© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 12: Secure protocols for.

Slides:



Advertisements
Similar presentations
1 Security for Ad Hoc Network Routing. 2 Ad Hoc Networks Properties Mobile Wireless communication Medium to high bandwidth High variability of connection.
Advertisements

Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network,
Crowdsourcing and All-Pay Auctions Milan Vojnović Microsoft Research Joint work with Dominic DiPalantino UC Berkeley, July 13, 2009.
Secret Sharing Protocols [Sha79,Bla79]
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 11 Information.
By D. Fisher Geometric Transformations. Reflection, Rotation, or Translation 1.
Security Issues In Mobile IP
Page 1 Approximately Maximum Bandwidth Routing for Slotted Wireless Ad Hoc Networks Approximately Maximum Bandwidth Routing for Slotted Wireless Ad Hoc.
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences 1 Interference.
Efficient Secure Aggregation in VANETs Maxim Raya, Adel Aziz, and Jean-Pierre Hubaux Laboratory for computer Communications and Applications (LCA) EPFL.
10/26/2005CCW05 1 Resolving Greedy Users via Stateless AQM Murat Alanyali Boston University Joint work with Ashraf Al Daoud.
Energy-Efficient Distributed Algorithms for Ad hoc Wireless Networks Gopal Pandurangan Department of Computer Science Purdue University.
1 Retransmission Repeat: Simple Retransmission Permutation Can Resolve Overlapping Channel Collisions Li (Erran) Li Bell Labs, Alcatel-Lucent Joint work.
Scalable Routing In Delay Tolerant Networks
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Addition Facts
Real-Time Competitive Environments: Truthful Mechanisms for Allocating a Single Processor to Sporadic Tasks Anwar Mohammadi, Nathan Fisher, and Daniel.
Shadow Prices vs. Vickrey Prices in Multipath Routing Parthasarathy Ramanujam, Zongpeng Li and Lisa Higham University of Calgary Presented by Ajay Gopinathan.
The Weighted Proportional Resource Allocation Milan Vojnović Microsoft Research Joint work with Thành Nguyen Microsoft Research Asia, Beijing, April, 2011.
June 4, 2004 A Robust Reputation System for P2P and Mobile Ad-hoc Networks Sonja Buchegger 1 A Robust Reputation System for P2P and Mobile Ad-hoc Networks.
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Security in Mobile Ad Hoc Networks Security Protocols and Applications Seminar Rudi Belotti, Frank Lyner April 29, 2003.
1 Capacity analysis of mesh networks with omni or directional antennas Jun Zhang and Xiaohua Jia City University of Hong Kong.
Capacity of wireless ad-hoc networks By Kumar Manvendra October 31,2002.
Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
P: 1 / 24 Situated and Autonomic Communications FET Integrated Project CASCADAS ( Mécanismes de sécurité et de coopération entre.
Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 EN0129 PC AND NETWORK TECHNOLOGY I NETWORK LAYER AND IP Derived From CCNA Network Fundamentals.
Reaching Agreements II. 2 What utility does a deal give an agent? Given encounter  T 1,T 2  in task domain  T,{1,2},c  We define the utility of a.
Addition 1’s to 20.
25 seconds left…...
Week 1.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 10: Selfishness in packet.
Cryptanalysis of a Communication-Efficient Three-Party Password Authenticated Key Exchange Protocol Source: Information Sciences in review Presenter: Tsuei-Hung.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 11: Wireless operators in.
1/22 Worst and Best-Case Coverage in Sensor Networks Seapahn Meguerdichian, Farinaz Koushanfar, Miodrag Potkonjak, and Mani Srivastava IEEE TRANSACTIONS.
Algorithmic mechanism design Vincent Conitzer
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Link-State Routing Protocols Routing Protocols and Concepts – Chapter.
Peter Key, Laurent Massoulie, Don Towsley Infocom 07 presented by Park HoSung 1 Path selection and multipath congestion control.
Characterizing Mechanism Design Over Discrete Domains Ahuva Mu’alem and Michael Schapira.
Auction Theory Class 5 – single-parameter implementation and risk aversion 1.
1 Incentive-Compatible Interdomain Routing Joan Feigenbaum Yale University Vijay Ramachandran Stevens Institute of Technology Michael Schapira The Hebrew.
Blackbox Reductions from Mechanisms to Algorithms.
Performance Evaluation Sponsored Search Markets Giovanni Neglia INRIA – EPI Maestro 4 February 2013.
Collaboration Mechanisms in SOA based MANETs. Introduction Collaboration implies the cooperation between the nodes to support the proper functioning of.
EPFL, Lausanne, Switzerland Márk Félegyházi Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks – the Static Case Márk Félegyházi.
Game Theory in Wireless and Communication Networks: Theory, Models, and Applications Lecture 6 Auction Theory Zhu Han, Dusit Niyato, Walid Saad, Tamer.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
DARWIN: Distributed and Adaptive Reputation Mechanism for Wireless Ad- hoc Networks CHEN Xiao Wei, Cheung Siu Ming CSE, CUHK May 15, 2008 This talk is.
Dealing with Selfish and Malicious Nodes in Ad Hoc Networks.
Incentive-Compatible Opportunistic Routing for Wireless Networks Fan Wu, Tingting Chen, Sheng Zhong (SUNY Buffalo) Li Erran Li Li Erran Li (Bell Labs)
Counter-measuring MAC Misbehaviors in Ad Hoc Networks using Game Theory March 25, 2010 EE5723 – Computer & Network Security.
Stimulation for Cooperation in Ad Hoc Networks: Beyond Nuglets Levente Buttyán, Jean-Pierre Hubaux, and Naouel Ben Salem Swiss Federal Institute of Technology.
Appendix B: A tutorial on game theory for wireless networks
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
Joint Multi-Access and Routing as a Stochastic Game for Relay Channel Yalin Evren Sagduyu, Anthony Ephremides Objective and Motivation * Objective: Analyze.
NCKU CSIE CIAL1 Principles and Protocols for Power Control in Wireless Ad Hoc Networks Authors: Vikas Kawadia and P. R. Kumar Publisher: IEEE JOURNAL ON.
Mechanism Design Traditional Algorithmic Setting Mechanism Design Setting.
Secure Protocols for Behavior Enforcement Slides elaborated by Julien Freudiger and adapted by Jean-Pierre Hubaux Note: this chapter.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida.
ACM SIGACT News Distributed Computing Column 9 Abstract This paper covers the distributed systems issues, concentrating on some problems related to distributed.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
On Designing Incentive-Compatible Routing and Forwarding Protocols in Wireless Ad-Hoc Networks ---- An Integrated Approach Using Game Theoretical and Cryptographic.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Eunyoung Chang 1 CS 6204 Mobile Computing.  Problem  Proposed Approaches  COMMIT Approaches  THE SYSTEM MODEL  The COMMIT Protocol  Protocol Analysis.
SYNERGY: A Game-Theoretical Approach for Cooperative Key Generation in Wireless Networks Jingchao Sun, Xu Chen, Jinxue Zhang, Yanchao Zhang, and Junshan.
A Novel Coalitional Game Model for Security Issues in Wireless Networks Xiaoqi LiMichael Lyu Computer Science and Engineering Department The Chinese University.
Enforce Collaboration in Mobile Ad Hoc Network Ning Jiang School of EECS University of Central Florida
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Presentation transcript:

© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 12: Secure protocols for behavior enforcement

Security and Cooperation in Wireless Networks Chapter 12:Secure protocols for behavior enforcement 2/22 Motivation Provide incentive to cooperate within Routing and Forwarding protocols using a game theoretic approach Packet forwarding consumes resources –Nodes are rational => Maximize their own payoff –Nodes avoid forwarding

Security and Cooperation in Wireless Networks Chapter 12:Secure protocols for behavior enforcement 3/22 Outline Introduction –Incentives –System Model Model –Dominant action/subaction –Cooperation optimal protocol Protocols –VCG payments with correct link cost establishment –Forwarding protocol with block confirmation Conclusion

Security and Cooperation in Wireless Networks Chapter 12:Secure protocols for behavior enforcement 4/22 Introduction  Routing protocol –Discover efficient routing paths: global welfare –Deal with selfish nodes: local welfare  Packet forwarding protocol –address the fair exchange problem => Joint Incentive

Security and Cooperation in Wireless Networks Chapter 12:Secure protocols for behavior enforcement 5/22 Possible incentives Incentive Punish Reward InternalExternalInternal External  Possible incentive strategies: –Punish: Reputation, Jamming, Isolation –Reward: Virtual currency  Possible incentives: –Internally: With intrinsic mechanisms (e.g., deny communication, jam) –Externally: by dedicated protocols

Security and Cooperation in Wireless Networks Chapter 12:Secure protocols for behavior enforcement 6/22 System Model  Ad-hoc networks as non-cooperative strategic games Called “Ad Hoc Games”  Channel model: Packet successfully transmitted if P transmission >= P min –P min = minimum power to reach receiver No errors (BER = 0)  Nodes can withhold, replace or send a message  Nodes can transmit at any power level  We define the payoff of a node as: –b i = benefit (reward, by micro-payment) –c i = cost of forwarding (energy, overhead,…)

Security and Cooperation in Wireless Networks Chapter 12:Secure protocols for behavior enforcement 7/22 Formal Model  Dominant Action: –A dominant action is one that maximizes player i payoff, no matter what actions other players choose Example: Joint packet forwarding game –Imperfect information –Message from S to D –Two players: p1 and p2 p1 has no dominant action p2’s dominant action is F SP1P2D p1\p2FD F(1-c,1-c)(-c,0) D(0,0)(0,0)(0,0)(0,0)

Security and Cooperation in Wireless Networks Chapter 12:Secure protocols for behavior enforcement 8/22 Formal Model  Each node action is comprised of two parts: is node i’s subaction in the routing stage (what it is supposed to do in the routing stage) is node i’s subaction in the forwarding stage (what it really does in the forwarding stage) Routing decision R: determined by the routing subactions of all nodes Prospective routing payoff:

Security and Cooperation in Wireless Networks Chapter 12:Secure protocols for behavior enforcement 9/22 Routing stage  Dominant subaction: –In a routing stage, a dominant subaction is one that maximizes its routing payoff no matter what subactions other players choose.  A routing protocol is a routing-dominant protocol to the routing stage if following the protocol is a dominant subaction of each potential forwarding node in the routing stage

Security and Cooperation in Wireless Networks Chapter 12:Secure protocols for behavior enforcement 10/22 Forwarding stage A forwarding protocol is a forwarding-optimal protocol to the forwarding stage under routing decision R if –All packets are forwarded to their destinations –Following the protocol is a subgame perfect equilibrium  A path is said to be a subgame perfect equilibrium if it is a Nash equilibrium for every subgame Node 1 Node 2 Last node forward drop p1\p2FD F(1-c,1-c)(-c,0) D(0,0)

Security and Cooperation in Wireless Networks Chapter 12:Secure protocols for behavior enforcement 11/22 Cooperation-Optimal Protocol  A protocol is a cooperation-optimal protocol to an ad-hoc game if –Its routing protocol is a routing-dominant protocol to the routing stage –For a routing decision R, its forwarding protocol is a forwarding optimal protocol to the forwarding stage

Security and Cooperation in Wireless Networks Chapter 12:Secure protocols for behavior enforcement 12/22 VCG for routing protocols  VCG: Vickrey, Clarke, and Groves – second-best sealed auction  Nodes independently compute and declare their packet transmission cost to destination  Destination computes Lowest Cost Path (LCP)  Source rewards the nodes –declared cost + added value  The added value is the difference between LCP with the node and without it –Incentive to declare the true price => Truthful

Security and Cooperation in Wireless Networks Chapter 12:Secure protocols for behavior enforcement 13/22 Example of VCG Least cost path from S to D: LCP(S,D) = S, v2, v3, D with cost(LCP(S,D)) = = 10 Least cost path without node v2: LCP(S,D;−v2) = S, v1, v4, D with cost(LCP(S,D);−v2) = = 14 Least cost path without node v3: LCP(S,D;−v3) = S, v2, v4, D with cost(LCP(S,D);−v3) = = 12. VCG payments: b2 = 14 − = 6 b3 = 12 − = 5 These values represent the unit payment (the payment for one forwarded data packet) to nodes v2 and v3, respectively.

Security and Cooperation in Wireless Networks Chapter 12:Secure protocols for behavior enforcement 14/22 Cheating about the power level  Assume mutual computation of link cost  Consider a node i and its neighbor j 1.Node i cheats by making Pi,j larger: –Node j is less likely to be on LCP –Node j’ s payment will decrease. 2.Node j can respond by cheating and making Pi,j smaller: –Node j more likely to be on LCP –Node j increases its payment  VCG is thus not truthful in this case ij Pi,j

Security and Cooperation in Wireless Networks Chapter 12:Secure protocols for behavior enforcement 15/22 Cryptographic protection  Assume private computation of link cost (the details of the security mechanisms are in the book)  Protocol for link cost establishment: –Nodes share a symmetric key with D –Nodes send an encrypted and signed test signal at increasing power levels containing cost information –Messages are protected from forging with HMAC –Complexity (computation at the destination): O(N^3) i j [cost3]K¦HMAC D [cost2]K¦HMAC [cost1]K¦HMAC [cost4]K¦HMAC [cost3]K¦HMAC [cost4]K¦HMAC

Security and Cooperation in Wireless Networks Chapter 12:Secure protocols for behavior enforcement 16/22 Conclusion on the routing stage Theorem 12.1: If the destination is able to collect all involved link costs as described above, then the described protocol is a routing dominant protocol to the routing stage.

Security and Cooperation in Wireless Networks Chapter 12:Secure protocols for behavior enforcement 17/22 r1r1 Forwarding Protocol  Messages bundled in blocks  Block confirmation with a Reverse Hash Chain –r is made public by source in an authenticated way –Confirmation of block 2 is done by sending r 5-2 =r 3 –Nodes verify m1m2m3m4m5m6m7m8m9 b1b2b3b4b5 H r0r0 HH r2r2 r=r 5 H

Security and Cooperation in Wireless Networks Chapter 12:Secure protocols for behavior enforcement 18/22 Fair Exchange Problem  Source and intermediate nodes can disagree about successful transmission of a block  Mutual decision = contract between source an intermediate nodes –Confirmation is sent with the last packet of each block to destination –Destination forwards confirmation to intermediate nodes if block correctly received –Intermediate nodes stop forwarding if they do not get confirmation  Eliminates incentive to cheat –Not respecting the protocol blocks the protocol

Security and Cooperation in Wireless Networks Chapter 12:Secure protocols for behavior enforcement 19/22 Theorems Theorem 12.2: Given a routing decision R, assuming that the computed payment is greater than the cost, the reverse hash chain based forwarding protocol is a forwarding optimal protocol. Theorem 12.3: The complete protocol (routing protocol and packet forwarding protocol) is a cooperation-optimal protocol to AdHocGames.

Security and Cooperation in Wireless Networks Chapter 12:Secure protocols for behavior enforcement 20/22 Discussion  Modeling –Interference and mobility unreliable links make use of incentives more difficult  Game theoretic model assumes –Tamper proof hardware to compute best path at destination –Payment center to resolve payment issues  Performance vs. incentive compatibility –Control channel overhead –Throughput –Complexity

Security and Cooperation in Wireless Networks Chapter 12:Secure protocols for behavior enforcement 21/22 Summary  Cooperation optimal protocol –Routing dominant + Forwarding optimal –Routing based on VCG –Forwarding based on Reverse Hash Chain  Corsac provides incentives for cooperation –Protocol is fair –The topology determines payment –The incentive protocol reduces the network traffic

Security and Cooperation in Wireless Networks Chapter 12:Secure protocols for behavior enforcement 22/22 References  On Designing Incentive-Compatible Routing and Forwarding Protocols in Wireless Ad-Hoc Networks Sheng Zhong, Li Erran Li, Yanbin Grace Liu and Yang Richard Yang. ACM Springer Wireless Networks (WINET), Special Issue of Selected Papers of Mobicom 2005  Punishement in Selfish Wireless Networks: A Game Theoretic Analysis Dave Levin. NetEcon 2006  On Selfish Behavior in CSMA/CA Networks Mario Cagalj, Saurabh Ganeriwal, Imad Aad and Jean-Pierre Hubaux. Infocom 2005  Ad hoc-VCG: A Truthful and Cost-Efficient Routing Protocol for Mobile Ad hoc Networks with Selfish Agents Luzi Anderegg and Stephan Eidenbenz. Mobicom 2003