Eunyoung Chang 1 CS 6204 Mobile Computing.  Problem  Proposed Approaches  COMMIT Approaches  THE SYSTEM MODEL  The COMMIT Protocol  Protocol Analysis.

Slides:



Advertisements
Similar presentations
Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network,
Advertisements

6.896: Topics in Algorithmic Game Theory Lecture 21 Yang Cai.
An Adaptive Compulsory Protocol for Basic Communication in Ad-hoc Mobile Networks Ioannis Chatzigiannakis Sotiris Nikoletseas April 2002.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 12: Secure protocols for.
Collaboration Mechanisms in SOA based MANETs. Introduction Collaboration implies the cooperation between the nodes to support the proper functioning of.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Computer Networking A Top-Down Approach Chapter 4.7.
EPFL, Lausanne, Switzerland Márk Félegyházi Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks – the Static Case Márk Félegyházi.
Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
DARWIN: Distributed and Adaptive Reputation Mechanism for Wireless Ad- hoc Networks CHEN Xiao Wei, Cheung Siu Ming CSE, CUHK May 15, 2008 This talk is.
Incentive-Compatible Opportunistic Routing for Wireless Networks Fan Wu, Tingting Chen, Sheng Zhong (SUNY Buffalo) Li Erran Li Li Erran Li (Bell Labs)
21-23 November, 2012, 5th IDCS, Wu Yi Shan, China Smartening the Environment using Wireless Sensor Networks in a Developing Country Presented By Al-Sakib.
Seminar In Game Theory Algorithms, TAU, Agenda  Introduction  Computational Complexity  Incentive Compatible Mechanism  LP Relaxation & Walrasian.
CS 603 Handling Failure in Commit February 20, 2002.
1 Algorithmic Game Theoretic Perspectives in Networking Dr. Liane Lewin-Eytan.
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
Bundling Equilibrium in Combinatorial Auctions Written by: Presented by: Ron Holzman Rica Gonen Noa Kfir-Dahav Dov Monderer Moshe Tennenholtz.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1/14 Ad Hoc Networking, Eli M. Gafni and Dimitri P. Bertsekas Distributed Algorithm for Generating Loop-free Routes in Networks With Frequently.
Lecture 1 - Introduction 1.  Introduction to Game Theory  Basic Game Theory Examples  Strategic Games  More Game Theory Examples  Equilibrium  Mixed.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
Joint Multi-Access and Routing as a Stochastic Game for Relay Channel Yalin Evren Sagduyu, Anthony Ephremides Objective and Motivation * Objective: Analyze.
Price of Anarchy, and Strategyproof Network Protocol Design Xiang-Yang Li Department of Computer Science Illinois Institute of Technology Collaborated.
Bottleneck Routing Games in Communication Networks Ron Banner and Ariel Orda Department of Electrical Engineering Technion- Israel Institute of Technology.
SECOND PART: Algorithmic Mechanism Design. Mechanism Design MD is a subfield of economic theory It has a engineering perspective Designs economic mechanisms.
Slide Set 15: IP Multicast. In this set What is multicasting ? Issues related to IP Multicast Section 4.4.
Vickrey Prices and Shortest Paths What is an Edge Worth? By John Hershberger and Subhash Suri Carlos Esparza and Devin Low 3/5/02.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mechanism Design Traditional Algorithmic Setting Mechanism Design Setting.
Spring Routing & Switching Umar Kalim Dept. of Communication Systems Engineering 06/04/2007.
A Cross Layer Approach for Power Heterogeneous Ad hoc Networks Vasudev Shah and Srikanth Krishnamurthy ICDCS 2005.
Mario Čagalj supervised by prof. Jean-Pierre Hubaux (EPFL-DSC-ICA) and prof. Christian Enz (EPFL-DE-LEG, CSEM) Wireless Sensor Networks:
Game-Theoretic Models for Reliable Path- Length and Energy-Constrained Routing With Data Aggregation -Rajgopal Kannan and S. Sitharama Iyengar Xinyan Pan.
01/16/2002 Reliable Query Reporting Project Participants: Rajgopal Kannan S. S. Iyengar Sudipta Sarangi Y. Rachakonda (Graduate Student) Sensor Networking.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
VIRTUAL ROUTER Kien A. Hua Data Systems Lab School of EECS University of Central Florida.
Secure Protocols for Behavior Enforcement Slides elaborated by Julien Freudiger and adapted by Jean-Pierre Hubaux Note: this chapter.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Scalable Routing Protocols for Mobile Ad Hoc Networks Xiaoyan Hong, Kaixin Xu, and Mario Gerla at UCLA.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
By Sylvia Ratnasamy, Andrey Ermolinskiy, Scott Shenker Presented by Fei Jia Revisiting IP Multicast.
Transit price negotiation: repeated game approach Sogea 23 Mai 2007 Nancy, France D.Barth, J.Cohen, L.Echabbi and C.Hamlaoui
Using Algorithmic Mechanism Design to Solve the Data Redistribution Problem with Non-Cooperative Sensor Nodes Andre Chen July 23, 2015.
Switching Techniques Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
Truthful and Non-Monetary Mechanism for Direct Data Exchange I-Hong Hou, Yu-Pin Hsu, and Alex Sprintson.
EILEEN BALCI GPSR: Greedy Perimeter Stateless Routing for Wireless Networks.
Group 3 Sandeep Chinni Arif Khan Venkat Rajiv. Delay Tolerant Networks Path from source to destination is not present at any single point in time. Combining.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
On Designing Incentive-Compatible Routing and Forwarding Protocols in Wireless Ad-Hoc Networks ---- An Integrated Approach Using Game Theoretical and Cryptographic.
On Reducing Broadcast Redundancy in Wireless Ad Hoc Network Author: Wei Lou, Student Member, IEEE, and Jie Wu, Senior Member, IEEE From IEEE transactions.
Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNs Presented by Zhongming Zheng.
Dynamic Routing in Mobile Ad Hoc Network 報告者:呂佐鴻 指導教授:李鴻璋.
“Controlled Straight Mobility and Energy-Aware Routing in Robotic Wireless Sensor Networks ” Rafael Falcon, Hai Liu, Amiya Nayak and Ivan Stojmenovic
Ad Hoc Multicast Routing
LOCALIZED MINIMUM - ENERGY BROADCASTING IN AD - HOC NETWORKS Paper By : Julien Cartigny, David Simplot, And Ivan Stojmenovic Instructor : Dr Yingshu Li.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
UNIT IV INFRASTRUCTURE ESTABLISHMENT. INTRODUCTION When a sensor network is first activated, various tasks must be performed to establish the necessary.
Tianyang Wang Tianxiong Yang Advanced Computer Networks Fall 2014 Modification of STC Algorithm.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
Fundamentals of Computer Networks ECE 478/578
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
2016/3/11 1 Data Link Layer. 2016/3/11 2 Two basic services of Data Link Allows the upper layers to access the media using techniques such as framing.
Dealing with Liars: Misbehavior Identification via Rényi-Ulam Games William Kozma Jr., and Loukas Lazos Dept. of Electrical and Computer Engineering University.
SECURE MANET ROUTING WITH TRUST INTRIGUE Prepared By: Aditya Kiran R.S Mangipudi Srikanth Gadde Varun Mannar.
An Efficient Routing Protocol for Green Communications in Vehicular Ad-hoc Networks Jamal Toutouh, Enritue Alba GECCO’ 11, July Presented by 劉美妙.
A Novel Coalitional Game Model for Security Issues in Wireless Networks Xiaoqi LiMichael Lyu Computer Science and Engineering Department The Chinese University.
Internet Networking recitation #4
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Presentation transcript:

Eunyoung Chang 1 CS 6204 Mobile Computing

 Problem  Proposed Approaches  COMMIT Approaches  THE SYSTEM MODEL  The COMMIT Protocol  Protocol Analysis  The Cost of Cooperation 2

 Problem - In ad hoc network, establish a route for sending packets between a Sender and Destination - rational selfish Nodes, maximize their own utility. 3

 Proposed Approaches 1. Ad Hoc-VCG : based on momentary transfer - energy-efficient, truthful 2. CORSAC : route discovery and packet forward cooperation-optimal - utility maximizing - Problem The source cannot act strategically The number of messages must be exchanged 4

 COMMIT Routing Protocol Goal 1. individual rationality 2. Truthfulness 3. The most energy-efficient(least Cost) path. 4. The message complexity is low.  COMMIT Protocol - COMMIT : Sender-centric, incentive-compatible routing protocols 5

6 ProtocolTruth. RoutersTruth. ForwardStrategic senderMessage Complex Ad Hoc-VCGYesPartiallyNo O(n 3 ) CORSAC Yes NoO(n 3 ) COMMIT Yes Partially Yes O(|M| 2 d) The major difference - The costs of routing are relative with nodes, not links. - periodic topology control protocol - Game theory simple - Message complexity low

Network Model - n nodes - Links in the communication graph G. - Symmetric wireless link - 2-connected - topology control protocol - K-Neigh, CBTC, CTR Modeling routing as a Game : D, S, Relay nodes, - D : “neural referee” - S : private information (type), u s = m - c s (D) (u: utility of S, m: maximum per-packet price, c s (D):actual per-packet price ) - R : C v = l(v), u s = pay(v) – l(v) (l(v) : power level, C v : cost to relay a packet, pay(v) : per-packet payment) 7

Strategy Game – truth telling 1. A node can declare any type. 2. Drop control messages 3. Modify messages 4. Create bogus messages The Goal - Route message with the most efficient paths The features - truthful, incentive compatible, strategy proof 8

1.The mechanism 1. Winner determination by D 2. Payment computation by D 3. Billing. 2. The pricing scheme 3. Protocol Specification 9

2. The Pricing Scheme : Determine c s (D) ? c(P) : The energy cost of a path P between S/D c(P) = ∑ vЄP, v Є {S,D} l(v) MP : The wining path = {v 1, v 2, v 3 } P -v : the path that does not include v c(P -v ) : the cost of the minimum energy (S,D) path P -v `pay(v) : Payment for a node v in the wining path MP pay(v) = c(P -v ) – c(MP) +l(v) pay(v) = 0 ( for the nodes, that are not on the wining path) (S,D,20) SD v1v1 v2v2 v3v3 v5v5 v4v4 5 1 m = 65 l

2. The Pricing Scheme : Determine c s (D) (Q. Would the communication take place in the nodes?) 11 m = 65 (A. If truthfully, The communication would NOT take place) (S,D,20) SD v1v1 v3v3 v4v4 v5v5 v2v2

2. The Pricing Scheme : Determine c s (D) (Q. Would the communication take place in the nodes?) 12 v2v2 MP (The wining path) = {v 1, v 2, v 3 } = 26 c(P -v1 ) (Replacement path ) = {v 4 v 5 } = 40 = c(P -v2 ) = c(P -v3 ) pay(v 1 ) = c(P -v1 ) – c (MP) +l(v 1 ) = 40 – = 19, pay(v 2 )= 34, pay(v 3 ) = 15 pay(v 1 ) + pay(v 2 ) + pay(v 3 ) = 68 > (S,D,20) SD v1v1 v3v3 v4v4 v5v5 m = 65 Utility for all the players = 0 (A. The communication would not take place)

2. The Pricing Scheme : Determine c s (D) (Q. Would the communication take place in the nodes?) 13 v2v2 But assume that node V 2 falsely declares power level 30 ? pay(v 1 ) + pay(v 2 ) + pay(v 3 ) = 48 < 65 Utility of v 2 : 34 – 20 = (S,D,20) SD v1v1 v3v3 v4v4 v5v5 m = 65 (The communication would take place) (V 2 would increase its utility) Therefore, cs(D) = ∑ vЄP, v Є {S,D} pay(v) would result in a nontruthful mechanism l

2. The Pricing Scheme : Determine c s (D) (Q. Would the communication take place in the nodes?) 14 v2v2 But assume that node V 2 falsely declares power level 30 ? pay(v 1 ) + pay(v 2 ) + pay(v 3 ) = 48 < (S,D,20) SD v1v1 v3v3 v4v4 v5v5 m = 65 In order to circumvent this problem : c s (D) = c(P -mp ) = 40 c(P -mp ) : global replacement path c s (D) < m : feasible

2. The Pricing Scheme : Determine c s (D) - feasible : protecting the condition individual rationality. c(P -mp ) ≠ ∑ pay(v) : budget is imbalanced c(P -mp ) > ∑ pay(v) : getting additional money by D c(P -mp ) < ∑ pay(v) : Contributing to the payment by D 15 vЄP, v Є {S,D} l l l

3. Protocol Specification 1. Route discovery S : RD (S, D, m) using l(S) R : RD (S, D, m, v 1,l(v 1 ),…, v k-1,l(v k-1 )), V k build up local view D : RD (S, v 1, v 2,…, v k-1, v k, D) from S to D, P -vi, P -mp MP feasible(c s (D) = c(P -mp ) < m) 2. Data transition: (only if MP is feasible) start : along the winning path MP from S to D end : last packet of S, changes topology control protocol 16

- Truthful route discovery imply truthful data forwarding? 1. forward only new edges : reduces the message complexity phase. 2. V k compute whether a newly received path is feasible - 17

1. Energy Efficiency : If truthfully, COMMIT computes MP 2. Message Complexity 18 SD M n1n1 n 1 d d d d Each node forwards to |M| n 1 forwards to |M| * degree d n 1 has complete |M|d Each node |M| repeats ‘same’ Thus, |M|(|M|d) 3. Truthfulness and Individual Rationality : S, R, D (The subset of all relay node s) (the maximum node degree ) d

3. Truthfulness and Individual Rationality - prove : for the sender Sender : S will never pay a price that exceeds m. 1. m f < m : a. C(P -mp ) < m f < m : the utility remains the same. b. m f < C(P -mp ) < m : the communication would not takes place. c. C(P -mp ) < m f < m : declaring utility unchanged at zero. 2. m f > m : along the same line of case 1 above. 19

3. Truthfulness and Individual Rationality : S, R, D - prove : the Relay nodes A relay node : will never get a negative utility when acting truthfully. - Analyze the different cheating behaviors of the rely node : An relay node v could 1. lie about its type (power level l(v)) 2. Propagate a path with false information 3. internationally fail to propagate a path with new information 4. combine the above possibilities 20

3. Truthfulness and Individual Rationality : S, R, D 1. lie about its type (power level l(v)) : Utility unchanged - Cheating option 1 : l(v), l f (v) a. l(v) l f (v) : (S,D,20) SD v1v1 v2v2 v3v3 v5v5 v4v4 5 1 m = 65 if vЄMP No effect on the decision rule (S,D,20) SD v1v1 v2v2 v3v3 v5v5 v4v4 5 1 m = 65 if vЄMP v’s utility would not be changed

3. Truthfulness and Individual Rationality : S, R, D 2. Propagate a path with false information : case - Creating a false neighbor take : RD(S,D, m, v 1,, l(v 1 ),…, v i-1, l(v i-1 ) ) forward: RD(S,D, m, v 1,, l(v 1 ),…, v i-h, l(v i-h ), v, l(v) ) 1. v is in the MP, feasible 2. v is in the MP, Not feasible 3. v is not in the MP, but it is in the (false) minimum-energy MP - Creating a false overhop path forward: RD(S,D, m, v 1,, l(v 1 ),…, v i-h, l(v i-h ), v, l(v) ) 1. v is in the MP, feasible 2. v is in the MP, Not feasible 3. v is not in the MP. 22

3. Truthfulness and Individual Rationality : S, R, D 2. Propagation with false info – 1) creating a false neighbor Case: 1. v is in the MP, which is feasible : e’ = (v i-h, v ) 23 u v = c(P -v ) – c(MP) utility cost ↑, the cost of false MP f ↓ by e’ e’ ∈ MP f But e’ does not exist in G Payments during data session : zero SD v1v1 v v3v3 v5v5 v4v4 e’ reduce utility

3. Truthfulness and Individual Rationality : S, R, D 2. Propagation with false info – 1) creating a false neighbor Case: 2. v is in the MP, which is NOT feasible : e’ = (v i-h, v ) 24 utility zero 2 SD v1v1 v v3v3 v5v5 v4v4 e’ utility cost ↑, the cost of P -mp ↓ by e’ Not belong to P -mp

3. Truthfulness and Individual Rationality : S, R, D 2. Propagation with false info – 1) creating a false neighbor Case: 3. v is not in the MP, but it is in the (false) minimum-energy MP : e’ = (v i-h, v ) 25 SD v1v1 v2v2 v3v3 v v4v4 utility zero e’ ∈ MP f e’ does not exist in G Payments during data session : zero e’

3. Truthfulness and Individual Rationality : S, R, D 2. Propagation with false info – 2) Creating a false overhop Path Case: 1. v is in the MP, which is feasible : e’ = (v i-h, v i+1 ) 26 SD v1v1 v2v2 v3v3 v5v5 v4v4 e’ reduce utility u v = c(P -v ) – c(MP) The c(P -v ) ↓ while cost of MP unchanged by e’

3. Truthfulness and Individual Rationality : S, R, D 2. Propagation with false info – 2) Creating a false overhop Path Case: 2. v is in the MP, which is NOT feasible : e’ = (v i-h, v i+1 ) 27 Data session would be aborted SD v1v1 v2v2 v3v3 v5v5 v4v4 utility cost ↑, the cost of false MP f ↓ by e’ However, test Msg along global replacement path e’ does not exist in G e’

3. Truthfulness and Individual Rationality : S, R, D 2. Propagation with false info – 2) Creating a false overhop Path Case: 3. v is not in the MP : e’ = (v i-h, v i+1 ) 28 SD v1v1 v2v2 v3v3 v5v5 v4v4 e’ utility zero Not on the end point of e’ Leave v out of MP by e’

3. Truthfulness and Individual Rationality : S, R, D 3. Intentionally fail to propagate with new info Case: 1. v is in the MP, which is feasible 29 SD v1v1 v2v2 v3v3 v5v5 v4v4 no incentive in not reporting edge info u v = c(P -v ) – c(MP) utility cost ↓, the cost of MP ↑ by no reporting

3. Truthfulness and Individual Rationality : S, R, D 3. Intentionally fail to propagate with new info Case: 2. v is in the MP, which is NOT feasible 30 no incentive in not reporting SD v1v1 v2v2 v3v3 v5v5 v4v4 No way utility cost ↑

3. Truthfulness and Individual Rationality : S, R, D 3. Intentionally fail to propagate with new info Case: 3. v is not in the MP and try to join the MP by not reporting one of the edges e 31 SD v1v1 v2v2 v3v3 v5v5 v4v4 utility zero c(MP) > c(MP v ) c(MP v ) ↑ by no reporting no way for v to turn MP v into the MP

3. Truthfulness and Individual Rationality 4. combine the above possibilities 32 SD v1v1 v2v2 v3v3 v5v5 v4v4 utility zero No way utility cost ↑

3. Truthfulness and Individual Rationality : S, R, D 3. D acts truthfully - Interest : receive data, new connection, customers happy - No interest : Sender pay less, R’s overpayment Thus If COMMIT executes in ad hoc, truthfulness is strategy 33

 The cost of cooperation : The Difference between premium and MP cost : The measure of inefficiency (C(MP) < m) but c(P -mp ) > m ; communication aborted - COMMIT Approach : changing the topology of the new network. 34