fine-grained reputation-based routing in wireless ad hoc networks

Slides:



Advertisements
Similar presentations
June 4, 2004 A Robust Reputation System for P2P and Mobile Ad-hoc Networks Sonja Buchegger 1 A Robust Reputation System for P2P and Mobile Ad-hoc Networks.
Advertisements

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Conceptual Framework for Dynamic Trust Monitoring and Prediction Olufunmilola Onolaja Rami Bahsoon Georgios Theodoropoulos School of Computer Science The.
Detecting MAC Layer Back-off Timer Violations in Mobile Ad Hoc Networks Venkata Nishanth Lolla, Lap Kong Law, Srikanth V. Krishnamurthy, Chinya Ravishankar,
EPFL, Lausanne, Switzerland Márk Félegyházi Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks – the Static Case Márk Félegyházi.
DARWIN: Distributed and Adaptive Reputation Mechanism for Wireless Ad- hoc Networks CHEN Xiao Wei, Cheung Siu Ming CSE, CUHK May 15, 2008 This talk is.
Stimulation for Cooperation in Ad Hoc Networks: Beyond Nuglets Levente Buttyán, Jean-Pierre Hubaux, and Naouel Ben Salem Swiss Federal Institute of Technology.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
Delay and Throughput in Random Access Wireless Mesh Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department Rensselaer Polytechnic Institute (RPI)
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks By Sergio Marti, T.J. Giuli, Kevin Lai, & Mary Baker Department of Computer Science Stanford University.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
Using Game Theory to Analyze Wireless Ad Hoc networks Vivek Srivastava March 24 th 2004 Qualifier presentation.
Secure and Trustworthy Data Management for Vehicular Cyber Physical Systems Dr. Wenjia Li Assistant Professor in Computer Science New York Institute of.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Jorge Hortelano, Juan Carlos Ruiz, Pietro Manzoni
1 SOWER: Self-Organizing Wireless Network for Messaging Márk Félegyházi {mark.felegyhazi, srdan.capkun, Srdjan Čapkun Jean-Pierre.
Ad-Hoc Networking Course Instructor: Carlos Pomalaza-Ráez D. D. Perkins, H. D. Hughes, and C. B. Owen: ”Factors Affecting the Performance of Ad Hoc Networks”,
Secure communication in cellular and ad hoc environments Bharat Bhargava Department of Computer Sciences, Purdue University This is supported.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.
Mitigating routing misbehavior in ad hoc networks Mary Baker Departments of Computer Science and.
Trust Level Based Self-Organized Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi 12/3/2002.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 3: Trust assumptions and.
A Reputation Based Scheme for Stimulating Cooperation Aruna Balasubramanian, Joy Ghosh and Xin Wang University at Buffalo (SUNY), Buffalo, NY {ab42, joyghosh,
By Onolaja Olufunmilola. Overview Introduction Motivation Trust, reputation and misbehaivour Literature review DDDAS Model description Applications Evaluation.
An Architecture for Dynamic Trust Monitoring in Mobile Networks Onolaja Olufunmilola, Rami Bahsoon, Georgios Theodoropoulos School of Computer Science.
Motivating Corporation in Mobile Ad Hoc Networks: A Step Forward
Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Vikram Kanodia.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
A Cross Layer Approach for Power Heterogeneous Ad hoc Networks Vasudev Shah and Srikanth Krishnamurthy ICDCS 2005.
Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks Sonja Buchegger Jean-Yves Le Boudec.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 Trust Mechanisms in Ad Hoc Networks Azar Rahimi Dehaghani Lei Hu Trust and Security Case Study 2.
VIRTUAL ROUTER Kien A. Hua Data Systems Lab School of EECS University of Central Florida.
EAIT, February 2006 A Pragmatic Approach towards the Improvement of Performance of Ad Hoc Routing ProtocolsOptimizations To Multipath Routing Protocols.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Fuzzy Trust Recommendation Based on Collaborative Filtering for Mobile Ad-hoc Networks Junhai Luo 1,2, Xue Liu 1, Yi Zhang 3,Danxia Ye 2,Zhong Xu 1 1 McGill.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
Presentation of Wireless sensor network A New Energy Aware Routing Protocol for Wireless Multimedia Sensor Networks Supporting QoS 王 文 毅
KAIS T High-throughput multicast routing metrics in wireless mesh networks Sabyasachi Roy, Dimitrios Koutsonikolas, Saumitra Das, and Y. Charlie Hu ICDCS.
High-integrity Sensor Networks Mani Srivastava UCLA.
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks Sergio Marti, T.J. Giuli, Kevin.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Ahmad Salam AlRefai.  Introduction  System Features  General Overview (general process)  Details of each component  Simulation Results  Considerations.
Hongkun Li, Yu Cheng, Chi Zhou Illinois Institute of Technology, Chicago, IL, USA IEEE GLOBECOM 2008.
Hierarchical Trust Management for Wireless Sensor Networks and Its Applications to Trust-Based Routing and Intrusion Detection Wenhai Sun & Ruide Zhang.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
By Jannatul Ferdousi M.TECH(MCNT) Roll no GNIT With guidance of Mr.Dipankar.
Power-Aware Topology Control for Wireless Ad-Hoc Networks Wonseok Baek and C.-C. Jay Kuo Department of Electrical Engineering University of Southern California.
A Novel Coalitional Game Model for Security Issues in Wireless Networks Xiaoqi LiMichael Lyu Computer Science and Engineering Department The Chinese University.
Enforce Collaboration in Mobile Ad Hoc Network Ning Jiang School of EECS University of Central Florida
Presented by Edith Ngai MPhil Term 3 Presentation
Recommendation Based Trust Model with an Effective Defense Scheme for ManetS Adeela Huma 02/02/2017.
Giannis F. Marias, Vassileios Tsetsos,
Wenjia Li Anupam Joshi Tim Finin May 18th, 2010
Cross-layer Analysis for detecting Wireless Misbehavior
A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks IEEE Infocom
Presentation transcript:

fine-grained reputation-based routing in wireless ad hoc networks Alma Cemerlic Department of Computer Science and Engineering Master Thesis Defense

outline Introduction Related work Our methodology Wireless ad hoc network Motivation of the study Definition of terms Related work Our methodology Fine-grained reputation system Integration with a wireless routing protocol Simulation and evaluation Conclusion

wireless ad hoc network characteristics (1) Ad hoc mode No base stations Nodes can only transmit to other nodes within link coverage Nodes organize themselves into a network – route among themselves

wireless ad hoc network characteristics (2) No infrastructure support Limited resources (power, memory, and processing) Easily eavesdropped Naïve trust model Examples Hostile environments like battlefields or rescue operations

motivation of the study Most legacy models of wireless ad hoc routing do not consider security and use hop count as a measure of path cost. We explore reliability of each node to improve the quality of service and security. An approach to routing which incorporates security (reputation) of nodes into legacy routing metrics

routing based on fine-grained reputation system Basic idea: Route packets through nodes with high reputation values Protect network traffic from misbehaving nodes Improve effective throughput Minimize interaction with misbehaving nodes Solution Evaluate reputation of each node Integrate reputation metric into route selection

definition of terms and assumptions (1) Neighbors – communication range of two nodes overlaps. Neighborhood – all neighbors Behavior – the way that a node handles packet forwarding, i.e. correctly forwards, alters, injects, etc. Reputation – evaluated through observation of a neighbors’ behavior. Report – reputation information periodically exchanged among neighbor nodes. Trust – indicates whether reports coming from a particular node can be considered trustworthy.

definition of terms and assumptions (2) Bidirectional communication on every link Many wireless Medium Access Control (MAC) layer protocols require bidirectional communication for reliable transmission Network interfaces on the nodes support promiscuous mode operation If a node A is within range of node B, it can overhear all communications to and from B

adversary models Adversaries are nodes that misbehave in such ways that they degrade integrity and availability of the network Misbehaviors include: Packet alternation and injection done by malicious nodes when they are supposed to forward packets for other nodes Packet dropping done by selfish nodes when they are supposed to forward packets for other nodes

related work Use forwarding behavior of a node to estimate its reliability. Nodes categorized as good or bad (Beta Reputation System) Distinguishing between selfish and malicious behavior is not possible CONFIDANT (Buchegger 2002a), CORE (Michiardi 2002a), SORI (Wang 2004b), SAFE (Rebahi 2005) Virtual currency in wireless routing Packet Purse Model Packet Trade Model Nugglets (Buttyan 2001), (Wang 2004a), (Jakobsson 2003)

fine-grained reputation system “Self-organized system” Decentralized, cooperation cannot be guaranteed Reputation systems – “soft security” Stimulate ethical behavior and integrity of members in collaborative environments; recognize and sanction intolerable behavior, reward obedient members Each node observes behavior and evaluates reputation of its neighbors Neighbors exchange reputation information Reputation is used to select the most reliable and secure path from source to destination

fine-grained reputation classification based on node behavior Friendly Selfish Malicious Friendly Nodes Correctly forward packets; expected behavior Selfish Nodes Drop packets; expect other nodes to route their packets; Physical properties (battery, overload), attempt to save resources, random failure Harm availability of the network Malicious Nodes Misroute, alter, or inject packets; Harm integrity of packets If behavior changes, node’s reputation changes correspondingly.

fine-grained reputation evaluation Total Reputation is the combination of first-hand and second-hand reputation First-hand reputation from direct observation of neighbors’ behavior Second-hand reputation from neighbors’ reports

first-hand reputation (1) Each node observes the forwarding behavior of its neighbors: Packets may be correctly forwarded, dropped, maliciously modified. A node’s behavior follows the Dirichlet distribution Dir(α), where α = (α1, … , αn) Conjugate prior to the Multinomial distribution The probability that each independent trial result is exactly one of some fixed finite number n of possible outcomes with probabilities p1,…, pn Bayes Theorem Allows us to incorporate new observation into prior knowledge and obtain posterior probability of node’s behavior.

first-hand reputation (2) Combine the Dirichlet distribution and Bayes Theorem Given the prior the posterior distribution is calculated as Starting with the initial state of the prior distribution, the parameters are updated when new data D is available N represents instances of the new data First-hand reputation value at a time t is equal to the expectation value of Dir(α)

first-hand reputation - example Window Number of observed packets α1 α2 α3 1 50 40 10 2 30 15 5 3 4 35 Total number of observed packets in windows 0-5 250 185 Expectation of Xi --- (185) / (250) = 0.74 (50) / (250) = 0.2 (15) / (250) =0.06 Behaviors of a node change from friendly to selfish and malicious.

second-hand reputation Collaborative monitoring : exchange first-hand reputation with the neighbors Nodes are required to periodically broadcast Deviation test – to detect false reports Increase or decrease trust? Incorporate the report into the total reputation value?

trust Indicates how trustworthy the neighbor’s reports are The same Bayesian approach as for the fine-grained reputation system Only two possible instances of behavior: trustworthy and not trustworthy Use the Beta distribution, conjugate prior to the Binomial distribution TAB ~ Beta(γ, δ), where γ = trustworthy, δ = not trustworthy. Updated when the results of the deviation test are available Trust value is calculated as:

total reputation value Merge first-hand and second-hand reputation information Second-hand reputation is discounted by the factor ω (trust value) expressing the disbelief in the accuracy of the report

total reputation value 5. Merge first-hand and second-hand reputation values to derive total reputation value RAB 1. Calculate first-hand reputation FAB based on observations. Reputation Calculation Reputation Report FCB 3. Deviation Test and Trust Threshold Test 2. Second-hand reputation reports. 4. Depending on the outcome of the deviation test and the trust threshold test, decide whether to accept the second-hand reports. Reputation Report FDB Observation Windows Trust Table 6. Update trust value for the reporters C and D: ωAC and ωAD. depending on the outcome of the deviation test.

moving window mechanism Two ways to update first-hand information Based on all observations Based on the most recent observations Reduces computational complexity Early detection of changes in behavior Possibility of redemption over time for misbehaving nodes To calculate first-hand information: We divide historic information into time intervals of equal size and considered only a limited number of the most recent intervals

moving window mechanism - example Number of observed packets α1 α2 α3 1 50 2 3 40 10 4 5 Windows 0-5 Total number of observed packets in windows 0-5 250 220 30 Mode of Xi --- (220) / (250) = 0.88 (0) / (250) = 0 (30) / (250) = 0.12 Windows 3-5 Total number of observed packets in windows 3-5 150 120 (120) / (150) = 0.8 (0)/ (150) = 0 (30) / (150) = 0.2 Reputation based on recent history better reflects changes in behavior

integrating reputation into ad hoc routing (1) Our fine-grained system classifies wireless nodes as friendly, selfish, or malicious. Malicious nodes cause more damage than selfish nodes. Reputation of each node is denoted by a vector containing friendly, selfish and malicious parameters (f, s, and m). Each node consider reputation of neighbor nodes to route packets. <0.8, 0.2, 0.0> B A D C <0.9, 0.1, 0.1>

integrating reputation into ad hoc routing (2) Cost function converts a reputation vector <f,s,m> into a cost value used to determine most reliable path: where Malicious nodes cause more damage than selfish nodes – therefore b<c Routing when there is no distinction between selfish and malicious behavior: Fine-grained reputation system Beta reputation system

integrating reputation into ad hoc routing (3) Moving window size Determines the sensitivity of the system Allows gradual redemption

simulation and evaluation (1) 50 nodes are placed on 800m by 800m stage Data packets emission rate is 50 packets/second Low mobility – static All nodes are connected Random sender-destination pairs Adobe Flash CS3, in AS3.0 Graphical and interactive capabilities Support for OO programming Platform independence and portability

simulation and evaluation (2) Evaluation Metrics Effective throughput Percentage of packets manipulated by malicious nodes Connectivity of the network Compare fine-grained reputation system with Beta system – classify nodes into friendly or selfish Beta system – classify nodes into friendly or malicious

simulation - scenarios Same scenarios tested on all three systems Selfish nodes – drop approx. 20% packets Malicious nodes – inject approx. 20% packets Number of misbehaving nodes varies form 4 – 40% of the population (add a reference about 40%)

results (1) Effective throughput The ratio of legitimate traffic and total traffic, where legitimate means that the traffic was not produced as a consequence of the malicious activity Our system shows highest effective throughput over beta systems

results (2) Percentage of packets manipulated by malicious nodes Our system shows lowest percentage of packets manipulated by malicious nodes.

results (3) Connectivity: average cost for nodes to communicate with each other. Our system shows higher connectivity over beta (malicious) system Our system show slight lower connectivity over beta (selfish) system. But the increased connectivity in latter system is used to carry malicious traffic, which is indicated by lower effective throughput in beta (selfish system).

results - conclusion Random communication, 10% misbehaving on every 50 packets forwarded Effective throughput Beta malicious vs. <f,s,m> 2.84% increase Beta selfish vs. <f,s,m> 2.5% increase Percentage of malicious packets Beta malicious vs. <f,s,m> 2.76% decrease Beta selfish vs. <f,s,m> 2.49% decrease Connectivity (over 40% set) Beta malicious vs. <f,s,m> 9.55% increase Beta selfish vs. <f,s,m> 10.56% decrease

Fine-grained reputation system Beta (selfish) reputation system Beta (malicious) reputation system Effective Throughput HIGH LOW MEDIUM Percentage of packets manipulated by malicious nodes Connectivity

CONTRIBUTION Proposed a novel solution to evaluating and managing reputation and trust in P2P environment. Integrated reputation management into wireless ad hoc routing. Defended wireless ad hoc network against misbehaving nodes. Implemented and evaluated fine-grained reputation system in application of wireless ad hoc routing Our system performs better than the Beta reputation systems: higher effective throughput and less packets manipulated by malicious nodes

references Buchegger, S., Le Boudec, J. (2002). Performance analysis of the CONFIDANT protocol: Cooperation Of Nodes – Fairness In Dynamic Ad-hoc NeTworks. IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), Lausanne, Switzerland. Buchegger, S., Mundinger, J., Le Boudec, J. (2008). Reputation systems for self-organized networks: lessons learned. IEEE Technology and Society Magazine, Special Issue on Limits of Cooperation in Wireless Communications. Buttyan, L., Hubaux, J. (2001). Nuglets: a virtual currency to stimulate cooperation in self-organized ad hoc networks. Lausanne, Switzerland, Institute for Computer Communications and Applications, Swiss Federal Institute of Technology. Jakobsson, M., Hubaux, J., Buttyan, L. (2003). A micro-payment scheme encouraging collaboration in multi-hop cellular networks. Proceedings of Financial Crypto, La Guadeloupe. Michiardi, P., Molva, R. (2002a). CORE: A COllaborative Reputation mEchanism to enforce node cooperation in mobile ad hoc networks. The IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security. Rebahi, Y., Mujica, V. E., Simons, C., Sisalem, D. (2005). SAFE: Securing pAcket Forwarding in ad hoc nEtworks. 5th Workshop on Applications and Services in Wireless Networks. Paris, France. Wang, W., Li, X., Wang, Y. (2004a). Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. MobiCom '04, San Diego (CA), ACM. Wang, Y., Giruka, V. C., Singhal, M. (2004b). A fair distributed solution for selfish nodes problem in wireless ad hoc networks. Ad-Hoc, Mobile, and Wireless Networks, Springer Berlin / Heidelberg. 3158: 211-224. Yang, L., Kizza, J.M., Cemerlic, A., Liu, F. (2007). Fine-grained reputation-based routing in wireles ad hoc networks. IEEE International Conference on Intelligence and Security Informatics, New Brunswick, NY, IEEE. Yang, L., Novobilski, A, Ege, R. (2008). Trust-based usage control in collaborative environment. The International Journal of Information Security and Privacy 2(2).

questions?