Environment-Aware Reputation Management for Ad Hoc Networks

Slides:



Advertisements
Similar presentations
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 9 Fundamentals.
Advertisements

Robin Kravets Tarek Abdelzaher Department of Computer Science University of Illinois The Phoenix Project.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Jaringan Komputer Lanjut Packet Switching Network.
Doc.: IEEE /0604r1 Submission May 2014 Slide 1 Modeling and Evaluating Variable Bit rate Video Steaming for ax Date: Authors:
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
1 An Approach to Real-Time Support in Ad Hoc Wireless Networks Mark Gleeson Distributed Systems Group Dept.
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
Madhavi W. SubbaraoWCTG - NIST Dynamic Power-Conscious Routing for Mobile Ad-Hoc Networks Madhavi W. Subbarao Wireless Communications Technology Group.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
MAC Layer (Mis)behaviors Christophe Augier - CSE Summer 2003.
Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly Designed by Yao Zhao.
MANETs A Mobile Ad Hoc Network (MANET) is a self-configuring network of mobile nodes connected by wireless links. Characteristics include: no fixed infrastructure.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks Yi Lu, Weichao Wang, Bharat Bhargava CERIAS and Department of Computer Sciences Purdue.
1 Computer Networks Switching Technologies. 2 Switched Network Long distance transmission typically done over a network of switched nodes End devices.
Selected Data Rate Packet Loss Channel-error Loss Collision Loss Reduced Packet Probing (RPP) Multirate Adaptation For Multihop Ad Hoc Wireless Networks.
Jennifer Rexford Princeton University MW 11:00am-12:20pm Wide-Area Traffic Management COS 597E: Software Defined Networking.
TCP Behavior across Multihop Wireless Networks and the Wired Internet Kaixin Xu, Sang Bae, Mario Gerla, Sungwook Lee Computer Science Department University.
Distributed Quality-of-Service Routing of Best Constrained Shortest Paths. Abdelhamid MELLOUK, Said HOCEINI, Farid BAGUENINE, Mustapha CHEURFA Computers.
Information Quality Aware Routing in Event-Driven Sensor Networks Hwee-Xian TAN 1, Mun Choon CHAN 1, Wendong XIAO 2, Peng-Yong KONG 2 and Chen-Khong THAM.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Hierarchical Trust Management for Wireless Sensor Networks and Its Application to Trust-Based Routing Fenye Bao, Ing-Ray Chen, Moonjeong Chang Presented.
VIRTUAL ROUTER Kien A. Hua Data Systems Lab School of EECS University of Central Florida.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Enhancing TCP Fairness in Ad Hoc Wireless Networks using Neighborhood RED Kaixin Xu, Mario Gerla UCLA Computer Science Department
Cognitive Radio Networks
Aemen Lodhi (Georgia Tech) Amogh Dhamdhere (CAIDA)
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
TCP with Variance Control for Multihop IEEE Wireless Networks Jiwei Chen, Mario Gerla, Yeng-zhong Lee.
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
Security and Cooperation in Ad Hoc Networks Gaia Maselli IIT - CNR
 Tree in Sensor Network Patrick Y.H. Cheung, and Nicholas F. Maxemchuk, Fellow, IEEE 3 rd New York Metro Area Networking Workshop (NYMAN 2003)
Troubleshooting Mesh Networks Lili Qiu Joint Work with Victor Bahl, Ananth Rao, Lidong Zhou Microsoft Research Mesh Networking Summit 2004.
Toward Reliable and Efficient Reporting in Wireless Sensor Networks Authors: Fatma Bouabdallah Nizar Bouabdallah Raouf Boutaba.
Risk-Aware Mitigation for MANET Routing Attacks Submitted by Sk. Khajavali.
Doc.: IEEE /2200r2 Submission July 2007 Sandesh Goel, Marvell et alSlide 1 Route Metric Proposal Date: Authors:
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
William Stallings Data and Computer Communications
Route Metric Proposal Date: Authors: July 2007 Month Year
MAC Protocols for Sensor Networks
Routing Metrics for Wireless Mesh Networks
Delay-Tolerant Networks (DTNs)
Dominik Kaspar, Eunsook Kim, Carles Gomez, Carsten Bormann
Routing Metrics for Wireless Mesh Networks
Recommendation Based Trust Model with an Effective Defense Scheme for ManetS Adeela Huma 02/02/2017.
Ad-hoc Networks.
MOBILE AD-HOC NETWORKS
Outline Introduction Routing in Mobile Ad Hoc Networks
EURIDICE Project Exploiting the concept of Intelligent Cargo
by Saltanat Mashirova & Afshin Mahini
Routing Metrics for Wireless Mesh Networks
Wireless Ad-Hoc Networking
Wenjia Li Anupam Joshi Tim Finin May 18th, 2010
Mobile ad hoc networking: imperatives and challenges
Multi-Hop Broadcast from Theory to Reality:
Cognitive Radio Networks
Data and Computer Communications
IT351: Mobile & Wireless Computing
Vehicular Ad-hoc Networks
Study of performance of regular TCP in MANETs (using simulator).
End-to-End Aware Association in Mesh Networks: Performance Study
Protocols.
End-to-End Aware Association in Mesh Networks: Performance Study
Route Metric Proposal Date: Authors: July 2007 Month Year
Adaptive Topology Control for Ad-hoc Sensor Networks
Modeling and Evaluating Variable Bit rate Video Steaming for ax
Protocols.
Multi hop connections using
Presentation transcript:

Environment-Aware Reputation Management for Ad Hoc Networks Tamer Nadeem Siemens Corporate Research tamer.nadeem@siemens.com

Significance of node cooperation Key network functionalities such as medium access and routing depend on node cooperation. Routing Multi-hop communication. Each node acts as a router as well as terminals. Medium Access Transmitting nodes seek exclusive access to the medium. Node Misbehavior Selfish Malicious B A C Routing is Cooperation-based D ! ! ! ! B Medium Access is Cooperation-based A ! ! ! !

Problem Statement Dynamic conditions (temporal and Spatial) perceived differently: Channel condition Traffic intensity, Node available resources (e.g. battery power, bandwidth, etc.). Topology dynamics (i.e., node mobility) Identify node behavior and distinguish between a node’s willful decision not to cooperate (i.e. misbehavior) and its inability to do so due to adverse network environment. This research investigates adaptation in reputation management systems. Reputation management systems are meant to evaluate node behavior and identify node that behave inappropriately in an ad hoc network Typically, the functionalities …. Meaning that different node carry out the different functionalities of reputation management in the same way across time and space. However, node behavior is affected by local and network-wide conditions.

Challenges Identify and accurately measure condition/resources that affect nodes’ willful decisions. Assess and account for the impact of topology changes. Increased awareness comes at the cost of increased complexity. The more the nodes become aware of their surroundings, the more resources they have to consume in the process. This includes energy and computational resources. Mechanisms are needed to weigh in the need for awareness against the consumption of resources needed to be aware and to adapt node awareness temporally and spatially as needed and as can be tolerated.

EARMAHOC Research towards realizing environment- awareness in reputation management system for ad hoc networks. Aware of the temporal and spatial network environment factors that affects node behavior. Reputation management systems are meant to evaluate node behavior and identify node that behave inappropriately in an ad hoc network Typically, the functionalities …. Meaning that different node carry out the different functionalities of reputation management in the same way across time and space. However, node behavior is affected by local and network-wide conditions.

Adaptive Slot Duration Slot duration should adapt to network activity. Misbehavior detection time using different evaluation slot durations.

Adaptive Slot Duration We use routing activity as a measure of network activity: Frequency of route establishment, route update, and route expiration events increases as network activity increases (otherwise network becomes unstable). Comparing average time between consecutive routing operations to optimal average slot duration

Adaptive Slot Mobility Environment Very short duration of activities irrespective of the traffic load  too few events. Nodes evaluated within each slot may be different due to the changes in the topology. Packet drops due to the instability of routes.

Adaptive Slot Mobility Environment We allow historic records of behavior assessments and decisions to contribute to current decisions. concept of virtual time-slotting Virtual slot duration differs for each node under evaluation and depends on the observations made so far that reflect that node’s behavior. virtual slotting may spans beyond the boundaries of contiguous time slots

The End…

Use Cases Enterprise Networks Vehicular Networks Social Networks

Reputation management systems mitigate against misbehavior The functionalities of a reputation management system are: Promote Cooperation: encourage nodes to cooperate. Evaluation: evaluate nodes’ quality of behavior based on their cooperation. Detection: distinguish nodes according to their behavior (cooperative vs. misbehaving nodes). Reaction: appropriately react to misbehaving nodes. Homogeneous application of the reputation management functionalities. Reputation management systems mitigate against misbehavior

Overall objectives of this research To investigate adaptation in reputation management systems. To satisfy this goal, we: Define a formal framework for reputation management systems: Identify the components of a reputation management system and how these components interact. Develop a model for detection of routes that include misbehaving nodes. Develop an autonomous reputation management system Assume node independence with respect to the reputation management system functionalities. Study adaptation of the reputation management system functionalities. Overall objectives of this research

Characteristics of an Adaptive Reputation Management System Sensitive: able to capture changes in node behavior. Adaptable: able to adjust according to the network conditions Accurate: able to distinguish between cooperative and misbehaving nodes unambiguously. Prompt: timely detects misbehaving nodes. Characteristics of an Adaptive Reputation Management System

System Requirements It must be aware of the network environment factors that may affect node behavior (e.g., congestion, contention, shadowing and path loss) It must be aware of any shortage in resources that may affect other nodes’ willful decisions to forward packets. third category of nodes can be created (where the first and second cooperative and misbehaving nodes) distinguishes such nodes as disadvantaged. It must be aware of the topology dynamics and their impact on packet forwarding. Reputation management systems are meant to evaluate node behavior and identify node that behave inappropriately in an ad hoc network Typically, the functionalities …. Meaning that different node carry out the different functionalities of reputation management in the same way across time and space. However, node behavior is affected by local and network-wide conditions.