism to enforce node cooperation in Mobile Ad Hoc Networks. In: Proceedings of the 6th IFIP Communication and Multimedia Security Conference, Portorosz, Slovenia (September 2002)

    Google Scholar 

  24. Buchegger, S., Le Boudec, J.-Y.: Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks. In: Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-based Processing, Canary Islands, Spain, January 2002, pp. 403–410. IEEE Computer Society, Los Alamitos (2002), http://citeseer.nj.nec.com/article/buchegger02nodes.html

    Chapter  Google Scholar 

  25. Buchegger, S., Le Boudec, J.-Y.: Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes - Fairness in Distributed Ad-hoc Networks. In: Proceedings of IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), Lausanne, CH (June 2002)

    Google Scholar 

  26. Kargl, F.: Sicherheit in Mobilen Ad hoc Netzwerken. PhD thesis, University of Ulm, Ulm, Germany (2003), also available as: http://medien.informatik.uni-ulm.de/frank/research/dissertation.pdf

  27. Awerbuch, B., Holmer, D., Nita-Rotaru, C., Rubens, H.: An On-Demand Secure Routing Protocol Resilient to Byzantine Failures. In: ACM Workshop on Wireless Security (WiSe), Atlanta, Georgia (September 2002), also available as: http://citeseer.nj.nec.com/article/awerbuch02demand.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kargl, F., Klenk, A., Schlott, S., Weber, M. (2005). Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds) Security in Ad-hoc and Sensor Networks. ESAS 2004. Lecture Notes in Computer Science, vol 3313. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30496-8_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30496-8_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24396-0

  • Online ISBN: 978-3-540-30496-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics