SYNERGY: A Game-Theoretical Approach for Cooperative Key Generation in Wireless Networks Jingchao Sun, Xu Chen, Jinxue Zhang, Yanchao Zhang, and Junshan.

Slides:



Advertisements
Similar presentations
1 Efficient Self-Healing Group Key Distribution with Revocation Capability by Donggang Liu, Peng Ning, Kun Sun Presented by Haihui Huang
Advertisements

Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
Minimum Energy Mobile Wireless Networks IEEE JSAC 2001/10/18.
URSA: Providing Ubiquitous and Robust Security Support for MANET
산업 및 시스템 공학과 통신시스템 및 인터넷보안연구실 김효원 Optimizing Tree Reconfiguration for Mobile Target Tracking in Sensor Networks Wensheng Zhang and Guohong Cao.
MPAC 2004Rae Harbird 1 RUBI Adaptive Resource Discovery for Ubiquitous Computing Rae Harbird Stephen Hailes
Source-Location Privacy Protection in Wireless Sensor Network Presented by: Yufei Xu Xin Wu Da Teng.
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
Good afternoon everyone.
KAIST Adaptive Triangular Deployment Algorithm for Unattended Mobile Sensor Networks Suho Yang (September 4, 2008) Ming Ma, Yuanyuan Yang IEEE Transactions.
Xu Chen Xiaowen Gong Lei Yang Junshan Zhang
Joint Multi-Access and Routing as a Stochastic Game for Relay Channel Yalin Evren Sagduyu, Anthony Ephremides Objective and Motivation * Objective: Analyze.
Localized Techniques for Power Minimization and Information Gathering in Sensor Networks EE249 Final Presentation David Tong Nguyen Abhijit Davare Mentor:
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Efficient Retrieval of User Contents in MANETs Δημόκας Νικόλαος Data Engineering Laboratory, Aristotle University of Thessaloniki.
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
A Hierarchical Energy-Efficient Framework for Data Aggregation in Wireless Sensor Networks IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 3, MAY.
EWSN 04 – Berlin, Jan. 20, 2004 Silence is Golden with High Probability: Maintaining a Connected Backbone in Wireless Sensor Networks Paolo Santi* Janos.
Distributed Token Circulation in Mobile Ad Hoc Networks Navneet Malpani, Intel Corp. Nitin Vaidya, Univ. Illinois Urbana-Champaign Jennifer Welch, Texas.
Rendezvous Planning in Mobility- assisted Wireless Sensor Networks Guoliang Xing; Tian Wang; Zhihui Xie; Weijia Jia Department of Computer Science City.
LPT for Data Aggregation in Wireless Sensor networks Marc Lee and Vincent W.S Wong Department of Electrical and Computer Engineering, University of British.
Focused Beam Routing protocol for Underwater Acoustic Networks Josep Miquel Jornet Montana, Milica Stojanovic, Michele Zorzi, Proc. WuWNet 2008.
Performance Analysis of Reputation-based Mechanisms for Multi-hop Wireless Networks Fabio Milan Dipartimento di Elettronica Politecnico di Torino Turin,
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets.
Adaptation of TDMA Parameters Based on Network Conditions Bora Karaoglu Tolga Numanoglu Wendi Heinzelman Department of Electrical and Computer Engineering.
Connected Dominating Sets in Wireless Networks My T. Thai Dept of Comp & Info Sci & Engineering University of Florida June 20, 2006.
Boyu Chen Yulin Xia Haoyu Xu Viterbi School of Engineering University of Southern California P2P file sharing system with a central server.
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences 1 Cooperative Wireless.
Does Packet Replication Along Multipath Really Help ? Swades DE Chunming QIAO EE Department CSE Department State University of New York at Buffalo Buffalo,
LPT for Data Aggregation in Wireless Sensor Networks Marc Lee and Vincent W.S. Wong Department of Electrical and Computer Engineering, University of British.
SOS: A Safe, Ordered, and Speedy Emergency Navigation Algorithm in Wireless Sensor Networks Andong Zhan ∗ †, Fan Wu ∗, Guihai Chen ∗ ∗ Shanghai Key Laboratory.
Computing and Communicating Functions over Sensor Networks A.Giridhar and P. R. Kumar Presented by Srikanth Hariharan.
Lyon, June 26th 2006 ICPS'06: IEEE International Conference on Pervasive Services 2006 Routing and Localization Services in Self-Organizing Wireless Ad-Hoc.
1 Optimal Power Allocation and AP Deployment in Green Wireless Cooperative Communications Xiaoxia Zhang Department of Electrical.
1 BitHoc: BitTorrent for wireless ad hoc networks Jointly with: Chadi Barakat Jayeoung Choi Anwar Al Hamra Thierry Turletti EPI PLANETE 28/02/2008 MAESTRO/PLANETE.
IEEE Globecom 2010 Tan Le Yong Liu Department of Electrical and Computer Engineering Polytechnic Institute of NYU Opportunistic Overlay Multicast in Wireless.
June 21, 2007 Minimum Interference Channel Assignment in Multi-Radio Wireless Mesh Networks Anand Prabhu Subramanian, Himanshu Gupta.
A Game Approach for Multi-Channel Allocation in Multi-Hop Wireless Networks Lin Gao, Xinbing Wang Dept. of Electronic Engineering Shanghai Jiao Tong University.
DARP: Distance-Aware Relay Placement in WiMAX Mesh Networks Weiyi Zhang *, Shi Bai *, Guoliang Xue §, Jian Tang †, Chonggang Wang ‡ * Department of Computer.
1 Multicast Algorithms for Multi- Channel Wireless Mesh Networks Guokai Zeng, Bo Wang, Yong Ding, Li Xiao, Matt Mutka Michigan State University ICNP 2007.
Michael J. Neely, University of Southern California CISS, Princeton University, March 2012 Wireless Peer-to-Peer Scheduling.
Distributed Authentication in Wireless Mesh Networks Through Kerberos Tickets draft-moustafa-krb-wg-mesh-nw-00.txt Hassnaa Moustafa
Computer Networks Group Universität Paderborn TANDEM project meeting Protocols, oversimplification, and cooperation or: Putting wireless back into WSNs.
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
Collision-free Time Slot Reuse in Multi-hop Wireless Sensor Networks
Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNs Presented by Zhongming Zheng.
A Distributed Relay-Assignment Algorithm for Cooperative Communications in Wireless Networks ICC 2006 Ahmed K. Sadek, Zhu Han, and K. J. Ray Liu Department.
Random Graph Generator University of CS 8910 – Final Research Project Presentation Professor: Dr. Zhu Presented: December 8, 2010 By: Hanh Tran.
The new protocol of freenet Taken from Ian Clarke and Oskar Sandberg (The Freenet Project)
Multiuser Receiver Aware Multicast in CDMA-based Multihop Wireless Ad-hoc Networks Parmesh Ramanathan Department of ECE University of Wisconsin-Madison.
Cooperative Location- Sensing for Wireless Networks Authors : Haris Fretzagias Maria Papadopouli Presented by cychen IEEE International Conference on Pervasive.
An Energy-Efficient Geographic Routing with Location Errors in Wireless Sensor Networks Julien Champ and Clement Saad I-SPAN 2008, Sydney (The international.
Two Connected Dominating Set Algorithms for Wireless Sensor Networks Overview Najla Al-Nabhan* ♦ Bowu Zhang** ♦ Mznah Al-Rodhaan* ♦ Abdullah Al-Dhelaan*
Throughput-Oriented MAC for Mobile Ad Hoc Networks with Variable Packet Sizes Fan Wang, Ossama Younis, and Marwan Krunz Department of Electrical & Computer.
Data Consolidation: A Task Scheduling and Data Migration Technique for Grid Networks Author: P. Kokkinos, K. Christodoulopoulos, A. Kretsis, and E. Varvarigos.
Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department RPI Costas Busch CSCI Department.
DRAND: Distributed Randomized TDMA Scheduling for Wireless Ad-Hoc Networks Injong Rhee (with Ajit Warrier, Jeongki Min, Lisong Xu) Department of Computer.
Fair and Efficient multihop Scheduling Algorithm for IEEE BWA Systems Daehyon Kim and Aura Ganz International Conference on Broadband Networks 2005.
Energy Consumption Perspective on Coded Cooperative Systems Liwen Yu and Andrej Stefanov.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Efficient Geographic Routing in Multihop Wireless Networks Seungjoon Lee*, Bobby Bhattacharjee*, and Suman Banerjee** *Department of Computer Science University.
Simulation of K-Clustering in a Wireless Ad-Hoc Network using a decentralized Local Search Supervised by: Dr. Rachel Ben- Eliyahu Kirill Kazatsker Daniel.
A Novel Coalitional Game Model for Security Issues in Wireless Networks Xiaoqi LiMichael Lyu Computer Science and Engineering Department The Chinese University.
Distributed voting application for handheld devices
Privacy and Fault-Tolerance in Distributed Optimization Nitin Vaidya University of Illinois at Urbana-Champaign.
Totally Disjoint Multipath Routing in Multihop Wireless Networks Sonia Waharte and Raoef Boutaba Presented by: Anthony Calce.
Spectrum Sharing in Cognitive Radio Networks
Presentation transcript:

SYNERGY: A Game-Theoretical Approach for Cooperative Key Generation in Wireless Networks Jingchao Sun, Xu Chen, Jinxue Zhang, Yanchao Zhang, and Junshan Zhang School of Electrical, Computer and Energy Engineering (ECEE) Arizona State University, Tempe, Arizona, USA

Overview Problem: – Secret Key Establishment between two adjacent device-to-device (D2D) communication. Method: – Cooperative Key Generation using Coalition Game. Issue: – Self interested and Reluctant to act as relays without acceptable reward in return. Proposal: – SYNERGY, a game-theoretical approach for stimulating cooperative key generation. Formulation: – Centralized and Distributed protocols for obtaining the core solution to the game.

PHY-based Cooperative Key Generation: CHANEEL ESTIMATION : KEY AGREEMENT:

Key Generation Rate Charlie act as Relay: Charlie and Dave act as Relays: T = Coherence time (Users estimation of common channel gain ) = Alice and Bob Channel Estimation (Correlated Information) = Alice and Charlie Channel Estimation (Correlated Information) Similarly for Charlie and Bob, Alice and Dave & Bob and Dave

Model Multi-hop D2D Scenario Same transmission Power & Range Selfish Node – (Every node will not act as relay to help for key establishment without incentive) Rational Node – (Every node in a coalition faithfully follows the protocol and collaborates) Peer pair Relay Contributor Assumption – Passive adversary (eavesdropper) – Relay node will not cooperate with adversaries.

Coalitional Game Formulation Key Rate function ( to any potential contributor) Preferred virtual node / contributor is define as:

Basic function of Coalition Game Formulation Players – N/2 virtual nodes Strategies – Contributor Selection Characteristic Function – In Coalition: select one virtual node as a contributor – Out Coalition: Cannot get any contributor Preference order – Performance based (Performance refers to the Key generation rate)

Core discovery algorithm Identify all the contributor cycles to form a core solution. 1.Construct a directed graph G. 2.Directed edge from any vertex to another vertex exists iff is the most preferred contributor of. 3.Every virtual node can choose at most one contributor that correspond to at most two relays. 4.The problem of discovering all the contributor cycles or the core solution can then be translated into simple cycle search in G.

Core Discovery Algorithm Use directed graph

Implementation C-SYNERGY: A Centralized Implementation – Every peer pair reports its own preference to a single server – Server computes all the contributor cycle – Returns contributor to the corresponding node – Mobile node will determine which node they use as relay and whom they should act as a relay. – Server can be BS or mobile node elected from the mobile nodes themselves – Server does the computation and does not participate in the cooperative key generation

D-SYNERGY Mobile nodes are enabled to discover the core solution (or contributor cycle) in distributed fashion. Every iteration is initiated by a mobile node New contributor cycle is identified in every iteration. Terminates when every node is included in a contributor cycle.

Simulation SNR vs. Average Key Rate SNR increases, Optimal key rates of all three cases increase – Key generation rate increases with the transmission power Key generation rate is better with two relays – More relay, more common channel randomness available for secret key generation.

No. of Nodes vs. Average Key Rate Impact of average number of nodes on optimal key rate Impact of average number of neighbors on optimal key rate

Computational & Communication Overhead Impact of no. of nodes on the average number of operation for discovering all contributor cycles Computational overhead dominated by contributor cycle discovery in both C/D- SYNERGY. For fixed no. of nodes, larger the region having fewer common neighbors

Communication Overhead (C-SYNERGY) Communication overhead lies in the messages for : 1.Neighbor discovery 2.Channel estimation 3.Communicating with server. No. of messages increases with the number of nodes. Larger the region, fewer neighbors each node has and thus fewer messages needed for neighbor discovery and channel estimation C-SYNERGY decreases as the region side length (D) increases.

Communication Overhead (D-SYNERGY) Impact of No. of nodes on the communication overhead. Larger region, decrease the chances of peer nodes to find a relay node in their common communication range. Leading to possible fewer edges between virtual nodes in the directed graph. D-SYNERGY has higher communication overhead due to distributed contributor cycle discovery but does not need BS or specific node as a server.

Conclusion In one sentence Improve key generation rate Details Game theoretical approach for stimulating PHY-based cooperative key generation. Incentive-aware (social Reciprocity) cooperative key generation is formulated C/D SYNERGY protocols for finding a core solution to the coalition game Mobile nodes are strongly motivated to collaborate with others in same coalition to improve their respective key generation rate.