© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 10: Selfishness in packet.

Slides:



Advertisements
Similar presentations
Security and Sensor Networks By Andrew Malone and Bryan Absher.
Advertisements

EE384y: Packet Switch Architectures
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 11 Information.
A Data Dissemination Method for Supporting Mobile Sinks in Hierarchical Routing Protocol of WSN APAN 2008 Jieun Cho 4, August,
1 A Static-Node Assisted Adaptive Routing Protocol in Vehicular Networks Yong Ding, Chen Wang, Li Xiao {dingyong, wangchen, Department.
Efficient Secure Aggregation in VANETs Maxim Raya, Adel Aziz, and Jean-Pierre Hubaux Laboratory for computer Communications and Applications (LCA) EPFL.
0 - 0.
Chapter 17: Making Complex Decisions April 1, 2004.
The Capacity of Wireless Networks
Capacity of wireless ad-hoc networks By Kumar Manvendra October 31,2002.
P: 1 / 24 Situated and Autonomic Communications FET Integrated Project CASCADAS ( Mécanismes de sécurité et de coopération entre.
Game Theoretic Analysis of Oligopoly y n Y N 0000 Y N The unique dominant strategy Nash Equilibrium is (y,Y) A game of imperfect.
Evolving Cooperation in the N-player Prisoner's Dilemma: A Social Network Model Dept Computer Science and Software Engineering Golriz Rezaei Michael Kirley.
Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
Test B, 100 Subtraction Facts
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 12: Secure protocols for.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 11: Wireless operators in.
Infinitely Repeated Games
1 A Graph-Theoretic Network Security Game M. Mavronicolas , V. Papadopoulou , A. Philippou  and P. Spirakis § University of Cyprus, Cyprus  University.
Class 4 – Some applications of revenue equivalence
Collaboration Mechanisms in SOA based MANETs. Introduction Collaboration implies the cooperation between the nodes to support the proper functioning of.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Price Of Anarchy: Routing
EPFL, Lausanne, Switzerland Márk Félegyházi Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks – the Static Case Márk Félegyházi.
DARWIN: Distributed and Adaptive Reputation Mechanism for Wireless Ad- hoc Networks CHEN Xiao Wei, Cheung Siu Ming CSE, CUHK May 15, 2008 This talk is.
Game Theory “Доверяй, Но Проверяй” (“Trust, but Verify”) - Russian Proverb (Ronald Reagan) Topic 5 Repeated Games.
Incentive-Compatible Opportunistic Routing for Wireless Networks Fan Wu, Tingting Chen, Sheng Zhong (SUNY Buffalo) Li Erran Li Li Erran Li (Bell Labs)
Counter-measuring MAC Misbehaviors in Ad Hoc Networks using Game Theory March 25, 2010 EE5723 – Computer & Network Security.
Stimulation for Cooperation in Ad Hoc Networks: Beyond Nuglets Levente Buttyán, Jean-Pierre Hubaux, and Naouel Ben Salem Swiss Federal Institute of Technology.
Border Games in Cellular Networks Infocom 2007 Márk Félegyházi*, Mario Čagalj†, Diego Dufour*, Jean- Pierre Hubaux* * Ecole Polytechnique Federale de Lausanne.
EC941 - Game Theory Lecture 7 Prof. Francesco Squintani
Game Theory. Games Oligopolist Play ▫Each oligopolist realizes both that its profit depends on what its competitor does and that its competitor’s profit.
Appendix B: A tutorial on game theory for wireless networks
Using Game Theoretic Approach to Analyze Security Issues In Ad Hoc Networks Term Presentation Name: Li Xiaoqi, Gigi Supervisor: Michael R. Lyu Department:
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
The Structure of Networks with emphasis on information and social networks T-214-SINE Summer 2011 Chapter 8 Ýmir Vigfússon.
1 MSWiM 2004 Rational Behaviors in WiFi Hotspots and in Ad Hoc Networks Jean-Pierre Hubaux EPFL.
Joint Multi-Access and Routing as a Stochastic Game for Relay Channel Yalin Evren Sagduyu, Anthony Ephremides Objective and Motivation * Objective: Analyze.
Achieving Network Optima Using Stackelberg Routing Strategies Yannis A. Korilis, Member, IEEE Aurel A. Lazar, Fellow, IEEE & Ariel Orda, Member IEEE IEEE/ACM.
Terminal Games Theoretical Subtitle. A Simple Game 1: A>B>C 2: B>C>A 3: C>A>C.
Convergence Time to Nash Equilibria in Load Balancing Eyal Even-Dar, Tel-Aviv University Alex Kesselman, Tel-Aviv University Yishay Mansour, Tel-Aviv University.
Performance Analysis of Reputation-based Mechanisms for Multi-hop Wireless Networks Fabio Milan Dipartimento di Elettronica Politecnico di Torino Turin,
Simulating Normal Random Variables Simulation can provide a great deal of information about the behavior of a random variable.
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
Game-Theoretic Models for Reliable Path- Length and Energy-Constrained Routing With Data Aggregation -Rajgopal Kannan and S. Sitharama Iyengar Xinyan Pan.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
The Structure of Networks with emphasis on information and social networks T-214-SINE Summer 2011 Chapter 8 Ýmir Vigfússon.
Budhaditya Pyne BEE-IV Roll No: Jadavpur University.
01/16/2002 Reliable Query Reporting Project Participants: Rajgopal Kannan S. S. Iyengar Sudipta Sarangi Y. Rachakonda (Graduate Student) Sensor Networking.
Economics for Business II Day 12 – Some Macro Numbers and Answers Dr. Andrew L. H. Parkes “A Macroeconomic Understanding for use in Business” 卜安吉.
Chapter 12 Choices Involving Strategy Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written.
Secure Protocols for Behavior Enforcement Slides elaborated by Julien Freudiger and adapted by Jean-Pierre Hubaux Note: this chapter.
Learning in Multiagent systems
Standard and Extended Form Games A Lesson in Multiagent System Based on Jose Vidal’s book Fundamentals of Multiagent Systems Henry Hexmoor, SIUC.
Strategic Decisions in Noncooperative Games Introduction to Game Theory.
On Non-Cooperative Location Privacy: A Game-theoreticAnalysis
Non-Cooperative Behavior in Wireless Networks Márk Félegyházi (EPFL) PhD. public defense July 9, 2007.
Repeated Game Modeling of Multicast Overlays Mike Afergan (MIT CSAIL/Akamai) Rahul Sami (University of Michigan) April 25, 2006.
1 Multi-radio Channel Allocation in Competitive Wireless Networks Mark Felegyhazi, Mario Čagalj, Jean-Pierre Hubaux EPFL, Switzerland IBC’06, Lisbon, Portugal.
1 11 Distributed Channel Assignment in Multi-Radio Mesh Networks Bong-Jun Ko, Vishal Misra, Jitendra Padhye and Dan Rubenstein Columbia University.
Evolving Strategies for the Prisoner’s Dilemma Jennifer Golbeck University of Maryland, College Park Department of Computer Science July 23, 2002.
Evolution of Cooperation in Mobile Ad Hoc Networks Jeff Hudack (working with some Italian guy)
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
A Novel Coalitional Game Model for Security Issues in Wireless Networks Xiaoqi LiMichael Lyu Computer Science and Engineering Department The Chinese University.
Environment-Aware Reputation Management for Ad Hoc Networks
For modeling conflict and cooperation Schwartz/Teneketzis
Game Theory in Wireless and Communication Networks: Theory, Models, and Applications Lecture 2 Bayesian Games Zhu Han, Dusit Niyato, Walid Saad, Tamer.
Learning 6.2 Game Theory.
Formation of Community-based Multi-hop Wireless Access Networks
Presentation transcript:

© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 10: Selfishness in packet forwarding

Security and Cooperation in Wireless Networks Chapter 10: Selfishness in packet forwarding 2/15 Introduction  the operation of multi-hop wireless networks requires the nodes to forward data packets on behalf of other nodes  however, such cooperative behavior has no direct benefit for the forwarding node, and it consumes valuable resources (battery)  hence, the nodes may tend to behave selfishly and deny cooperation  if many nodes defect, then the operation of the entire network is jeopardized  questions: –What are the conditions for the emergence of cooperation in packet forwarding? –Can it emerge spontaneously or should it be stimulated by some external mechanism?

Security and Cooperation in Wireless Networks Chapter 10: Selfishness in packet forwarding 3/15 Modeling packet forwarding as a game time 0 time slot: 1t Strategy: cooperation level m C (0) m C (1)m C (t) Players: nodes Benefit (of node i): proportion of packets sent by node i reaching their destination 10.1 Game theoretic model of packet forwarding

Security and Cooperation in Wireless Networks Chapter 10: Selfishness in packet forwarding 4/15 Cost function Cost for forwarder f j : where: T s (r) – traffic sent by source s on route r C – unit cost of forwarding Example : A E C D TATA m E (t) m C (t) r (A→D): 10.1 Game theoretic model of packet forwarding Normalized throughput at forwarder f j : where: r – route on which f k is a forwarder t – time slot f k – forwarders on route r m f k – cooperation level of forwarder f k

Security and Cooperation in Wireless Networks Chapter 10: Selfishness in packet forwarding 5/15 Benefit function where: s – source r – route on which s is a source t – time slot f k – forwarders for s p f k – cooperation level of forwarder f k Experienced throughput : A E C D TATA m E (t) m C (t) r (A→D): Example : benefit function : 10.1 Game theoretic model of packet forwarding bSbS

Security and Cooperation in Wireless Networks Chapter 10: Selfishness in packet forwarding 6/15 Total payoff The goal of each node is to maximize its total payoff over the game: Payoff = Benefit - Cost where: S i (t) – set of routes on which i is a source F i (t) – set of routes on which i is a forwarder where: – discounting factor t – time time 0time slot:1t Payoff: u A (0) u A (1). u A (t). t Example : 10.1 Game theoretic model of packet forwarding

Security and Cooperation in Wireless Networks Chapter 10: Selfishness in packet forwarding 7/15 Representation of the nodes as players Node i is playing against the rest of the network (represented by the box denoted by A -i ) yiyi xixi A -i ii Strategy function for node i: where:   (r,t) – experienced throughput 10.1 Game theoretic model of packet forwarding

Security and Cooperation in Wireless Networks Chapter 10: Selfishness in packet forwarding 8/15 Examples of strategies Strategy Function Initial cooperation level AllD (always defect) AllC (always cooperate) TFT (Tit-For-Tat)  non-reactive strategies: the output of the strategy function is independent of the input (example: AllD and AllC)  reactive strategies: the output of the strategy function depends on the input (example: TFT) where y i stands for the input 10.1 Game theoretic model of packet forwarding

Security and Cooperation in Wireless Networks Chapter 10: Selfishness in packet forwarding 9/15 Concept of dependency graph dependency: the benefit of each source is dependent on the behavior of its forwarders dependency loop 10.2 Meta-model

Security and Cooperation in Wireless Networks Chapter 10: Selfishness in packet forwarding 10/15 Analytical Results (1/2) Theorem 1: If node i does not have any dependency loops, then its best strategy is AllD. Theorem 2: If node i has only non- reactive dependency loops, then its best strategy is AllD. Corollary 1: If every node plays AllD, it is a Nash-equilibrium. node i node playing a non-reactive strategy other nodes 10.3 Analytical results

Security and Cooperation in Wireless Networks Chapter 10: Selfishness in packet forwarding 11/15 Analytical results (2/2) Corollary 2: If Theorem 3 holds for every node, it is a Nash-equilibrium. Theorem 3 (simplified): Assuming that node i is a forwarder, its behavior will be cooperative only if it has a dependency loop with each of its sources Example in which Corollary 2 holds: A B C A B C Network Dependency graph 10.3 Analytical results

Security and Cooperation in Wireless Networks Chapter 10: Selfishness in packet forwarding 12/15 Classification of scenarios D: Set of scenarios, in which every node playing AllD is a Nash equilibrium C: Set of scenarios, in which a Nash equilibrium based on cooperation is not excluded by Theorem 1 C2: Set of scenarios, in which cooperation is based on the conditions expressed in Corollary Analytical results

Security and Cooperation in Wireless Networks Chapter 10: Selfishness in packet forwarding 13/15 Simulation settings Number of nodes 100, 150, 200 Area type torus Area size 1500x1500m, 1850x1850m, 2150x2150m Radio range 200 m Distribution of the nodes random uniform Number of routes originating at each node 1-10 Route selection shortest path Number of simulation runs Simulation results

Security and Cooperation in Wireless Networks Chapter 10: Selfishness in packet forwarding 14/15 Simulation results 10.4 Simulation results

Security and Cooperation in Wireless Networks Chapter 10: Selfishness in packet forwarding 15/15 Summary  Analytical results: –If everyone drops all packets, it is a Nash-equilibrium –In theory, given some conditions, a cooperative Nash-equilibrium can exist ( i.e., each forwarder forwards all packets )  Simulation results: –In practice, the conditions for cooperative Nash-equilibria are very restrictive : the likelihood that the conditions for cooperation hold for every node is extremely small  Consequences: –Cooperation cannot be taken for granted –Mechanisms that stimulate cooperation are necessary incentives based on virtual currency reputation systems 10.5 Summary