A Reputation Based Scheme for Stimulating Cooperation Aruna Balasubramanian, Joy Ghosh and Xin Wang University at Buffalo (SUNY), Buffalo, NY {ab42, joyghosh,

Slides:



Advertisements
Similar presentations
June 4, 2004 A Robust Reputation System for P2P and Mobile Ad-hoc Networks Sonja Buchegger 1 A Robust Reputation System for P2P and Mobile Ad-hoc Networks.
Advertisements

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Security in Mobile Ad Hoc Networks Security Protocols and Applications Seminar Rudi Belotti, Frank Lyner April 29, 2003.
Collaborative Attacks on Routing Protocols in Ad hoc Networks Neelima Gupta University of Delhi India.
MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur Nitin H. Vaidya University of Illinois at Urbana-Champaign.
EPFL, Lausanne, Switzerland Márk Félegyházi Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks – the Static Case Márk Félegyházi.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
DARWIN: Distributed and Adaptive Reputation Mechanism for Wireless Ad- hoc Networks CHEN Xiao Wei, Cheung Siu Ming CSE, CUHK May 15, 2008 This talk is.
Dealing with Selfish and Malicious Nodes in Ad Hoc Networks.
Incentive-Compatible Opportunistic Routing for Wireless Networks Fan Wu, Tingting Chen, Sheng Zhong (SUNY Buffalo) Li Erran Li Li Erran Li (Bell Labs)
Counter-measuring MAC Misbehaviors in Ad Hoc Networks using Game Theory March 25, 2010 EE5723 – Computer & Network Security.
Stimulation for Cooperation in Ad Hoc Networks: Beyond Nuglets Levente Buttyán, Jean-Pierre Hubaux, and Naouel Ben Salem Swiss Federal Institute of Technology.
Duke Selfish MAC Layer Misbehavior in Wireless Networks Author: Pradeep Kyasanur and Nitin H. Vaidya Some slides are borrowed from the author and others.
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks By Sergio Marti, T.J. Giuli, Kevin Lai, & Mary Baker Department of Computer Science Stanford University.
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
Using Game Theory to Analyze Wireless Ad Hoc networks Vivek Srivastava March 24 th 2004 Qualifier presentation.
A Probabilistic Misbehavior Detection Scheme towards Efficient Trust Establishment in Delay-tolerant Networks Haojin Zhu, Suguo Du, Zhaoyu Gao, Mianxiong.
fine-grained reputation-based routing in wireless ad hoc networks
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference.
PORT: A Price-Oriented Reliable Transport Protocol for Wireless Sensor Networks Yangfan Zhou, Michael. R. Lyu, Jiangchuan Liu † and Hui Wang The Chinese.
MAC Layer (Mis)behaviors Christophe Augier - CSE Summer 2003.
Joint Multi-Access and Routing as a Stochastic Game for Relay Channel Yalin Evren Sagduyu, Anthony Ephremides Objective and Motivation * Objective: Analyze.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Mitigating routing misbehavior in ad hoc networks Mary Baker Departments of Computer Science and.
CS541 Advanced Networking 1 Dynamic Channel Assignment and Routing in Multi-Radio Wireless Mesh Networks Neil Tang 3/10/2009.
Trust Level Based Self-Organized Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi 12/3/2002.
Motivating Corporation in Mobile Ad Hoc Networks: A Step Forward
Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly Designed by Yao Zhao.
Cyclex An Efficient Cheating-Resistant MAC Protocol Jim Pugh Mentors: Imad Aad, Mario Čagalj, Prof. Jean-Pierre Hubaux.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Performance Analysis of Reputation-based Mechanisms for Multi-hop Wireless Networks Fabio Milan Dipartimento di Elettronica Politecnico di Torino Turin,
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Selective Forwarding Attack: Detecting Colluding Nodes in Wireless Mesh Networks Shankar Karuppayah National Advanced IPv6 Centre (NAv6) Universiti Sains.
Effect of Intrusion Detection on Reliability Jin-Hee Cho, Member, IEEE, Ing-Ray Chen, Member, IEEE, and Phu-Gui Feng IEEE TRANSACTIONS ON RELIABILITY,
Seminar on Internetworking: Routing - from baseline to state-of-the-art Topic proposals Zheng Yan Nokia Research Center
Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks Sonja Buchegger Jean-Yves Le Boudec.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
MAC Protocols and Security in Ad hoc and Sensor Networks
1 Power Control for Distributed MAC Protocols in Wireless Ad Hoc Networks Wei Wang, Vikram Srinivasan, and Kee-Chaing Chua National University of Singapore.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
VIRTUAL ROUTER Kien A. Hua Data Systems Lab School of EECS University of Central Florida.
Secure Protocols for Behavior Enforcement Slides elaborated by Julien Freudiger and adapted by Jean-Pierre Hubaux Note: this chapter.
Securing Every Bit: Authenticated Broadcast in Wireless Networks Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zarko Milosevic, and Calvin Newport.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Fuzzy Trust Recommendation Based on Collaborative Filtering for Mobile Ad-hoc Networks Junhai Luo 1,2, Xue Liu 1, Yi Zhang 3,Danxia Ye 2,Zhong Xu 1 1 McGill.
K. Banerjee, P. Basuchaudhuri, D. Sadhukhan and N. Das
Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks” IEEE Communications.
1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
Converge-Cast: On the Capacity and Delay Tradeoffs Xinbing Wang Luoyi Fu Xiaohua Tian Qiuyu Peng Xiaoying Gan Hui Yu Jing Liu Department of Electronic.
BLACK HOLE ATTACK AND ITS COUNTER MEASURES IN AODV ROUTING PROTOCOL Varsha Patidar, Rakesh Verma Mengfei Peng.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks Sergio Marti, T.J. Giuli, Kevin.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Nour KADI, Khaldoun Al AGHA 21 st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications 1.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
1 A Power Control MAC Protocol for Ad Hoc Networks EUN-SUN JUNG, NITIN H. VAIDYA, Wireless Networks 11, 55–66, Speaker: Han-Tien Chang.
Dealing with Liars: Misbehavior Identification via Rényi-Ulam Games William Kozma Jr., and Loukas Lazos Dept. of Electrical and Computer Engineering University.
A Novel Coalitional Game Model for Security Issues in Wireless Networks Xiaoqi LiMichael Lyu Computer Science and Engineering Department The Chinese University.
Enforce Collaboration in Mobile Ad Hoc Network Ning Jiang School of EECS University of Central Florida
ITIS 6010/8010 Wireless Network Security
Dhruv Gupta EEC 273 class project Prof. Chen-Nee Chuah
Cross-layer Analysis for detecting Wireless Misbehavior
Presentation transcript:

A Reputation Based Scheme for Stimulating Cooperation Aruna Balasubramanian, Joy Ghosh and Xin Wang University at Buffalo (SUNY), Buffalo, NY {ab42, joyghosh,

Outline Problem definition Related Research Our Solution: Reputation based solution for stimulating cooperation  Reputation System  Monitoring System  Cooperation System  Security System Conclusions References

Problem definition: Ad hoc network characteristics Wireless links Self organized network Communication between A and B using C: Multihop C B A C routes packets for A and B Lack of central authority to coordinate routing

Problem definition: Non cooperation Non cooperation: Phenomenon when nodes in the network refuse to cooperate in providing network services. E.g. Routing Non cooperation in routing manifested by dropping packet Environment (lack of central control, existence of implicit trust) increases challenges in isolating non- cooperative nodes If a large percentage of nodes do not cooperate in routing, the network throughput is considerably reduced Stimulating nodes to cooperate is important to ensure optimum network utilization

Problem definition: Reasons for Non cooperation Node Rational malicious Malicious Selfish Genuine Resource Constraint Irrationally malicious

Related Research Using Incentive Management schemes [1], [2], [3]  Maintain credit system  Give credit to nodes that cooperate  Give incentive to nodes that have a good credit  Incentive: Providing network services such as routing Punishment based schemes [4], [5], [6]  Identify nodes that misbehave (do not cooperate)  Punish misbehaving nodes  Punishment: Not providing network service such as routing Game theoretical approaches [7] Useful in analyzing the cooperation solution

Related Research: Limitations

Our solution: Both rewards well behaved nodes and punishes non cooperation REPUTATION SYSTEM: Calculates reputation MONITOR SYSTEM Monitors neighbors nodes for packet dropping and forwarding COOPERATION SYSTEM Punish nodes with low reputation Give incentive to nodes with high reputation Use reputation of node to ensure reliability SECURITY SYSTEM Ensures the security of all the components COMPONENTS Distribute reputation to neighbors Reputation reports from neighbors

Reputation System Reputation: Goodness of a node as perceived by its neighbors Reputation increased for good behavior at the rate of α Reputation decreased for bad behavior at the rate of β New node has neutral reputation If Reputation < Threshold, node is punished Common problems of reputation systems  High α: Node builds up reputation faster and misbehaves for prolonged time  Low α: Not enough incentive  High β: Genuine node that drops packets due to network failure will be punished  Low β: Takes a longer time for misbehaving nodes to be punished

Reputation System (Contd…) To solve this, in our solution, α and β are chosen carefully according to the network characteristics The reputation is not reduced or increased linearly, but as a function of the node’s current reputation and the number of packets dropped/forwarded  Smaller the reputation, smaller is the number of packets that are dropped to reduce reputation  Larger the reputation, more is the number of packets that need to be forwarded to increase the reputation Reputation value is changed cumulatively, at regular intervals, and not every time a packet is dropped or forwarded

Monitoring System Neighbor monitors nodes to check if node forwards packets B A C A transmits packet (sent by B) to C B listens to this transmission because of omni-directional antenna If B does not hear its packet being transmitted for a while, it assumes that the A has dropped it A’s reputation is re- calculated

Monitoring System (Contd…) Reputation calculation based on own observation alone may not be sufficient B A C If B cooperation with A, but has no transaction with C, C will not know the real characteristic of B Every node distributes its reputation to all neighbor nodes, to ensure that all nodes have a consistent view about each other

Monitoring System (Contd…) Every node calculate reputation as a weighted mean of its own observation and the neighbor reports Weights given to a neighbor report is proportional to how much the neighbor is trusted A receives reputation report of B, from C and D B A C D B’s reputation A has three reputation of B (including its own), Rep AB, Rep CB and Rep DB Weight given to reputation report of C by A = Reputation of C with A, Rep AC / (Rep AB + Rep CB + Rep DB ) Weight given by A to its own reputation = Ut (Maximum reputation) A calculates the reputation of B as a weighted mean

Monitoring System (Contd…) Common problems with monitoring systems Distribution of false reputation reports by malicious neighbors  In our solution, false reputation reports are given less weight and thus their effect will not be significant Incorrect monitoring, when packets are dropped due to congestion or collision  We implement a mechanism to identify congestion  Incorrect penalty due to incorrect monitoring is reduced considerably due to our tolerance scheme

Cooperation System: Penalty If the neighbor node has reputation lower than a threshold  Do not forward any packet for this neighbor  Re route packets, if the next hop is the misbehaving neighbor Common problem with cooperation systems is the inability of a repentant node to rejoin the network  We provide alternate protocols for repentant nodes to rejoin the network  Idle protocol: Node finishes penalty time and joins the network with neutral reputation  Redeem protocol: Node participates in forwarding packets, and can start sending its own packets when its reputation increases to the neutral reputation

Cooperation System: Incentive Intermediate nodes prioritize packets based on the reputation of source and destination Source sends first packet with the certificate of the source and destination SourceDestination Packet1 Cert 1 Cert 2 Packet 2 Packet n Intermediate nodes stores certificate Intermediate nodes prioritize subsequent packets based on the reputation of the source/destination Certificate certifies the reputation of a node by a trusted person

Security System Leaving the neighborhood to avoid punishment Certification Decentralized Certificate provided by the neighboring nodes themselves Using threshold cryptography Thus a new node may either be genuine, or be a node with low reputation from a different neighborhood Use route reply from others to identify a malicious node from a different neighborhood

References 1) L. Buttyan and J.-P. Hubaux. Enforcing Service Availability in Mobile Ad-Hoc WANs. In Proceedings of the IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), Boston, August ) Hubaux, J., Gross, T., Le Boudec, J., Vetterli, M. Towards self-organized mobile ad hoc networks: The Terminodes project. IEEE Communications Magazine, (January 2001). 3) S. Zhing, J. Chen and Y.R. Yang, “SPRITE: A Simple, Cheat-Proof Credit-based System for Mobile Ad hoc Networks”, in Proceedings of IEEE INFOCOM ‘’03, San Fransesco, CA, April ) S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Sixth annual ACM/IEEE International Conference on Mobile Computing and Networking, 2000, pp ) S. Buchegger and J. Le Boudec. Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks. In Proceedings of the Tenth Euromicro Workshop on Parallel, , Canary Islands, Spain, January IEEE Computer Society. 6) P.Michiardi and R.Molva, “CORE: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad hoc Networks,” in Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security. Kluwer, B.V., 2002, pp ) V.Srinivasa, P.Nuggehalli and C.Chiasserini, “Cooperation in Wireless Ad hoc Networks” in Proceedings of IEEE INFOCOM ‘’03, San Fransesco, CA, April 2003.