Incentive-Compatible Opportunistic Routing for Wireless Networks Fan Wu, Tingting Chen, Sheng Zhong (SUNY Buffalo) Li Erran Li Li Erran Li (Bell Labs)

Slides:



Advertisements
Similar presentations
Dept. of computer Science and Information Management
Advertisements

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Capacity of wireless ad-hoc networks By Kumar Manvendra October 31,2002.
Communications Research Centre (CRC) Defence R&D Canada – Ottawa 1 Properties of Mobile Tactical Radio Networks on VHF Bands Li Li & Phil Vigneron Communications.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 12: Secure protocols for.
XORs in The Air: Practical Wireless Network Coding
A Centralized Scheduling Algorithm based on Multi-path Routing in WiMax Mesh Network Yang Cao, Zhimin Liu and Yi Yang International Conference on Wireless.
Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
DARWIN: Distributed and Adaptive Reputation Mechanism for Wireless Ad- hoc Networks CHEN Xiao Wei, Cheung Siu Ming CSE, CUHK May 15, 2008 This talk is.
Sustaining Cooperation in Multi-Hop Wireless Networks Ratul Mahajan, Maya Rodrig, David Wetherall, John Zahorjan University of Washington.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
1 A Framework for Joint Network Coding and Transmission Rate Control in Wireless Networks Tae-Suk Kim*, Serdar Vural*, Ioannis Broustis*, Dimitris Syrivelis.
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
Random Access MAC for Efficient Broadcast Support in Ad Hoc Networks Ken Tang, Mario Gerla Computer Science Department University of California, Los Angeles.
Selfish Caching in Distributed Systems: A Game-Theoretic Analysis By Byung-Gon Chun et al. UC Berkeley PODC’04.
ExOR:Opportunistic Multi-Hop Routing For Wireless Networks
Exploiting Opportunism in Wireless Networks Aruna Balasubramanian Guest Lecture, CS 653 (Some slides borrowed from the ExOr and MORE presentations at SigComm.
Opportunistic Routing in Multi-hop Wireless Networks Sanjit Biswas and Robert Morris MIT CSAIL Presented by: Ao-Jan Su.
1 Sustaining Cooperation in Multi-Hop Wireless Networks Ratul Mahajan, Maya Rodrig, David Wetherall and John Zahorjan University of Washington Presented.
Opportunistic Routing in Multi-hop Wireless Networks Sanjit Biswas and Robert Morris MIT CSAIL
ExOR: Opportunistic Multi-Hop Routing For Wireless Networks Sanjit Biswas & Robert Morris.
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
Eric Rozner - ETX.ppt1 A High-Throughput Path Metric for Multi-Hop Wireless Routing Douglas S.J. Couto Daniel Aguayo John Bicket Robert Morris Presented.
Enhancing TCP Fairness in Ad Hoc Wireless Networks Using Neighborhood RED Kaixin Xu, Mario Gerla University of California, Los Angeles {xkx,
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
ExOR: Opportunistic Multi-Hop Routing for Wireless Networks Sigcomm 2005 Sanjit Biswas and Robert Morris MIT Computer Science and Artificial Intelligence.
Network Coding vs. Erasure Coding: Reliable Multicast in MANETs Atsushi Fujimura*, Soon Y. Oh, and Mario Gerla *NEC Corporation University of California,
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Efficient Network-Coding-Based Opportunistic Routing Through Cumulative Coded Acknowledgments Dimitrios Koutsonikolas, Chih-Chun Wang and Y. Charlie Hu.
QoS-Aware In-Network Processing for Mission-Critical Wireless Cyber-Physical Systems Qiao Xiang Advisor: Hongwei Zhang Department of Computer Science Wayne.
Secure Protocols for Behavior Enforcement Slides elaborated by Julien Freudiger and adapted by Jean-Pierre Hubaux Note: this chapter.
SECURITY-AWARE AD-HOC ROUTING FOR WIRELESS NETWORKS Seung Yi, Prasad Naldurg, Robin Kravets Department of Computer Science University of Illinois at Urbana-Champaign.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
A High-Throughput Path Metric for Multi-Hop Wireless Routing Presenter: Gregory Filpus Slides borrowed and modified from: Douglas S. J. De Couto MIT CSAIL.
Improving Capacity and Flexibility of Wireless Mesh Networks by Interface Switching Yunxia Feng, Minglu Li and Min-You Wu Presented by: Yunxia Feng Dept.
Truthful and Non-Monetary Mechanism for Direct Data Exchange I-Hong Hou, Yu-Pin Hsu, and Alex Sprintson.
A High-Throughput Path Metric for Multi-Hop Wireless Routing Douglas S. J. De Couto, Daniel Aguayo, John Bicket, Robert Morris MIT Computer Science and.
A High-Throughput Path Metric for Multi-Hop Wireless Routing Douglas S. J. De Couto MIT CSAIL (LCS) Daniel Aguayo, John Bicket, and Robert Morris
Link Estimation, CTP and MultiHopLQI. Learning Objectives Understand the motivation of link estimation protocols – the time varying nature of a wireless.
1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida.
Fault-Tolerant Papers Broadband Network & Mobile Communication Lab Course: Computer Fault-Tolerant Speaker: 邱朝螢 Date: 2004/4/20.
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.
On Designing Incentive-Compatible Routing and Forwarding Protocols in Wireless Ad-Hoc Networks ---- An Integrated Approach Using Game Theoretical and Cryptographic.
A High-Throughput Path Metric for Multi- Hop Wireless Routing Douglas S. J. De Couto, Daniel Aguayo, John Bicket, Robert Morris MIT Computer Science and.
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
The 2014 APSIPA ASC Conference December 9-12, 2014, Siem Reap, city of Angkor Wat, Cambodia Improved Cross-Layer Cooperative MAC Protocol for Wireless.
A High-Throughput Path Metric for Multi-Hop Wireless Routing Douglas S. J. De Couto, Daniel Aguayo, John Bicket, Robert Morris MIT CSAIL Presented by Valentin.
KAIS T High-throughput multicast routing metrics in wireless mesh networks Sabyasachi Roy, Dimitrios Koutsonikolas, Saumitra Das, and Y. Charlie Hu ICDCS.
Exploitation of Path Diversity in Cooperative Multi-Hop Wireless Networks Dissertation Committee Department of Electrical and Computing Engineering University.
SenProbe: Path Capacity Estimation in Wireless Sensor Networks Tony Sun, Ling-Jyh Chen, Guang Yang M. Y. Sanadidi, Mario Gerla.
Performance Validation of Mobile IP Wireless Networks Presented by Syed Shahzad Ali Advisor Dr. Ravi Pendse.
Trading Coordination For Randomness Szymon Chachulski Mike Jennings, Sachin Katti, and Dina Katabi.
CSR: Cooperative Source Routing Using Virtual MISO in Wireless Ad hoc Networks IEEE WCNC 2011 Yang Guan, Yao Xiao, Chien-Chung Shen and Leonard Cimini.
Distributed Network Coding Based Opportunistic Routing for Multicast Abdallah Khreishah, Issa Khalil, and Jie Wu.
1 UFlood: High-Throughput Wireless Flooding Jayashree Subramanian Collaborators: Robert Morris, Ramakrishna Gummadi, and Hari Balakrishnan.
Optimization Problems in Wireless Coding Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
Mitigating Congestion in Wireless Sensor Networks Bret Hull, Kyle Jamieson, Hari Balakrishnan MIT Computer Science and Artificial Intelligence Laborartory.
Trading Structure for Randomness in Wireless Opportunistic Routing Szymon Chachulski, Michael Jennings, Sachin Katti and Dina Katabi MIT CSAIL SIGCOMM.
Efficient Geographic Routing in Multihop Wireless Networks Seungjoon Lee*, Bobby Bhattacharjee*, and Suman Banerjee** *Department of Computer Science University.
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks Zhao, J.; Cao, G. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 鄭宇辰
12.Nov.2007 Capacity of Ad Hoc Wireless Networks Jinyang Li Charles Blake Douglas S. J. De Coutu Hu Imm Lee Robert Morris Paper presentation by Tonio Gsell.
Enforce Collaboration in Mobile Ad Hoc Network Ning Jiang School of EECS University of Central Florida
Richard Alimi, L. Erran Li, Ramachandran Ramjee, Harish Viswanathan, Y
Universal Opportunistic Routing Scheme using Network Coding
Localized Scheduling for End-to-End Delay
A High-Throughput Path Metric for Multi-Hop Wireless Routing
ExOR:Opportunistic Multi-Hop Routing For Wireless Networks
ExOR: Opportunistic Multi-hop routing for Wireless Networks
Presentation transcript:

Incentive-Compatible Opportunistic Routing for Wireless Networks Fan Wu, Tingting Chen, Sheng Zhong (SUNY Buffalo) Li Erran Li Li Erran Li (Bell Labs) Yang Richard Yang Yang Richard Yang (Yale University) Fan Wu Speaker: Fan Wu

Motivation User-contributed wireless mesh networks –Low cost –Unpredictable and lossy wireless links From

Motivation (cont’) Opportunistic routing emerged to improve throughput, e.g., –ExOR (Biswas and Morris [2005]) –MORE (Chachulski et. al. [2007]) SRD LLP = 0.4 LLP: Link Loss Probability LLP = 0.8 ENT: Expected Number of Transmissions ENT = 1.18 LLP = 0.4 ENT = 1.47 p1p1 p2p2 p1p1 p2p2 p 1 +p 2 p1p1 p2p2

Motivation (cont’) Selfish behavior may reduce performance –Free-rider problem –Adverse selection problem SRD LLP = 0.1 ↓ LLP: Link Loss Probability LLP = 0.8 ENT: Expected Number of Transmissions ENT = 0.78 ↓ LLP = 0.4 ENT = 1.47

Motivation (cont’) Existing incentive mechanisms are mainly based on shortest path routing Need to design incentive-compatible routing protocols so that each user node participates in opportunistic routing honestly

Objective Develop incentive compatible techniques that can be integrated with a wide class of opportunistic routing protocols A basic opportunistic routing protocol: –collects link states and then –computes a forwarding behavior profile for user nodes

Basic Opportunistic Routing Protocol Source Node, S –Divides traffic into batches of packets –Keeps sending coded packets in current batch –Moves to next batch if acknowledged Intermediate Node, i –Broadcasts a coded packet if needed –Targets expected number of transmissions z i : ε i,j : loss probability on link (i, j) Destination Node, D –Decodes received packets –Sends acknowledgments

Issues Issue 1: Motivating Honest Reporting Issue 2: Motivating Honest Measuring

Issue: Motivating Honest Reporting Ideal scenario: Each node i reports the loss probabilities of its outgoing links Reality: Without proper incentive, node i may not report its link loss probabilities honestly

Techniques to Motivate Honest Reporting We design a routing protocol, such that reporting loss probabilities truthfully is the best strategy of each node Techniques: We influence the strategies of the players by introducing –an auxiliary transmission and –a carefully designed payment formula

Motivating Honest Reporting: Auxiliary Transmission For each packet that a node i should forward, it is required to send an auxiliary traffic of size z* i,j to each node j  V p α is a very small constant ε’ i,j is the reported loss probability on link (i,j)

Motivating Honest Reporting: Payment Formula L is the packet length –covers the cost of packet transmissions –covers the cost of auxiliary transmissions (We assume that transmitting a packet of size 1 has one unit of cost.)

Why Auxiliary Transmission and the Payment Formula? Utility: Get maximized when

ACK How does the protocol work? S A D B ε’ A,D, ε’ A,B ε’ B,D, ε’ B,A z’ A, z* A,D, z* A,B z’ B, z* B,D, z* B,A ACK pApA pBpB AUX

Motivating Honest Reporting: Analysis –Theorem: It is a strictly dominant strategy equilibrium for all player nodes to truthfully report loss probabilities. Strictly Dominant Strategy Equilibrium: The equilibrium strategy is strictly better than any other strategy for each node regardless of other nodes’ behaviors.

Two Steps Step 1: Motivating Honest Reporting Step 2: Motivating Honest Measuring

Issue: Cheating in Measurements Practical scenario: A node needs the cooperation (feedback) of its neighbors to measure link loss probabilities Dishonest feedback may allow one node to cheat its neighbors in order to raise its own utility

Techniques to Achieve Truthful Measurements We design an enhanced routing protocol, such that truthfully measuring the loss probabilities is to the best interest of each node Techniques: We influence the strategies of the players by carefully designing –measurement (test) signals and –a payment formula (Auxiliary transmission is the same as before.)

Measurement Signaling –Each node i sends n t measurement signals –Format of measurement signal: k S,i is a secret key shared by S and i MAC is a cryptographic Message Authentication Code function –Each node forwards measurement signals using traditional routing protocol –If n i,j measurement signals are received, then

Payment Covering Measurements Payment Formula: –covers the cost of packet transmissions –covers the cost of auxiliary transmissions –prevents dropping measurement signals

TEST_1 TEST_2 TEST_n BA … How does the enhanced protocol work? S A D B z’ A, z* A,D, z* A,B z’ B, z* B,D, z* B,A ACK pApA pBpB AUX TEST_1 TEST_2 TEST_n DA … TEST_1 TEST_2 TEST_n DB … AUX TEST_1 TEST_2 TEST_n AB … TEST_1 TEST_2 TEST_n AD … TEST_1 TEST_2 TEST_n BD …

Motivating Truthful Measurements: Analysis –Theorem: There is a strict Nash equilibrium for all player nodes to behave honestly in sending test signals and forwarding the received test signals. –Theorem: The above equilibrium is the only strict Nash equilibrium in the system. Strict Nash Equilibrium: Unilaterally deviating from the equilibrium strategy will hurt a player’s utility.

Evaluation Setup Real implementation and tests on the ORBIT testbed 25 nodes b ad hoc mode Trans. power 20 dBm Bit-rate 11Mbps MORE batch size 32 Packet size 1500 bytes Loss prob. 24%~100% Session length 30 s α=0.1 β=0.05

Evaluation Setup Node Behavior: –Honest behavior: Each node follows our protocol faithfully –Cheating behavior: Misreporting link loss probabilities in the simple extension; Sending incorrect number of measurement signals and Dropping others’ measurement signals in the enhanced extension

Cheating Behavior and Node Utility Simple extension Utilities obtained by node 18 Enhanced extension Utilities obtained by node 11  Utilities obtained by honest reporting and cheating randomly

Cheating Behavior and Node Utility  Utilities obtained by applying various strategies Simple extensionEnhanced extension

Impacts on End-to-End Throughput  Average throughput as a function of the number of hops on the path Simple extension Up to 33.2% (58.0%) gain when 20% (40%) cheating Enhanced extension Up to 13.7% (23.4%) gain when 20% (40%) cheating

Miscellaneous Overhead: –Average auxiliary transmissions: KB –Average data transmitted: 3.93 MB –Ratio: 0.66% Auxiliary payment: –Ratio between auxiliary payment and total payment –Simple extension: 0.23% –Enhanced extension: 1.20%

Conclusion We study incentives in opportunistic routing and provide first solutions. We present a simple and practical protocol to guarantees that it is a strict dominant strategy for each user node to behave honestly. We also design an enhanced protocol to prevent cheating in measuring loss probabilities. We implement and evaluate our protocols on the ORBIT lab. The experimental results show that our protocols can bring the system throughput achieved by opportunistic routing protocols back to the high level.

Thank you!