Motivating Corporation in Mobile Ad Hoc Networks: A Step Forward

Slides:



Advertisements
Similar presentations
Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network,
Advertisements

Security in Mobile Ad Hoc Networks
June 4, 2004 A Robust Reputation System for P2P and Mobile Ad-hoc Networks Sonja Buchegger 1 A Robust Reputation System for P2P and Mobile Ad-hoc Networks.
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Security in Mobile Ad Hoc Networks Security Protocols and Applications Seminar Rudi Belotti, Frank Lyner April 29, 2003.
Security Issues in Mobile Ad hoc Networks
P: 1 / 24 Situated and Autonomic Communications FET Integrated Project CASCADAS ( Mécanismes de sécurité et de coopération entre.
Collaborative Attacks on Routing Protocols in Ad hoc Networks Neelima Gupta University of Delhi India.
EPFL, Lausanne, Switzerland Márk Félegyházi Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks – the Static Case Márk Félegyházi.
Dealing with Selfish and Malicious Nodes in Ad Hoc Networks.
Counter-measuring MAC Misbehaviors in Ad Hoc Networks using Game Theory March 25, 2010 EE5723 – Computer & Network Security.
Stimulation for Cooperation in Ad Hoc Networks: Beyond Nuglets Levente Buttyán, Jean-Pierre Hubaux, and Naouel Ben Salem Swiss Federal Institute of Technology.
1/19 DIANE Project Philipp Obreiter, Birgitta König-Ries, Michael Klein Stimulating Cooperative Behavior of Autonomous.
802.11a/b/g Networks Herbert Rubens Some slides taken from UIUC Wireless Networking Group.
Ad hoc Networking Security: Solving Node Selfishness Problem
Bandwidth Management Framework for IP based Mobile Ad Hoc Networks Khalid Iqbal ( ) Supervisor: Dr. Rajan Shankaran ITEC810 June 05, 2009.
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks By Sergio Marti, T.J. Giuli, Kevin Lai, & Mary Baker Department of Computer Science Stanford University.
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
Using Game Theory to Analyze Wireless Ad Hoc networks Vivek Srivastava March 24 th 2004 Qualifier presentation.
fine-grained reputation-based routing in wireless ad hoc networks
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference.
MAC Layer (Mis)behaviors Christophe Augier - CSE Summer 2003.
Secure communication in cellular and ad hoc environments Bharat Bhargava Department of Computer Sciences, Purdue University This is supported.
Mitigating routing misbehavior in ad hoc networks Mary Baker Departments of Computer Science and.
1/16 DIANE Project Philipp Obreiter, Michael Klein Vertical Integration of Incentives for Cooperation Universität.
A Reputation Based Scheme for Stimulating Cooperation Aruna Balasubramanian, Joy Ghosh and Xin Wang University at Buffalo (SUNY), Buffalo, NY {ab42, joyghosh,
By Onolaja Olufunmilola. Overview Introduction Motivation Trust, reputation and misbehaivour Literature review DDDAS Model description Applications Evaluation.
An Architecture for Dynamic Trust Monitoring in Mobile Networks Onolaja Olufunmilola, Rami Bahsoon, Georgios Theodoropoulos School of Computer Science.
Issues in ad-hoc networks Miguel Sanchez Nov-2000.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
1 APPLICATION OF DDDAS FOR TRUSTED COMMUNICATION IN MOBILE NETWORKS. Onolaja Olufunmilola Supervisors: Dr Rami Bahsoon, Dr Georgios Theodoropoulos.
Network-layer Security of Mobile Ad hoc Networks Jiangyi Hu Advisor: Dr. Mike Burmester.
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
Seminar on Internetworking: Routing - from baseline to state-of-the-art Topic proposals Zheng Yan Nokia Research Center
Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks Sonja Buchegger Jean-Yves Le Boudec.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
Profiles and Multi-Topology Routing in Highly Heterogeneous Ad Hoc Networks Audun Fosselie Hansen Tarik Cicic Paal Engelstad Audun Fosselie Hansen – Poster,
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Fuzzy Trust Recommendation Based on Collaborative Filtering for Mobile Ad-hoc Networks Junhai Luo 1,2, Xue Liu 1, Yi Zhang 3,Danxia Ye 2,Zhong Xu 1 1 McGill.
Presented by: Nandhitha.M Under the guidance of: Mrs. Suma. R Associate profesor and Hod Dept of Computer Science and Engineering.
IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks C.-K. Chau, J. Crowcroft, K.-W. Lee, S. H.Y. Wong.
1 Mobile ad hoc networking with a view of 4G wireless: Imperatives and challenges Myungchul Kim Tel:
MANETS Justin Champion Room C203, Beacon Building Tel 3292,
1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad Hoc Networks Reporter: Yanlin Peng Wenrui Zhao, Mostafa Ammar, College of Computing,
MANET: Introduction Reference: “Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations”; S. Corson and J.
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks Sergio Marti, T.J. Giuli, Kevin.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Wireless Mesh Networks Myungchul Kim
Risk-Aware Mitigation for MANET Routing Attacks Submitted by Sk. Khajavali.
Dealing with Liars: Misbehavior Identification via Rényi-Ulam Games William Kozma Jr., and Loukas Lazos Dept. of Electrical and Computer Engineering University.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
A Novel Coalitional Game Model for Security Issues in Wireless Networks Xiaoqi LiMichael Lyu Computer Science and Engineering Department The Chinese University.
Enforce Collaboration in Mobile Ad Hoc Network Ning Jiang School of EECS University of Central Florida
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Enabling QoS Multipath Routing Protocol for Wireless Sensor Networks
Giannis F. Marias, Vassileios Tsetsos,
Mobile Ad hoc Network: Secure Issues In Multi-Hop Routing Protocols
Environment-Aware Reputation Management for Ad Hoc Networks
Mobile ad hoc networking: imperatives and challenges
ITIS 6010/8010 Wireless Network Security
Privacy Preservation and Protection Scheme over ALARM on Geographical routing B. Muthusenthil, S. Murugavalli Results The PPS is geographical routing protocol,
Cross-layer Analysis for detecting Wireless Misbehavior
A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks IEEE Infocom
Achieving Resilient Routing in the Internet
Presentation transcript:

Motivating Corporation in Mobile Ad Hoc Networks: A Step Forward Attiqa Rehman Syed Sajid Hussain Dr Sajjad Mohsin COMSATS Institute of Information Technology, Abbottabad, Pakistan

Presentation Plan 1 Description of MANET 2 Problem Statement 3 4 Techniques to Avoid Selfish Behavior 4 Reactive Techniques 5 Proactive Techniques 6 Problems In Existing Techniques 7 Proposed Solution Model 8 Expected Outcomes

Description of MANET Node Properties Autonomous Self Organizing Self Managed Works as a router as well Network Characteristics Wireless Media Infrastructure less Mobile Ad Hoc NetworkSource: http://www.dsta.gov.sg

Problem Statement Nodes belonging to Multiple Organization domains Not a single Goal to achieve as in military and emergency applications Multiple Administrative polices Limited energy resources Wish to capitalize the resource energy Going to Sleeping mode state Selfish behavior Decreasing network Throughput Degrading QoS Issue Addressed

Techniques to Avoid Selfish Behavior Reactive Techniques Detection then removal Watchdog and Pathrater[2] CONFIDANT[7,8,9] CORE[10] Proactive Techniques Avoid the occurrence Nuglet System[1]

Watchdog and Pathrater[2] Trust management No punishment for selfish nodes Increase QoS Enable safe path selection

CONFIDANT[7,8,9] Isolates misbehaving nodes COoperation of Nodes Fairness In Dynamic Ad hoc NeTworks Isolates misbehaving nodes Monitor for observing node behavior Path manager for nodes to adapt their behavior according to reputation

CORE[10] COllaborative REputation mechanism Subjective reputation Observation indirect reputation (positive reports by others) Functional Reputation Task specific behavior Weight for combined reputation Subjective Reputation Decision of isolation or gradual

Proactive Techniques Nuglets Algorithm[1] Nuglets to gain profit by routing for others Used to pay for sending node’s own packets Nuglets reside within a counter protected by Security Modules SM Incremented each time it forwards a packet for other nodes reduced by a multiple of hop count h each time the node wants to send a packet to destination h hops away

Problems In Nuglet Algorithm[1] Node in Dead State Node ran out of nuglets Only option: Buffer till got enough nuglets Real time system Sending a packet that is buffered for too much time is useless Drop packets Problems Increased Packet Drop Rate QoS Requirements We aim to provide a reasonable solution to this problem better than wait for sending or packet dropping.

Proposed Model A node can be removed from the dead state, by taking a loan from any other node. The loan is granted on some guarantee provided by the deprived to the lender node.

Bank Model Loan grant Loan payback Application for loan Provide guarantee Assess guarantee Assess bank’s monetary situation Negotiate interest rate and time Grant loan Loan payback Check if amount available Pay it back Otherwise increase interest rate

Bank Model Formally Stated

Proposed Algorithm

Pay Back Nuglet

Expected Outcomes Increase Corporation Increased Quality of service Decreased packet drop rate Increased Throughput of the Network

References L. Buttayan and J. P. Hubaux “Stimulating Cooperation in Self Organizing Mobile Ad hoc Networks” ACM/Kluwar Mobile Networks and Applications, 8(5), Oct 2003. S. Marti, T. J. Guili, K. Lai and M. Baker “Mitigating Routing Misbehavior in Mobile Ad hoc Networks” Proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking, Bostan, MA, 2001. I. Chlamtac, M. Conti and J. J. Liu “Mobile Ad hoc Networks: Imperatives and Challenges” Ad hoc Networks Vol. 1, No. 1 pp. 13-64, 2003. S. Corson, J. Freebersyser and A. Sastry “Mobile Networks and Applications (MONET)”, Special Issue on Mobile Ad hoc Networking, Oct 1999. S. Buchegger, J. L. Boudec “Cooperative Routing in Mobile Ad hoc Networks: Current Effort against Malice and Selfishness” Proceedings of Mobile Internet Workshop Informatik 2002, Dartmund, Germany, Oct 2002. S. Zhong, J. Chen, and Y. R. Yang “Sprite: A Simple Cheat-Proof, Credit Based System for Mobile Ad hoc Networks”, in Proceedings of IEEE INFOCOM 2003. S. Buchegger and J. L. Boudec “IBM Research Report: the Selfish Node Increasing Routing Security in Mobile Ad hoc Networks”, 2001. S. Buchegger and J. L. Boudec “Nodes Bearing Grudges Towards Routing Security, Fairness and Robustness in Mobile Ad hoc Networks” Proceedings of Tenth Euromicro on Parallel, Distributed and Network-based Processing” pp 403- 410 Canary Islands, Spain, Jan 2002. IEEE Computer Society. S. Buchegger and J. L. Boudec “Performance Analysis of CONFIDANT Protocol: Cooperation of Nodes- Fairness in Dynamic Ad hoc Networks” Proceedings of IEEE/ACM Symposium on Mobile Ad hoc Networks and Computing (MobiHOC), Laissane, CH, June 2002. P. Michiardi and R. Molva “CORE a Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad hoc Networks” Sixth IFIP Conference on Security Communications and Mulitimedia, Porotoroz, Solvania, 2002.

? Question Answers