Avaliação Experimental da Eficácia de um Watchdog em Redes Oportunistas Móveis

  • Diogo Soares UFAM
  • Bruno Matthaus UFAM
  • Edjair S. Mota UFAM
  • Celso B. Carvalho UFAM

Abstract


Detection of selfish behavior is crucial to the proper functioning of opportunistic mobile network (OMN) operations. Previous work focused on developing reputation systems or trust models. However, these approaches assume the existence of an efficient model of selfish nodes, such as watchdogs. Most studies, however, do not present an analysis of the efficiency of watchdog implementation at an experimental level. This article discusses the design, implementation, and validation of a watchdog, in order to verify the effectiveness of the detection process and to understand the effects of this mechanism for increasing density of messages in the network. The experimental results, obtained using the environment The ONE, showed that the implementation of watchdog discussed here is very promising.

References

Bigwood, G., Henderson, T., Rehunathan, D., Bateman, M., and Bhatti, S. (2011). CRAWDAD dataset st_andrews/sassy (v. 2011-06-03). Downloaded from https://crawdad.org/st_andrews/sassy/20110603.

Buchegger, S. and Le Boudec, J.-Y. (2002). Performance analysis of the condant protocol. In Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking &Amp; Computing, MobiHoc ’02, pages 226– 236, New York, NY, USA. ACM.

Chaintreau, A., Hui, P., Crowcroft, J., Diot, C., Gass, R., and Scott, J. (2007). Impact of human mobility on opportunistic forwarding algorithms. IEEE Transactions on Mobile Computing, 6(6):606–620.

Dias, J. A. F. F., Rodrigues, J. J. P. C., Xia, F., and Mavromoustakis, C. X. (2015). A cooperative watchdog system to detect misbehavior nodes in vehicular delay-tolerant networks. IEEE Transactions on Industrial Electronics, 62(12):7929– 7937.

Fall, K. (2003). A delay-tolerant network architecture for challenged internets. In Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM ’03, pages 27–34, New York, NY, USA. ACM.

Hernández-Orallo, E., Olmos, M. D. S., Cano, J.-C., Calafate, C. T., and Manzoni, P. (2014). A fast model for evaluating the detection of selsh nodes using a collaborative approach in manets. Wireless Personal Communications, 74(3):1099–1116.

Hernandez-Orallo, E., Serrat, M. D., Cano, J. C., Calafate, Improving selsh node detection in manets using a C. T., and Manzoni, P. (2012). collaborative watchdog. IEEE Communications Letters, 16(5):642–645.

Hernández-Orallo, E., Olmos, M. D. S., Cano, J. C., Calafate, C. T., and Manzoni, P. (2015). Cocowa: A collaborative contact-based watchdog IEEE Transactions on Mobile Computing, 14(6):1162– for detecting selsh nodes. 1175.

Keränen, A., Ott, J., and Kärkkäinen, T. (2009). The one simulator for dtn protocol evaluation. In In Proceedings of the 2nd International Conference on Simulation Tools and Techniques (SIMUtools.

Li, N. and Das, S. K. (2010). Radon: Reputation-assisted data forwarding in opportunistic networks. In Proceedings of the Second International Workshop on Mobile Opportunistic Networking, MobiOpp ’10, pages 8–14, New York, NY, USA. ACM.

Li, W., Galluccio, L., Bassi, F., and Kieffer, M. (2017). Distributed faulty node detection in delay tolerant networks: Design and analysis. IEEE Transactions on Mobile Computing, PP(99):1–1.

Liu, K., Deng, J., Varshney, P. K., and Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbehavior in manets. IEEE Transactions on Mobile Computing, 6(5):536–550.

Marti, S., Giuli, T. J., Lai, K., and Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, MobiCom ’00, pages 255–265, New York, NY, USA. ACM.

Miao, J., Hasan, O., Mokhtar, S. B., Brunie, L., and Yim, K. (2012). An analysis of strategies for preventing selsh behavior in mobile delay tolerant networks. In 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pages 208–215.

Michiardi, P. and Molva, R. (2002). Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks, pages 107–121. Springer US, Boston, MA.

Misra, S., Saha, B. K., and Pal, S. (2016). Opportunistic Mobile Networks: Advances and Applications. Springer Publishing Company, Incorporated, 1st edition.

Soares, D., Mota, E., Souza, C., Manzoni, P., Cano, J. C., and Calafate, C. (2014). A statistical learning reputation system for opportunistic networks. In 2014 IFIP Wireless Days (WD), pages 1–6.

Souza, C., Mota, E., Galvao, L., Manzoni, P., and Cano, J. C. (2014). Drop less known strategy for buffer management in dtn nodes. In Proceedings of the Latin America Networking Conference on LANC 2014, LANC ’14, pages 6:1–6:7, New York, NY, USA. ACM.
Published
2018-05-10
SOARES, Diogo; MATTHAUS, Bruno; MOTA, Edjair S.; CARVALHO, Celso B.. Avaliação Experimental da Eficácia de um Watchdog em Redes Oportunistas Móveis. In: BRAZILIAN SYMPOSIUM ON COMPUTER NETWORKS AND DISTRIBUTED SYSTEMS (SBRC), 36. , 2018, Campos do Jordão. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2018 . p. 935-948. ISSN 2177-9384. DOI: https://doi.org/10.5753/sbrc.2018.2469.