Avaliação Experimental da Eficácia de um Watchdog em Redes Oportunistas Móveis

  • Diogo Soares UFAM
  • Bruno Matthaus UFAM
  • Edjair S. Mota UFAM
  • Celso B. Carvalho UFAM

Resumo


A detecção de comportamento egoísta é crucial para o funcionamento adequado das operações em redes oportunistas móveis. Trabalhos anteriores têm concentrado esforços em desenvolver sistemas de reputação ou modelos de confiança. Contudo, essas abordagens assumem a existência de um modelo eficiente de detecção de nós egoístas, tal como os watchdogs. A maioria dos estudos, no entanto, não apresenta uma análise da eficiência da implementação do watchdog em um nível experimental. Este artigo discute o projeto, a implementação e a validação de um watchdog, com o objetivo de verificar a eficácia no processo de detecção e compreensão dos efeitos desse mecanismo para valores crescentes da densidade de mensagens na rede. Resultados experimentais, utilizando-se o ambiente The ONE, mostram que a implementação do watchdog aqui discutida é bastante promissora.

Referências

Bigwood, G., Henderson, T., Rehunathan, D., Bateman, M., and Bhatti, S. (2011). CRAWDAD dataset st_andrews/sassy (v. 2011-06-03). Downloaded from https://crawdad.org/st_andrews/sassy/20110603.

Buchegger, S. and Le Boudec, J.-Y. (2002). Performance analysis of the condant protocol. In Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking &Amp; Computing, MobiHoc ’02, pages 226– 236, New York, NY, USA. ACM.

Chaintreau, A., Hui, P., Crowcroft, J., Diot, C., Gass, R., and Scott, J. (2007). Impact of human mobility on opportunistic forwarding algorithms. IEEE Transactions on Mobile Computing, 6(6):606–620.

Dias, J. A. F. F., Rodrigues, J. J. P. C., Xia, F., and Mavromoustakis, C. X. (2015). A cooperative watchdog system to detect misbehavior nodes in vehicular delay-tolerant networks. IEEE Transactions on Industrial Electronics, 62(12):7929– 7937.

Fall, K. (2003). A delay-tolerant network architecture for challenged internets. In Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM ’03, pages 27–34, New York, NY, USA. ACM.

Hernández-Orallo, E., Olmos, M. D. S., Cano, J.-C., Calafate, C. T., and Manzoni, P. (2014). A fast model for evaluating the detection of selsh nodes using a collaborative approach in manets. Wireless Personal Communications, 74(3):1099–1116.

Hernandez-Orallo, E., Serrat, M. D., Cano, J. C., Calafate, Improving selsh node detection in manets using a C. T., and Manzoni, P. (2012). collaborative watchdog. IEEE Communications Letters, 16(5):642–645.

Hernández-Orallo, E., Olmos, M. D. S., Cano, J. C., Calafate, C. T., and Manzoni, P. (2015). Cocowa: A collaborative contact-based watchdog IEEE Transactions on Mobile Computing, 14(6):1162– for detecting selsh nodes. 1175.

Keränen, A., Ott, J., and Kärkkäinen, T. (2009). The one simulator for dtn protocol evaluation. In In Proceedings of the 2nd International Conference on Simulation Tools and Techniques (SIMUtools.

Li, N. and Das, S. K. (2010). Radon: Reputation-assisted data forwarding in opportunistic networks. In Proceedings of the Second International Workshop on Mobile Opportunistic Networking, MobiOpp ’10, pages 8–14, New York, NY, USA. ACM.

Li, W., Galluccio, L., Bassi, F., and Kieffer, M. (2017). Distributed faulty node detection in delay tolerant networks: Design and analysis. IEEE Transactions on Mobile Computing, PP(99):1–1.

Liu, K., Deng, J., Varshney, P. K., and Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbehavior in manets. IEEE Transactions on Mobile Computing, 6(5):536–550.

Marti, S., Giuli, T. J., Lai, K., and Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, MobiCom ’00, pages 255–265, New York, NY, USA. ACM.

Miao, J., Hasan, O., Mokhtar, S. B., Brunie, L., and Yim, K. (2012). An analysis of strategies for preventing selsh behavior in mobile delay tolerant networks. In 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pages 208–215.

Michiardi, P. and Molva, R. (2002). Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks, pages 107–121. Springer US, Boston, MA.

Misra, S., Saha, B. K., and Pal, S. (2016). Opportunistic Mobile Networks: Advances and Applications. Springer Publishing Company, Incorporated, 1st edition.

Soares, D., Mota, E., Souza, C., Manzoni, P., Cano, J. C., and Calafate, C. (2014). A statistical learning reputation system for opportunistic networks. In 2014 IFIP Wireless Days (WD), pages 1–6.

Souza, C., Mota, E., Galvao, L., Manzoni, P., and Cano, J. C. (2014). Drop less known strategy for buffer management in dtn nodes. In Proceedings of the Latin America Networking Conference on LANC 2014, LANC ’14, pages 6:1–6:7, New York, NY, USA. ACM.
Publicado
10/05/2018
SOARES, Diogo; MATTHAUS, Bruno; MOTA, Edjair S.; CARVALHO, Celso B.. Avaliação Experimental da Eficácia de um Watchdog em Redes Oportunistas Móveis. In: SIMPÓSIO BRASILEIRO DE REDES DE COMPUTADORES E SISTEMAS DISTRIBUÍDOS (SBRC), 36. , 2018, Campos do Jordão. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2018 . p. 935-948. ISSN 2177-9384. DOI: https://doi.org/10.5753/sbrc.2018.2469.