1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida.

Slides:



Advertisements
Similar presentations
Security in Mobile Ad Hoc Networks
Advertisements

June 4, 2004 A Robust Reputation System for P2P and Mobile Ad-hoc Networks Sonja Buchegger 1 A Robust Reputation System for P2P and Mobile Ad-hoc Networks.
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
EPFL, Lausanne, Switzerland Márk Félegyházi Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks – the Static Case Márk Félegyházi.
Incentive Based Routing Protocols In Ad Hoc Networks Vinay Shah CSE 620.
Incentive-Compatible Opportunistic Routing for Wireless Networks Fan Wu, Tingting Chen, Sheng Zhong (SUNY Buffalo) Li Erran Li Li Erran Li (Bell Labs)
Counter-measuring MAC Misbehaviors in Ad Hoc Networks using Game Theory March 25, 2010 EE5723 – Computer & Network Security.
Stimulation for Cooperation in Ad Hoc Networks: Beyond Nuglets Levente Buttyán, Jean-Pierre Hubaux, and Naouel Ben Salem Swiss Federal Institute of Technology.
SEEKER: An Adaptive and Scalable Location Service for Mobile Ad Hoc Networks Jehn-Ruey Jiang and Wei-Jiun Ling Presented by Jehn-Ruey Jiang National Central.
Hubaux Ne X tworking’03 June 23-25,2003, Chania, Crete, Greece The First COST-IST(EU)-NSF(USA) Workshop on EXCHANGES & TRENDS IN N ETWORKING 1 Self-organization.
A Charging and Rewarding Scheme for Packet Forwarding in Multi-hop Cellular Networks N. Ben Salem*, L. Buttyán**, J.-P. Hubaux* and M. Jakobsson*** * Laboratory.
DSR The Dynamic Source Routing Protocol Students: Mirko Gilioli Mohammed El Allali.
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks By Sergio Marti, T.J. Giuli, Kevin Lai, & Mary Baker Department of Computer Science Stanford University.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Using Game Theory to Analyze Wireless Ad Hoc networks Vivek Srivastava March 24 th 2004 Qualifier presentation.
Stimulation for Cooperation in Ad Hoc and Multi-hop Cellular Networks N. Ben Salem*, L. Buttyán*, J.-P. Hubaux* and M. Jakobsson** * Laboratory of Computer.
fine-grained reputation-based routing in wireless ad hoc networks
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
SPLASH Sécurisation des ProtocoLes dans les réseAux mobileS ad Hoc 12 Décembre 2003 Refik Molva Institut EURECOM.
Ad-Hoc Networking Course Instructor: Carlos Pomalaza-Ráez D. D. Perkins, H. D. Hughes, and C. B. Owen: ”Factors Affecting the Performance of Ad Hoc Networks”,
Mitigating routing misbehavior in ad hoc networks Mary Baker Departments of Computer Science and.
Cooperation between Nodes in Multi-Hop Wireless Networks Jean-Pierre Hubaux 1 Joint work with Naouel Ben Salem 1, Levente Buttyan 2, Srdjan Čapkun 1, Mark.
Trust Level Based Self-Organized Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi 12/3/2002.
A Reputation Based Scheme for Stimulating Cooperation Aruna Balasubramanian, Joy Ghosh and Xin Wang University at Buffalo (SUNY), Buffalo, NY {ab42, joyghosh,
Motivating Corporation in Mobile Ad Hoc Networks: A Step Forward
Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly Designed by Yao Zhao.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
1 cs526 chow Wireless Sensor Network(WSN) vs. Mobile Ad Hoc Network (MANET) WSNMANET SimilarityWirelessMulti-hop networking SecuritySymmetric Key CryptographyPublick.
Di Wu 03/03/2011 Geographic Routing in Clustered Multi-layer Vehicular Ad Hoc Networks for Load Balancing Purposes.
Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks Yi Lu, Weichao Wang, Bharat Bhargava CERIAS and Department of Computer Sciences Purdue.
A Cross Layer Approach for Power Heterogeneous Ad hoc Networks Vasudev Shah and Srikanth Krishnamurthy ICDCS 2005.
Selfish MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur and Nitin H. Vaidya 2005 IEEE Reviewed by Dean Chiang.
Roadmap-Based End-to-End Traffic Engineering for Multi-hop Wireless Networks Mustafa O. Kilavuz Ahmet Soran Murat Yuksel University of Nevada Reno.
Network-layer Security of Mobile Ad hoc Networks Jiangyi Hu Advisor: Dr. Mike Burmester.
Ad Hoc Networking via Named Data Michael Meisel, Vasileios Pappas, and Lixia Zhang UCLA, IBM Research MobiArch’10, September 24, Shinhaeng.
Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks Sonja Buchegger Jean-Yves Le Boudec.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
VIRTUAL ROUTER Kien A. Hua Data Systems Lab School of EECS University of Central Florida.
MobiQuitous 2004Kimaya Sanzgiri Leveraging Mobility to Improve Quality of Service in Mobile Networks Kimaya Sanzgiri and Elizabeth Belding-Royer Department.
A Cooperative Diversity- Based Robust MAC Protocol in wireless Ad Hoc Networks Sangman Moh, Chansu Yu Chosun University, Cleveland State University Korea,
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Fuzzy Trust Recommendation Based on Collaborative Filtering for Mobile Ad-hoc Networks Junhai Luo 1,2, Xue Liu 1, Yi Zhang 3,Danxia Ye 2,Zhong Xu 1 1 McGill.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
EAACK—A Secure Intrusion-Detection System for MANETs
A Micro-Payment Scheme Encouraging Collaboration in Multi-Hop Cellular Networks Markus Jakobsson 1 Jean- Pierre Hubaux 2 Levente Buttyán 2,3 1 RSA Laboratories.
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
1 MANETS – An overview. 2 MANETs Model and Definitions Simulatability – mobility models Routing algorithms Security issues with routing algorithms Tracing.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks Sergio Marti, T.J. Giuli, Kevin.
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University Australia.
Evaluation of ad hoc routing over a channel switching MAC protocol Ethan Phelps-Goodman Lillie Kittredge.
Computer Science and Engineering 1 Mobile Computing and Security.
Denial of Service Resilience in Ad Hoc Networks (MobiCom 2004) Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly November 21 th, 2006 Jinkyu Lee.
Mobile Networks and Applications (January 2007) Presented by J.H. Su ( 蘇至浩 ) 2016/3/21 OPLab, IM, NTU 1 Joint Design of Routing and Medium Access Control.
Nov. 29, 2006GLOBECOM /17 A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi.
Enforce Collaboration in Mobile Ad Hoc Network Ning Jiang School of EECS University of Central Florida
CSE 4340/5349 Mobile Systems Engineering
Wenjia Li Anupam Joshi Tim Finin May 18th, 2010
ITIS 6010/8010 Wireless Network Security
Authors: Chun-Ta Li and Min-Shiang Hwang Reporter: Chun-Ta Li (李俊達)
Improving Routing & Network Performances using Quality of Nodes
Cross-layer Analysis for detecting Wireless Misbehavior
Presentation transcript:

1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida (Joint work with Qi He and Pradeep Khosla at Carnegie Mellon University)

2 What’s the Problem? Mobile ad hoc network (MANET) has no fixed infrastructure Communications rely on intermediate nodes But why should intermediate nodes relay? Need incentive mechanism for packet forwarding in non-cooperative MANET

3 Outline Problem and motivation Previous work  Reputation-based schemes  Pricing-based schemes Our scheme  Design objective  Basic scheme  Security enhancement Conclusion

4  Watchdog: identifies selfish nodes Mitigating Routing Misbehavior (S. Marti et al, Stanford University, 2000) S A B C D X S A B C D X Y  Pathrater: gets around identified selfish nodes

5 Pros and Cons Pros:  Improve throughput Cons:  Unfairly makes well behaving nodes busier  Indirectly encourages misbehavior (S. Marti et al, Stanford University, 2000)

6  Detect misbehavior of neighbors  Share reputation information with friends  Punish selfish nodes based on the shared information CONFIDANT Protocol System (S. Buchegger and J-Y Le Boudec, IBM and EPFL, 2002)

7 Pros and Cons Pros  Use keys to authenticate nodes  Identify and punish misbehavior Cons  How to build a network of friends is not clear  Key distribution is not addressed  Globally shared reputation makes it not scalable (S. Buchegger and J-Y Le Boudec, IBM and EPFL, 2002)

8 Where are we? Problem and motivation Previous work  Reputation-based schemes  Pricing-based schemes Our scheme  Design objective  Basic scheme  Security enhancement Conclusion

9 Enforcing Service Availability Scheme  Virtual currency (nuglet)  Centralized authority issuing nuglets  Same amount of packets to forward  Tamper-resistant hardware Problem:  Require balanced traffic (L. Buttyan and Hubaux, Swiss Federal Institute of Technology -- EPFL, 2000)

10 Micro-payment Scheme Encouraging Collaboration Multi-hop Cellular Networks (hybrid network)  Mobile nodes form ad-hoc networks  Base stations are connected to a backbone network M. Jakobsson, J-P Hubaux, and L. Buttyan RSA Lab, Swiss Federal Institute of Technology, 2003 backbone

11 $ Micro-payment Protocol 1.Select a reward Forward the packet Keep the MAC for reward 1.Check MAC 2.Send service record to clearing house Accounting Center (Clearing house) backbone M. Jakobsson, J-P Hubaux, and L. Buttyan RSA Lab, Swiss Federal Institute of Technology, 2003 Registers to home network which shares a secret key move MAC 2.Generate an MAC 3.Send out the packet

12 Pros and Cons Pros  Symmetric key crypto: reduce computational cost  Payment aggregation: lower communication cost Cons  Substantial communication overhead  Requirement of infrastructure  Centralized trust authority M. Jakobsson, J-P Hubaux, and L. Buttyan, RSA Lab, Swiss Federal Institute of Technology 2003

13 Where are we? Problem and Motivation Previous work  Reputation-based schemes  Pricing-based schemes Our scheme  Design objective  Basic scheme  Security enhancement Conclusion

14 Our Design Objectives  Practicality  Available technologies  Realistic context of ad-hoc networks  Efficiency  Affordable computational cost  Moderate communication overhead

15 Assumptions  Nodes are non-cooperative  No collusion among nodes  Broadcast transmission  All participating nodes desire to communicate  Invariant identity  Selfish but not malicious  Promiscuous mode (listening mode)

16 Where are we? Problem and motivation Previous work  Reputation-based schemes  Pricing-based schemes Our scheme  Design objectives  Basic scheme  Security enhancement Conclusion

17 Neighbor Monitoring  Each node N maintains a Neighbor Node List (NNL N )  RFP N (X): (Requested to Forward Packets) The number of packets N requests X to forward  HFP N (X): (Has Forwarded Packets) The number of packets that have been forwarded by X and noticed by N  LER N (X): Local Evaluation Record {G N (X), C N (X)} Generosity Confidence

18 Reputation Propagation  Every neighbor has its local evaluation record about X. node i earned from N.  Everyone periodically broadcasts its LER(X). G B (X), C B (X)  Compute Overall Evaluation Record OERN(X) X N A B C A (X), G A (X) C B (X), G B (X) C N (X), G N (X) C A (X), G A (X) ****** ****** if RFP N (X)  0 otherwise Credibility  Everyone periodically broadcasts its LER(X).  Compute Overall Evaluation Record OERN(X) if RFP N (X)  0 otherwise Credibility

19 Remarks  Quantified by objective observations  Weighted by confidence for accuracy  Weighted by credibility to limit impact of selfish nodes e.g., fake a non-existing node to broadcast information

20 Punishment Action if otherwise Drop packets from X with a probability p : Selfishness q = 1 - OER N (X)

21 Simulation Setup  Network Simulator (NS-2)  Total number of nodes: 50 (5 selfish nodes)  Area: 670X670m 2  IEEE for medium access control  DSR for routing  CBR traffic: 1 packet/s  No. of connections: 10  Connection duration: 10s  Random waypoint mobility model  Max speed of movement: 20m/s

22 Simulation Results

23 Where are we? Problem and motivation Previous work  Reputation-based schemes  Pricing-based schemes Our scheme  Design objectives  Basic scheme  Security enhancement Conclusion

24 Potential Vulnerability Impersonate a node with a good reputation to propagate fake observation information X N A B C A (X), G A (X) C B (X), G B (X) C A (X), G A (X)

25 Identification and Authentication … … … ID … … … f ff f f Computationally infeasible to impersonate other nodes without knowing their keys

26 Conclusion  Incentive scheme with punishment mechanism Reputation objectively quantified by observations Punishment action quantitatively suggested by reputation Effectively identify and punish selfish nodes  Security enhancement Identification and authentication constructed collectively Protection from impersonation

27 Thank you!