Performance Analysis of Reputation-based Mechanisms for Multi-hop Wireless Networks Fabio Milan Dipartimento di Elettronica Politecnico di Torino Turin,

Slides:



Advertisements
Similar presentations
A DISTRIBUTED CSMA ALGORITHM FOR THROUGHPUT AND UTILITY MAXIMIZATION IN WIRELESS NETWORKS.
Advertisements

PATH SELECTION AND MULTIPATH CONGESTION CONTROL BY P. KEY, L. MASSOULIE, AND D. TOWSLEY R02 – Network Architectures Michaelmas term, 2013 Ulku Buket Nazlican.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 10: Selfishness in packet.
EPFL, Lausanne, Switzerland Márk Félegyházi Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks – the Static Case Márk Félegyházi.
DARWIN: Distributed and Adaptive Reputation Mechanism for Wireless Ad- hoc Networks CHEN Xiao Wei, Cheung Siu Ming CSE, CUHK May 15, 2008 This talk is.
Game Theory “Доверяй, Но Проверяй” - Russian Proverb (Trust, but Verify) - Ronald Reagan Mike Shor Lecture 6.
Incentive-Compatible Opportunistic Routing for Wireless Networks Fan Wu, Tingting Chen, Sheng Zhong (SUNY Buffalo) Li Erran Li Li Erran Li (Bell Labs)
Counter-measuring MAC Misbehaviors in Ad Hoc Networks using Game Theory March 25, 2010 EE5723 – Computer & Network Security.
Queuing Network Models for Delay Analysis of Multihop Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute.
Resource Allocation in Wireless Networks: Dynamics and Complexity R. Srikant Department of ECE and CSL University of Illinois at Urbana-Champaign.
DYNAMIC POWER ALLOCATION AND ROUTING FOR TIME-VARYING WIRELESS NETWORKS Michael J. Neely, Eytan Modiano and Charles E.Rohrs Presented by Ruogu Li Department.
XPRESS: A Cross-Layer Backpressure Architecture for Wireless Multi-Hop Networks Rafael Laufer, Theodoros Salonidis, Henrik Lundgren, Pascal Le Guyadec.
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
Selfish Behavior and Stability of the Internet: A Game-Theoretic Analysis of TCP Presented by Shariq Rizvi CS 294-4: Peer-to-Peer Systems.
MAC Layer (Mis)behaviors Christophe Augier - CSE Summer 2003.
Joint Multi-Access and Routing as a Stochastic Game for Relay Channel Yalin Evren Sagduyu, Anthony Ephremides Objective and Motivation * Objective: Analyze.
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.
Low Delay Marking for TCP in Wireless Ad Hoc Networks Choong-Soo Lee, Mingzhe Li Emmanuel Agu, Mark Claypool, Robert Kinicki Worcester Polytechnic Institute.
1 Efficient Retrieval of User Contents in MANETs Marco Fiore, Claudio Casetti, Carla-Fabiana Chiasserini Dipartimento di Elettronica, Politecnico di Torino,
TOPIC 6 REPEATED GAMES The same players play the same game G period after period. Before playing in one period they perfectly observe the actions chosen.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
The Impact of Multihop Wireless Channel on TCP Throughput and Loss Presented by Scott McLaren Zhenghua Fu, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia.
Performance Enhancement of TFRC in Wireless Ad Hoc Networks Mingzhe Li, Choong-Soo Lee, Emmanuel Agu, Mark Claypool and Bob Kinicki Computer Science Department.
Opportunistic Packet Scheduling and Media Access Control for Wireless LANs and Multi-hop Ad Hoc Networks Jianfeng Wang, Hongqiang Zhai and Yuguang Fang.
On Multi-Path Routing Aditya Akella 03/25/02. What is Multi-Path Routing?  Dynamically route traffic Multiple paths to a destination Path taken dependant.
Enhancing TCP Fairness in Ad Hoc Wireless Networks Using Neighborhood RED Kaixin Xu, Mario Gerla University of California, Los Angeles {xkx,
Mobile Ad hoc Networks COE 549 Delay and Capacity Tradeoffs II Tarek Sheltami KFUPM CCSE COE 8/6/20151.
TCP Behavior across Multihop Wireless Networks and the Wired Internet Kaixin Xu, Sang Bae, Mario Gerla, Sungwook Lee Computer Science Department University.
Distributed Quality-of-Service Routing of Best Constrained Shortest Paths. Abdelhamid MELLOUK, Said HOCEINI, Farid BAGUENINE, Mustapha CHEURFA Computers.
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
Performance Evaluation and Improvement of an Ad Hoc Wireless Network Takayuki Yamamoto Graduate School of Engineering Science, Osaka University, Japan.
1 IEEE Trans. on Smart Grid, 3(1), pp , Optimal Power Allocation Under Communication Network Externalities --M.G. Kallitsis, G. Michailidis.
A Cooperative Diversity- Based Robust MAC Protocol in wireless Ad Hoc Networks Sangman Moh, Chansu Yu Chosun University, Cleveland State University Korea,
1 Optimal Power Allocation and AP Deployment in Green Wireless Cooperative Communications Xiaoxia Zhang Department of Electrical.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya University of Illinois.
EE360 PRESENTATION On “Mobility Increases the Capacity of Ad-hoc Wireless Networks” By Matthias Grossglauser, David Tse IEEE INFOCOM 2001 Chris Lee 02/07/2014.
1 Core-PC: A Class of Correlative Power Control Algorithms for Single Channel Mobile Ad Hoc Networks Jun Zhang and Brahim Bensaou The Hong Kong University.
1 Performance Analysis of Coexisting Secondary Users in Heterogeneous Cognitive Radio Network Xiaohua Li Dept. of Electrical & Computer Engineering State.
1 Heterogeneity in Multi-Hop Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign © 2003 Vaidya.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
A High-Throughput Path Metric for Multi-Hop Wireless Routing Douglas S. J. De Couto, Daniel Aguayo, John Bicket, Robert Morris MIT Computer Science and.
Michael J. Neely, University of Southern California CISS, Princeton University, March 2012 Wireless Peer-to-Peer Scheduling.
A Power Saving MAC Protocol for Wireless Networks Technical Report July 2002 Eun-Sun Jung Texas A&M University, College Station Nitin H. Vaidya University.
1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida.
Congestion Control in CSMA-Based Networks with Inconsistent Channel State V. Gambiroza and E. Knightly Rice Networks Group
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.
CROSS-LAYER OPTIMIZATION PRESENTED BY M RAHMAN ID:
1 Performance Analysis of the Distributed Coordination Function under Sporadic Traffic joint work with C.-F. Chiasserini (Politecnico di Torino)
Vertical Optimization Of Data Transmission For Mobile Wireless Terminals MICHAEL METHFESSEL, KAI F. DOMBROWSKI, PETER LANGENDORFER, HORST FRANKENFELDT,
Providing End-to-End Delay Guarantees for Multi-hop Wireless Sensor Networks I-Hong Hou.
End-to-End Performance and Fairness in Multihop Wireless Backhaul Networks V. Gambiroza, B. Sadeghi, and E. Knightly Rice University.
A Power Assignment Method for Multi-Sink WSN with Outage Probability Constraints Marcelo E. Pellenz*, Edgard Jamhour*, Manoel C. Penna*, Richard D. Souza.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Competitive Scheduling in Wireless Networks with Correlated Channel State Ozan.
Hangguan Shan, Member, IEEE, Ho Ting Cheng, Student Member, IEEE, and Weihua Zhuang, Fellow, IEEE Cross-Layer Cooperative MAC Protocol in Distributed Wireless.
Illinois Center for Wireless Systems Wireless Networks: Algorithms and Optimization R. Srikant ECE/CSL.
Stretchable Architectures for Next Generation Cellular Networks Presented By Shashidhar Lakkavalli, Ansuya Negi and Dr. Suresh Singh Portland State University.
Performance Improvement in Ad hoc Wireless Networks with Consideration to Packet Duplication Takayuki Yamamoto Department of Informatics and Mathematical.
Mitigating Congestion in Wireless Sensor Networks Bret Hull, Kyle Jamieson, Hari Balakrishnan MIT Computer Science and Artificial Intelligence Laborartory.
Courtesy Piggybacking: Supporting Differentiated Services in Multihop Mobile Ad Hoc Networks Wei LiuXiang Chen Yuguang Fang WING Dept. of ECE University.
Tango1 Considering End-to-End QoS Constraints in IP Network Design and Planning M.Ajmone Marsan, M. Garetto, E. Leonardi. M. Mellia, E. Wille Dipartimento.
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
ProbeCast: MANET Admission Control via Probing Soon Y. Oh, Gustavo Marfia, and Mario Gerla Dept. of Computer Science, UCLA Los Angeles, CA 90095, USA {soonoh,
MAC Protocols for Sensor Networks
Design and implementation of
Environment-Aware Reputation Management for Ad Hoc Networks
Game Theory in Wireless and Communication Networks: Theory, Models, and Applications Lecture 2 Bayesian Games Zhu Han, Dusit Niyato, Walid Saad, Tamer.
The Impact of Multihop Wireless Channel on TCP Performance
Hemant Kr Rath1, Anirudha Sahoo2, Abhay Karandikar1
Javad Ghaderi, Tianxiong Ji and R. Srikant
Presentation transcript:

Performance Analysis of Reputation-based Mechanisms for Multi-hop Wireless Networks Fabio Milan Dipartimento di Elettronica Politecnico di Torino Turin, Italy Juan José Jaramillo and R. Srikant Coordinated Science Laboratory Dept. of Electrical and Computer Engineering University of Illinois at Urbana-Champaign {jjjarami,

March 22, 2006CISS 2006, Princeton, NJ, USA2 Outline Problem Formulation Cooperation without Collisions Cooperation with Collisions Performance Analysis

March 22, 2006CISS 2006, Princeton, NJ, USA3 Packet Forwarding ABC +α+α–β–β When B forwards a packet for A, node A gains α units and node B loses β units due to energy expenditure

March 22, 2006CISS 2006, Princeton, NJ, USA4 Utility u i = βp i – αp -i α is the packet value β is the transmission cost p i is the dropping probability of node i p -i is the dropping probability of the neighbor of node i βp i is the gain of dropping packets from the neighbor αp -i is the loss for packets being dropped by the neighbor

March 22, 2006CISS 2006, Princeton, NJ, USA5 Utility Payoff of mutual cooperation0 Payoff of mutual defectionβ – α Packet value is greater than transmission cost Mutual cooperation is preferable to mutual defection

March 22, 2006CISS 2006, Princeton, NJ, USA6 It’s a Prisoner’s Dilemma Each node drops all packets to maximize its utility The Nash Equilibrium is Individual selfishness leads to zero throughput In multi-hop wireless networks, packet relaying requires cooperation Need for mechanisms to sustain cooperation among selfish nodes p i * = p -i * = 1

March 22, 2006CISS 2006, Princeton, NJ, USA7 Incentives for Cooperation Micro-payments Reputation-based Mechanisms –End-to-end –Hop-by-hop With Information Exchange Without Information Exchange –Advantages »No Control Overhead »Collusion Resistance »Full Decentralization –Disadvantages »Performance Degradation due to Packet Collisions

March 22, 2006CISS 2006, Princeton, NJ, USA8 Outline Problem Formulation Cooperation without Collisions Cooperation with Collisions Performance Analysis

March 22, 2006CISS 2006, Princeton, NJ, USA9 Reputation-based Mechanism Nodes take into account the effect of their actions on their future payoff The weight of the k-th future payoff is δ k δ is the discount parameter 0 ≤ δ ≤ 10 ≤ δ ≤ 1 Nodes play a Repeated Game δ is the probability to continue to play after each stage

March 22, 2006CISS 2006, Princeton, NJ, USA10 Tit-for-tat Cooperate on the first move, then do what the opponent did in the previous move p i (0) = 0 p i (k) = p -i (k-1) k > 0

March 22, 2006CISS 2006, Princeton, NJ, USA11 One-step Deviation If both nodes cooperate, their payoff is 0. Assume that node i deviates, by setting a dropping probability p>0 –Node i initially benefits from this deviation –As the neighbor reacts, node i suffers packet losses –Node i reacts to the punishment by punishing its neighbor –… The discounted payoff of i in case of deviation is a function of α, β, δ and p If it is not greater than 0, then being the first to defect is not rational

March 22, 2006CISS 2006, Princeton, NJ, USA12 Equilibrium Deviation from Tit-for-tat is not profitable if If δ is sufficiently large, the outcome is mutual cooperation If transmission cost is close to packet value, then cooperation emerges only if the users are farsighted or stay in the system for a very long time

March 22, 2006CISS 2006, Princeton, NJ, USA13 Outline Problem Formulation Cooperation without Collisions Cooperation with Collisions Performance Analysis

March 22, 2006CISS 2006, Princeton, NJ, USA14 The Hidden Terminal is Back BCDE – α– α–β–β A When D forwards a packet from C to E, interference may prevent C to hear this transmission C does not know if D is cooperating or not

March 22, 2006CISS 2006, Princeton, NJ, USA15 Perceived Defection Packet collisions with “hidden terminals” result in a distorted reputation Estimate of neighbor’s dropping probability: either cannot “hear” neighbors transmission due to another neighbor’s transmission ( ) or can hear and neighbor drops a relay packet

March 22, 2006CISS 2006, Princeton, NJ, USA16 Queueing Model λ Dropped Traffic ∞ Generated Traffic Transit Traffic Infinite Backlog, no end-to-end Congestion Control A node always transmits, within the MAC constraints: either it transmits its own packet or a relay packet The network load λ is independent of the dropping probabilities if

March 22, 2006CISS 2006, Princeton, NJ, USA17 Tit-for-tat Cooperate on the first move, then do what you believe the opponent did in the previous move p i (0) = 0

March 22, 2006CISS 2006, Princeton, NJ, USA18 Retaliation Due to collisions, simple Tit-for-tat is not sufficient to sustain cooperation p λ Tit-for-tat Perceived Defection Even if nodes initially cooperate, unjust punishment of perceived defection progressively leads to zero throughput

March 22, 2006CISS 2006, Princeton, NJ, USA19 Generous Tit-for-tat p λ Perceived Defection Add a tolerance threshold to mitigate throughput loss The optimal tolerance to avoid both retaliation and exploitation is λ

March 22, 2006CISS 2006, Princeton, NJ, USA20 Generous Tit-for-tat p i (0) = 0 Cooperate on the first move, then cooperate more than what you believe the opponent did in the previous move

March 22, 2006CISS 2006, Princeton, NJ, USA21 Equilibrium Deviation from Generous Tit-for-tat is not profitable if If δ is sufficiently large, the outcome is mutual cooperation Need an even larger δ now due to imperfect knowledge of neighbor’s actions

March 22, 2006CISS 2006, Princeton, NJ, USA22 Outline Problem Formulation Cooperation without Collisions Cooperation with Collisions Performance Analysis

March 22, 2006CISS 2006, Princeton, NJ, USA23 Game Parameters λ is a measure of the network load, if every node transmits at the same rate δ is a measure of the session length –If a session involves a great number of packets, it is reasonable to assume δ → 1 α is a measure of the information contained in a packet, with respect to the overall information flow transferred from source to destination –For a multimedia stream source, tolerant to packet losses, the packet value is small. For a file transfer source, the packet value is high. β is a measure of the energy spent to transmit a packet, with respect to the total energy available to the node –For a terminal connected to the AC power, the transmission cost is low. For a terminal running out of battery, the transmission cost is high.

March 22, 2006CISS 2006, Princeton, NJ, USA24 Throughput Upper Bound 0 Cooperative Nodes Selfish Nodes Throughput Offered Load Beyond this critical threshold, nodes perceive no incentive to cooperate

March 22, 2006CISS 2006, Princeton, NJ, USA25 Packet Value Lower Bound 1/3 The capacity of a wireless network is limited (Gupta – Kumar, 2000) If α is sufficiently large, there exists a value of δ that achieves cooperation for every feasible load

March 22, 2006CISS 2006, Princeton, NJ, USA26 Conclusion Developed a game-theoretic framework to evaluate the performance of hop- by-hop reputation-based mechanisms for multi-hop wireless network, in presence of packet collisions with “hidden terminals” Explored the conditions for the emergence of cooperation in a network of selfish users, in terms of network load, session length, application type and energy constraints Ongoing work: How does the network topology affects the conditions for the emergence of cooperation? Ongoing work: Simulation experiments to study how the externalities introduced by an end-to-end congestion control affect the stability of the mechanism As for now, our model suggests that if nodes use Skype™ while running out of battery, then they are unlikely to cooperate…

March 22, 2006CISS 2006, Princeton, NJ, USA27 Thank You!