A social-based watchdog system to detect selfish nodes in opportunistic mobile networks

Abstract Detecting selfish nodes in opportunistic mobile networks can reduce the loss of network resources, thus improve the data delivery performance. Most of existing detection schemes primarily rely on the nodes’ contact records and do not consider their individual and social preferences in their data relaying behavior, which result in long detection time and high communication overhead. In addition, they cannot distinguish the nodes’ selfishness type and degree, which is important because the charge and rewarding mechanisms applied to stimulate different nodes may not be the same. In this paper, we propose a Social-based Watchdog system (SoWatch) in which watchdog nodes analyze messages received from their encountered nodes with respect to their social tie information to identify the nodes’ selfish behavior in message relaying. Meanwhile, the watchdog nodes apply the second-hand watchdog information received from other nodes to improve the detection time and accuracy. Next, we design a reputation system in which watchdog nodes identify selfish nodes based on their direct and indirect watchdog information and distinguish individually and socially selfish nodes. Furthermore, we design a watchdog evaluation module to protect SoWatch against wrong watchdogs disseminated by malicious nodes in which a watchdog node investigates the truthfulness of the indirect watchdogs before applying them. Our experiments using real-world datasets illustrate that SoWatch outperforms a benchmark contact-based watchdog system in terms of detection time by 45% and detection ratio by 10% with less communication overhead.

[1]  M. McPherson,et al.  Birds of a Feather: Homophily in Social Networks , 2001 .

[2]  Xu Chen,et al.  Exploiting Social Tie Structure for Cooperative Wireless Networking: A Social Group Utility Maximization Framework , 2016, IEEE/ACM Transactions on Networking.

[3]  Pramod K. Varshney,et al.  An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs , 2007, IEEE Transactions on Mobile Computing.

[4]  Qinghua Li,et al.  Mitigating Routing Misbehavior in Disruption Tolerant Networks , 2012, IEEE Transactions on Information Forensics and Security.

[5]  Feng Xia,et al.  Vehicular Social Networks: Enabling Smart Mobility , 2017, IEEE Communications Magazine.

[6]  Thomas F. La Porta,et al.  Cooperative data offloading in opportunistic mobile networks , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[7]  Aniket Kate,et al.  Anonymity and security in delay tolerant networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[8]  Feng Xia,et al.  A Cooperative Watchdog System to Detect Misbehavior Nodes in Vehicular Delay-Tolerant Networks , 2015, IEEE Transactions on Industrial Electronics.

[9]  Pan Hui,et al.  Evaluating the Impact of Social Selfishness on the Epidemic Routing in Delay Tolerant Networks , 2010, IEEE Communications Letters.

[11]  P. Jaccard,et al.  Etude comparative de la distribution florale dans une portion des Alpes et des Jura , 1901 .

[12]  Alex Pentland,et al.  Sensing the "Health State" of a Community , 2012, IEEE Pervasive Computing.

[13]  Md. Yusuf Sarwar Uddin,et al.  Intercontact Routing for Energy Constrained Disaster Response Networks , 2013, IEEE Transactions on Mobile Computing.

[14]  Wanlei Zhou,et al.  Multidimensional Routing Protocol in Human-Associated Delay-Tolerant Networks , 2013, IEEE Transactions on Mobile Computing.

[15]  Feng Xia,et al.  A Signaling Game for Uncertain Data Delivery in Selfish Mobile Social Networks , 2016, IEEE Transactions on Computational Social Systems.

[16]  Chai Kiat Yeo,et al.  Detecting colluding blackhole and greyhole attack in Delay Tolerant Networks , 2016, 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC).

[17]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[18]  Jörg Ott,et al.  Effect of non-cooperative nodes in mobile DTNs , 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[19]  Jörg Ott,et al.  The ONE simulator for DTN protocol evaluation , 2009, SIMUTools 2009.

[20]  Lars C. Wolf,et al.  Detecting blackhole and greyhole attacks in vehicular Delay Tolerant Networks , 2013, 2013 Fifth International Conference on Communication Systems and Networks (COMSNETS).

[21]  Jie Wu,et al.  Thwarting Blackhole Attacks in Disruption-Tolerant Networks using Encounter Tickets , 2009, IEEE INFOCOM 2009.

[22]  Alex Pentland,et al.  Reality mining: sensing complex social systems , 2006, Personal and Ubiquitous Computing.

[23]  Zhenfu Cao,et al.  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks , 2014 .

[24]  Nesrine Chakchouk,et al.  A Survey on Opportunistic Routing in Wireless Communication Networks , 2015, IEEE Communications Surveys & Tutorials.

[25]  Qinghua Li,et al.  A routing protocol for socially selfish delay tolerant networks , 2012, Ad Hoc Networks.

[26]  Ciprian Dobre,et al.  SENSE: A collaborative selfish node detection and incentive mechanism for opportunistic networks , 2014, J. Netw. Comput. Appl..

[27]  Mads Haahr,et al.  Social network analysis for routing in disconnected delay-tolerant MANETs , 2007, MobiHoc '07.

[28]  Ying Cai,et al.  An Incentive-Compatible Routing Protocol for Two-Hop Delay-Tolerant Networks , 2016, IEEE Transactions on Vehicular Technology.

[29]  Kevin R. Fall,et al.  A delay-tolerant network architecture for challenged internets , 2003, SIGCOMM '03.

[30]  Feng Xia,et al.  A game-theoretic incentive scheme for social-aware routing in selfish mobile social networks , 2017, Future Gener. Comput. Syst..

[31]  Ioannis Stavrakakis,et al.  Social Similarity Favors Cooperation: The Distributed Content Replication Case , 2013, IEEE Transactions on Parallel and Distributed Systems.

[32]  Juan-Carlos Cano,et al.  Evaluation of collaborative selfish node detection in MANETS and DTNs , 2012, MSWiM '12.

[33]  Pan Hui,et al.  An Empirical Study of Human Altruistic Behaviors in Opportunistic Networks , 2015, HOTPOST '15.

[34]  Thrasyvoulos Spyropoulos,et al.  Understanding the effects of social selfishness on the performance of heterogeneous opportunistic networks , 2014, Comput. Commun..

[35]  Lieguang Zeng,et al.  The Impact of Node Selfishness on Multicasting in Delay Tolerant Networks , 2011, IEEE Transactions on Vehicular Technology.

[36]  Juan-Carlos Cano,et al.  CoCoWa: A Collaborative Contact-Based Watchdog for Detecting Selfish Nodes , 2015, IEEE Transactions on Mobile Computing.

[37]  Feng Xia,et al.  PIS: A Multi-Dimensional Routing Protocol for Socially-Aware Networking , 2016, IEEE Transactions on Mobile Computing.

[38]  Wenmao Liu,et al.  Defending sybil attacks in mobile social networks , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[39]  Cauligi S. Raghavendra,et al.  Spray and wait: an efficient routing scheme for intermittently connected mobile networks , 2005, WDTN '05.

[40]  A. Vasilakos,et al.  Socially Aware Networking: A Survey , 2013, IEEE Systems Journal.