Counter-measuring MAC Misbehaviors in Ad Hoc Networks using Game Theory March 25, 2010 EE5723 – Computer & Network Security.

Slides:



Advertisements
Similar presentations
Supporting Cooperative Caching in Disruption Tolerant Networks
Advertisements

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
P: 1 / 24 Situated and Autonomic Communications FET Integrated Project CASCADAS ( Mécanismes de sécurité et de coopération entre.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 10: Selfishness in packet.
Collaboration Mechanisms in SOA based MANETs. Introduction Collaboration implies the cooperation between the nodes to support the proper functioning of.
MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur Nitin H. Vaidya University of Illinois at Urbana-Champaign.
EPFL, Lausanne, Switzerland Márk Félegyházi Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks – the Static Case Márk Félegyházi.
DARWIN: Distributed and Adaptive Reputation Mechanism for Wireless Ad- hoc Networks CHEN Xiao Wei, Cheung Siu Ming CSE, CUHK May 15, 2008 This talk is.
Dealing with Selfish and Malicious Nodes in Ad Hoc Networks.
Incentive-Compatible Opportunistic Routing for Wireless Networks Fan Wu, Tingting Chen, Sheng Zhong (SUNY Buffalo) Li Erran Li Li Erran Li (Bell Labs)
Stimulation for Cooperation in Ad Hoc Networks: Beyond Nuglets Levente Buttyán, Jean-Pierre Hubaux, and Naouel Ben Salem Swiss Federal Institute of Technology.
21-23 November, 2012, 5th IDCS, Wu Yi Shan, China Smartening the Environment using Wireless Sensor Networks in a Developing Country Presented By Al-Sakib.
An Introduction to... Evolutionary Game Theory
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
Duke Selfish MAC Layer Misbehavior in Wireless Networks Author: Pradeep Kyasanur and Nitin H. Vaidya Some slides are borrowed from the author and others.
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks By Sergio Marti, T.J. Giuli, Kevin Lai, & Mary Baker Department of Computer Science Stanford University.
Using Game Theoretic Approach to Analyze Security Issues In Ad Hoc Networks Term Presentation Name: Li Xiaoqi, Gigi Supervisor: Michael R. Lyu Department:
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
Using Game Theory to Analyze Wireless Ad Hoc networks Vivek Srivastava March 24 th 2004 Qualifier presentation.
A Probabilistic Misbehavior Detection Scheme towards Efficient Trust Establishment in Delay-tolerant Networks 1 Haojin Zhu Zhaoyu Gao Mianxiong Dong Zhenfu.
A Probabilistic Misbehavior Detection Scheme towards Efficient Trust Establishment in Delay-tolerant Networks Haojin Zhu, Suguo Du, Zhaoyu Gao, Mianxiong.
An Energy Efficient Hierarchical Heterogeneous Wireless Sensor Network
NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference.
Lecture 1 - Introduction 1.  Introduction to Game Theory  Basic Game Theory Examples  Strategic Games  More Game Theory Examples  Equilibrium  Mixed.
Dynamic Tuning of the IEEE Protocol to Achieve a Theoretical Throughput Limit Frederico Calì, Marco Conti, and Enrico Gregori IEEE/ACM TRANSACTIONS.
Joint Multi-Access and Routing as a Stochastic Game for Relay Channel Yalin Evren Sagduyu, Anthony Ephremides Objective and Motivation * Objective: Analyze.
Peering in Infrastructure Ad hoc Networks Mentor : Linhai He Group : Matulya Bansal Sanjeev Kohli EE 228a Course Project.
Mitigating routing misbehavior in ad hoc networks Mary Baker Departments of Computer Science and.
Pricing What Can Pricing Do In Wireless Networks? Jianning Mai and Lihua Yuan
NCKU CSIE CIAL1 Principles and Protocols for Power Control in Wireless Ad Hoc Networks Authors: Vikas Kawadia and P. R. Kumar Publisher: IEEE JOURNAL ON.
Selfish Caching in Distributed Systems: A Game-Theoretic Analysis By Byung-Gon Chun et al. UC Berkeley PODC’04.
A Reputation Based Scheme for Stimulating Cooperation Aruna Balasubramanian, Joy Ghosh and Xin Wang University at Buffalo (SUNY), Buffalo, NY {ab42, joyghosh,
Motivating Corporation in Mobile Ad Hoc Networks: A Step Forward
Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly Designed by Yao Zhao.
Dynamic Network Security Deployment under Partial Information George Theodorakopoulos (EPFL) John S. Baras (UMD) Jean-Yves Le Boudec (EPFL) September 24,
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Performance Analysis of Reputation-based Mechanisms for Multi-hop Wireless Networks Fabio Milan Dipartimento di Elettronica Politecnico di Torino Turin,
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
A Game-Theoretic Look at Joint Multi-Access, Power and Rate Control Yalin Evren Sagduyu, Anthony Ephremides Objective and Motivation * Objective: Analyze.
Budhaditya Pyne BEE-IV Roll No: Jadavpur University.
By: Gang Zhou Computer Science Department University of Virginia 1 A Game-Theoretic Framework for Congestion Control in General Topology Networks SYS793.
Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks Sonja Buchegger Jean-Yves Le Boudec.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
VIRTUAL ROUTER Kien A. Hua Data Systems Lab School of EECS University of Central Florida.
Secure Protocols for Behavior Enforcement Slides elaborated by Julien Freudiger and adapted by Jean-Pierre Hubaux Note: this chapter.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
On Designing Incentive-Compatible Routing and Forwarding Protocols in Wireless Ad-Hoc Networks ---- An Integrated Approach Using Game Theoretical and Cryptographic.
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks Sergio Marti, T.J. Giuli, Kevin.
Illinois Center for Wireless Systems Wireless Networks: Algorithms and Optimization R. Srikant ECE/CSL.
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
Optimization Problems in Wireless Coding Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
Eunyoung Chang 1 CS 6204 Mobile Computing.  Problem  Proposed Approaches  COMMIT Approaches  THE SYSTEM MODEL  The COMMIT Protocol  Protocol Analysis.
Risk-Aware Mitigation for MANET Routing Attacks Submitted by Sk. Khajavali.
Denial of Service Resilience in Ad Hoc Networks (MobiCom 2004) Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly November 21 th, 2006 Jinkyu Lee.
Doc.: IEEE /2200r2 Submission July 2007 Sandesh Goel, Marvell et alSlide 1 Route Metric Proposal Date: Authors:
SYNERGY: A Game-Theoretical Approach for Cooperative Key Generation in Wireless Networks Jingchao Sun, Xu Chen, Jinxue Zhang, Yanchao Zhang, and Junshan.
A Novel Coalitional Game Model for Security Issues in Wireless Networks Xiaoqi LiMichael Lyu Computer Science and Engineering Department The Chinese University.
Enforce Collaboration in Mobile Ad Hoc Network Ning Jiang School of EECS University of Central Florida
Route Metric Proposal Date: Authors: July 2007 Month Year
Contents of the Talk Preliminary Materials Motivation and Contribution
11b Game Theory Must Know / Outcomes:
Environment-Aware Reputation Management for Ad Hoc Networks
Mobile ad hoc networking: imperatives and challenges
Game Theory in Wireless and Communication Networks: Theory, Models, and Applications Lecture 2 Bayesian Games Zhu Han, Dusit Niyato, Walid Saad, Tamer.
Route Metric Proposal Date: Authors: July 2007 Month Year
Presentation transcript:

Counter-measuring MAC Misbehaviors in Ad Hoc Networks using Game Theory March 25, 2010 EE5723 – Computer & Network Security

Presentation Outline I.Big Picture Topic Introduction II.Game Theory Brief Overview III.Applications in Ad Hoc Networks IV.Other Potential Approaches V.Additional Considerations & Critiques VI.Presentation Conclusions VII.Questions & Comments

Big Picture Topic Introduction Selfish behavior at the MAC layer can have devastating side effects on performance of wireless networks Communication protocols were designed under the assumption that all nodes would obey given specifications What happens when these protocols are implemented in an environment that is not trusted?

Big Picture Topic Introduction Nodes can deviate from the protocol specifications in order to obtain a given goal – at the expense of honest participants A selfish user can disobey the rules to access the wireless channel to obtain a higher throughput Change the congestion avoidance parameters Refuse to forward packets on behalf of other sources

Big Picture Topic Introduction Misbehaving nodes will degrade the performance of the network How should one go about addressing these issues? Focus on the prevention and detection of unfairness and collision of packets  Catch as soon as possible and punish

Game Theory Brief Overview [1] Branch of applied mathematics Multi-person decision making situations Used to analyze existing systems -or- Used as a tool when designing new systems Implementation theory  Desired outcome is fixed and a game ending in that outcome is conjured  A system fulfilling the properties of the game can be implemented when a suitable game is discovered.

Game Theory Brief Overview [2] In-class simple Game Theory example  A “game” (or network, etc.) can be represented as a matrix  Can clearly become more complicated based on certain conditions (number of players, etc.) Other classical Game Theory examples include the Prisoner’s Dilemma & Battle of the Sexes

Game Theory Brief Overview [3] A “game” (or network) consists of:  Players (or nodes)  Possible actions of the players (or nodes)  Consequences of the actions Rational players are assumed to maximize their payoff – justified by von Neumann But humans don’t always act rationally…

Game Theory Brief Overview [4] Maximizing one’s payoff = selfishness  All players try to gain the highest utility Model behavior with suitable utility function  Keep track of benefit of the player as well as benefit relative to the other players By modeling these trends, one can come up with a solution to a game

Game Theory Brief Overview [5] Definition: A solution to a game is a set of the possible outcomes Pure strategies vs. mixed strategies What is one solution to our in-class example?

Applications in Ad Hoc Networks [1] Game theoretic protocols assume all nodes are selfish (worst case scenario) What is the ideal goal with this approach?  Design distributed protocols that guarantee for each node, the existence of an equilibrium solution with an acceptable throughput

Applications in Ad Hoc Networks [2] Game with an honest node The network offers to forward the traffic of the node in exchange for forwarding effort c The node either accepts or rejects the offer Direct transmission or routed transmission? If the node uses network resources, it should contribute to the routing - participation requires contribution c

Applications in Ad Hoc Networks [3] If the node connects directly to the receiver, the transmission power is p d If the node uses the network’s resources, i.e. forwards the traffic through other nodes, the power is p r If c <= c 0 = p d - p r, the node transmits through the network, and otherwise it transmits directly The solution of the game is that the network requires contribution c 0 and the node participates in the network

Applications in Ad Hoc Networks [4] Game with a cheating node Network offers to forward traffic of the node in exchange for forwarding contribution c The node either cooperates or free-rides

Applications in Ad Hoc Networks [5] Game with a cheating node If the required contribution is more than c 0 the node cheats In a network with an opportunity to cheat, a too high request for contribution is more counter-productive  A cheating node consumes the resources of the network while it contributes nothing

Applications in Ad Hoc Networks [6] The Nash Equilibrium  Each player is assumed to know the equilibrium strategies of the other players  No player has anything to gain by changing only his or her own strategy to just one side  The current set of strategy choices and the corresponding payoffs constitute a Nash equilibrium  Does not necessarily mean the best cumulative payoff for all the players involved

Applications in Ad Hoc Networks [7] Note: “x” is the number of “cars” travelling via that edge.

Applications in Ad Hoc Networks [8] Game Analysis through simulation Study traffic of the network and determine whether a node benefits from joining the AHN using a game with an honest node as a basis The node makes the decision based on the expected energy savings and the expected forwarding effort required

Applications in Ad Hoc Networks [9] Determining the “loser”:  Determine the energy consumptions using direct connections  Determine the energy consumptions using the given routing method  Identify the losers by comparing the energy consumptions of the alternatives

Applications in Ad Hoc Networks [10]

Other Potential Approaches In order for an AHN to work, the nodes need to share their resources with others Mechanisms need to be in place to enforce cooperation in Ad Hoc Networks Game Theory is a preventative approach to handling misbehavior Current efforts against node misbehavior using detective & reactive approaches include…

Potential Approach - Watchdog Source: “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks” [7] Watchdog identifies misbehaving nodes and a path-rater helps routing protocols avoid these nodes  Approach increases network throughput, nodes dropping packets can be avoided

Potential Issues – Watchdog Approach does not prevent malicious or selfish nodes from operating – there are no sanctions for the misbehaving nodes

Potential Approach - Terminodes Source: NCCR MICS, [8] Terminodes Project – encourage cooperation in AHNs based on virtual currency called nuglets Each node contains a tamper-proof hardware module to handle the nuglets When a node forwards a packet, it gains a nuglet The sender has to pay nuglets needed to forward the packet through the network

Potential Issues – Terminodes A node in the center of the network may gain more nuglets than it needs  Incentive to drop part of the packets Nodes on the edges of the network may not gain enough nuglets to pay for their own traffic Situation balances if long time frames are studied and the nodes are mobile

Potential Approach – Traffic Pricing Source: “Modeling Incentives for Collaboration in Mobile Ad Hoc Networks” [10] Compensation of traffic forwarding depends on energy consumption of transmission and congestion level of relaying node Using same mechanism to enforce cooperation and balance traffic loads to avoid congestion

Potential Issues – Traffic Pricing Implementing such a mechanism may prove to be challenging Considerations The need for updating the link’s cost based on their bandwidth and power usage Investigate re-routing protocols that minimize the routing information that needs to be distributed in the network

Potential Approach – CONFIDANT Source: “Optimized Link State Routing Protocol” [11] Detects misbehavior and routes traffic around the misbehaving nodes, isolating them from the network Each node observes its neighborhood and reports misbehavior to the other nodes Reputation manager – maintains reputation information based on node’s observations Path manager – rejects network functions requested by misbehaving nodes Simulations demonstrate that the protocol performs well even if the fraction of selfish nodes is > 60%

Potential Approach – CORE Source: “Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation…” [12] Each node maintains a reputation table profiling other nodes Reputation value is updated based on the node’s own observations and information provided by other nodes If the reputation value drops below a threshold, the node does not provide the services requested by the misbehaving node – leads to isolation

Additional Considerations & Critiques All of the schemes presented above require the proper use of MAC layer authentication protocols – in order to prevent impersonation Reputation management system – layered security mechanism in order to provide an educated decision on how to react The user probably communicates with several nodes during the connection time

Presentation Conclusions [1] The use of Game Theory can be a very valuable tool when diagnosing a network Game theory has been used to analyze the cooperation of the nodes There exist various mechanisms designed to prevent selfishness and to enforce cooperation Game theoretic approaches try to analyze the problem using a more analytical viewpoint

Presentation Conclusions [2] A specific situation can be studied at different levels through theory and simulations  How the mechanisms effect overall functionality The faster a cheating node is detected and isolated from the network, the more effort can be demanded from it

Questions & Comments Any final questions or comments?

Resources Utilized [1] [1]Juha Leino, “Applications of Game Theory in Ad Hoc Networks” [2]Pietro Michiardi, Refik Molva, “Game Theoretic Analysis of Security in Mobile Ad Hoc Networks” [3]Allen B. MacKenzie, Stephen B. Wicker, “Selfish Users in Aloha: A Game- Theoretic Approach” [4]Alvaro A. Cardenas, Svetlana Radosavac, John S. Baras, “Detection and Prevention of MAC layer Misbehavior in Ad Hoc Networks” [5]Allen B. MacKenzie, Stephen B. Wicker, “Game Theory and Design of Self- Configuring, Adaptive Wireless Networks” [6]Jin, Tao, “Selfish MAC Misbehaviors in Wireless Networks” [7]S. Marti, T. J. Giuli, K. Lai, M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks” [8]National Center of Competence in Research, Mobile Information & Communication Systems,

Resources Utilized [2] [9]L. Blazevic, L. Buttyan, S. Capkun, S. Giordiano, J.-P. Hubaux, and J.-Y. Le Boudec. “Self-organization in Mobile Ad-Hoc Networks: The Approach of Terminodes” [10] J. Crowcroft, R. Gibbens, F. Kelly, and S. Östring. “Modeling Incentives for Collaboration in Mobile Ad Hoc Networks” [11] T. Clausen and P. Jacquet, “Optimized Link State Routing Protocol” [12] P. Michiardi and R. Molva, “Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks”