On Designing Incentive-Compatible Routing and Forwarding Protocols in Wireless Ad-Hoc Networks ---- An Integrated Approach Using Game Theoretical and Cryptographic.

Slides:



Advertisements
Similar presentations
ROUTING IN INTERMITTENTLY CONNECTED MOBILE AD HOC NETWORKS AND DELAY TOLERANT NETWORKS: OVERVIEW AND CHALLENGES ZHENSHENG ZHANG.
Advertisements

© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 12: Secure protocols for.
IP Fast Reroute Using Tunnel-AT draft-xu-ipfrr-tunnelat-00 Mingwei Xu, Lingtao Pan, Qing Li Tsinghua University, China 75 th IETF Meeting, Stockholm July.
1 Mobile IPv6-Based Ad Hoc Networks: Its Development and Application Advisor: Dr. Kai-Wei Ke Speaker: Wei-Ying Huang.
DARWIN: Distributed and Adaptive Reputation Mechanism for Wireless Ad- hoc Networks CHEN Xiao Wei, Cheung Siu Ming CSE, CUHK May 15, 2008 This talk is.
Incentive-Compatible Opportunistic Routing for Wireless Networks Fan Wu, Tingting Chen, Sheng Zhong (SUNY Buffalo) Li Erran Li Li Erran Li (Bell Labs)
Minimum Energy Mobile Wireless Networks IEEE JSAC 2001/10/18.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
A Survey of Secure Wireless Ad Hoc Routing
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
(4.4) Internet Protocols Layered approach to Internet Software 1.
The Structure of Networks with emphasis on information and social networks T-214-SINE Summer 2011 Chapter 8 Ýmir Vigfússon.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
PORT: A Price-Oriented Reliable Transport Protocol for Wireless Sensor Networks Yangfan Zhou, Michael. R. Lyu, Jiangchuan Liu † and Hui Wang The Chinese.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
Secure Multicast Xun Kang. Content Why need secure Multicast? Secure Group Communications Using Key Graphs Batch Update of Key Trees Reliable Group Rekeying.
Joint Multi-Access and Routing as a Stochastic Game for Relay Channel Yalin Evren Sagduyu, Anthony Ephremides Objective and Motivation * Objective: Analyze.
Network Coding for Large Scale Content Distribution Christos Gkantsidis Georgia Institute of Technology Pablo Rodriguez Microsoft Research IEEE INFOCOM.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Taming the Underlying Challenges of Reliable Multihop Routing in Sensor Networks.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
Mechanism Design Traditional Algorithmic Setting Mechanism Design Setting.
Ad-hoc On-Demand Distance Vector Routing (AODV) Sirisha R. Medidi.
Mario Čagalj supervised by prof. Jean-Pierre Hubaux (EPFL-DSC-ICA) and prof. Christian Enz (EPFL-DE-LEG, CSEM) Wireless Sensor Networks:
Game-Theoretic Models for Reliable Path- Length and Energy-Constrained Routing With Data Aggregation -Rajgopal Kannan and S. Sitharama Iyengar Xinyan Pan.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
1 Minimizing End-to-End Delay: A Novel Routing Metric for Multi- Radio Wireless Mesh Networks Hongkun Li, Yu Cheng, Chi Zhou Department of Electrical and.
ROUTING ON THE INTERNET COSC Aug-15. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
The Structure of Networks with emphasis on information and social networks T-214-SINE Summer 2011 Chapter 8 Ýmir Vigfússon.
Distributed Quality-of-Service Routing of Best Constrained Shortest Paths. Abdelhamid MELLOUK, Said HOCEINI, Farid BAGUENINE, Mustapha CHEURFA Computers.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
CuMPE : CLUSTER-MANAGEMENT AND POWER EFFICIENT PROTOCOL FOR WIRELESS SENSOR NETWORKS ITRE’05 Information Technology: Research and Education Shen Ben Ho.
VIRTUAL ROUTER Kien A. Hua Data Systems Lab School of EECS University of Central Florida.
Secure Protocols for Behavior Enforcement Slides elaborated by Julien Freudiger and adapted by Jean-Pierre Hubaux Note: this chapter.
WAN technologies and routing Packet switches and store and forward Hierarchical addresses, routing and routing tables Routing table computation Example.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
SECURITY-AWARE AD-HOC ROUTING FOR WIRELESS NETWORKS Seung Yi, Prasad Naldurg, Robin Kravets Department of Computer Science University of Illinois at Urbana-Champaign.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
IEEE Globecom 2010 Tan Le Yong Liu Department of Electrical and Computer Engineering Polytechnic Institute of NYU Opportunistic Overlay Multicast in Wireless.
Wireless Sensor Networks COE 499 Energy Aware Routing
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
WEAR: A Balanced, Fault-Tolerant, Energy-Aware Routing Protocol for Wireless Sensor Networks Kewei Sha, Junzhao Du, and Weisong Shi Wayne State University.
Computer Networks Dr. Jorge A. Cobb The Performance of Query Control Schemes for the Zone Routing Protocol.
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
KAIS T High-throughput multicast routing metrics in wireless mesh networks Sabyasachi Roy, Dimitrios Koutsonikolas, Saumitra Das, and Y. Charlie Hu ICDCS.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
KAIS T On the problem of placing Mobility Anchor Points in Wireless Mesh Networks Lei Wu & Bjorn Lanfeldt, Wireless Mesh Community Networks Workshop, 2006.
1 Presented by Jing Sun Computer Science and Engineering Department University of Conneticut.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
6LoWPAN Ad Hoc On-Demand Distance Vector Routing Introduction Speaker: Wang Song-Ferng Advisor: Dr. Ho-Ting Wu Date: 2014/03/31.
1 Low Latency Multimedia Broadcast in Multi-Rate Wireless Meshes Chun Tung Chou, Archan Misra Proc. 1st IEEE Workshop on Wireless Mesh Networks (WIMESH),
Eunyoung Chang 1 CS 6204 Mobile Computing.  Problem  Proposed Approaches  COMMIT Approaches  THE SYSTEM MODEL  The COMMIT Protocol  Protocol Analysis.
Fundamentals of Computer Networks ECE 478/578
Peter Pham and Sylvie Perreau, IEEE 2002 Mobile and Wireless Communications Network Multi-Path Routing Protocol with Load Balancing Policy in Mobile Ad.
1 Traffic Engineering By Kavitha Ganapa. 2 Introduction Traffic engineering is concerned with the issue of performance evaluation and optimization of.
Construction of Optimal Data Aggregation Trees for Wireless Sensor Networks Deying Li, Jiannong Cao, Ming Liu, and Yuan Zheng Computer Communications and.
Author:Zarei.M.;Faez.K. ;Nya.J.M.
MZR: A Multicast Protocol based on Zone Routing
Mobicom ‘99 Per Johansson, Tony Larsson, Nicklas Hedman
A comparison of Ad-Hoc Routing Protocols
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Routing protocols in Mobile Ad Hoc Network
Presentation transcript:

On Designing Incentive-Compatible Routing and Forwarding Protocols in Wireless Ad-Hoc Networks ---- An Integrated Approach Using Game Theoretical and Cryptographic Techniques Authors: Sheng Zhong, Li(Erran) Li, Yanbin Grace Liu, Yang Richard Yang Published on MobiCom 2005, Aug Sep Presenter: Xia Wang for CS610jw

Outline Introduction Main contributions of this paper Ad-hoc VCG routing protocol (MobiCom03) Cooperation-optimal protocol design Evaluations Conclusion and future work

Introduction Cooperation between nodes in wireless ad-hoc network can not be assumed in an environment with selfish nodes. Routing protocol has to address incentive issue to stimulate intermediate nodes to forward data. Classic game theory VCG (Vickrey-Clark- Groves) mechanism has been applied in network routing protocols. But a direct application (Ad-hoc VCG) has flaws. Ad-hoc VCG is not applicable on a lossy links.

VCG Mechanism Assume each user has a private type. A user declares its private type to a social planner The social planner decides the outcome to optimize a social objective and a payment to each user. The outcome and the payment are determined in such a way that reporting the type truthfully is a dominant action and the outcome is socially optimal. Example: The second-price auction

Main contributions Show that no forwarding-dominant protocol exists. Design a cooperation-optimal protocol called Corsac, a Cooperation-optimal routing-and- forwarding protocol in wireless ad-hoc networks using cryptographic techniques. The protocol can be extended to a practical radio propagation model where packet reception is probabilistic.

Ad-hoc VCG Routing Protocol(1) Source S = V 0 wants to communicate with a destination D=V n. S → * : (REQUEST, s 0,n, 0, n,,c0) Every node V j (not S and D) receives the ROUTE REQUEST from a node V i do the following: –Check whether it is a new ROUTE REQUEST –Determine the received power: –Estimate the minimum power for V i to reach V j Replace with in the ROUTE REQUEST packet; append its own identification j and the emission power. v j → *: (REQUEST, s 0,n, 0, n,,c 0, 1,, c 1, …, j, P emit j,c j )

Ad-hoc VCG Routing Protocol (2) Destination D: –Compute the SP and |SP| –Calculate the VCG-payment for each intermediate node Where is the shortest path from S to D that doesn’t contain node, is the cost.

Ad-hoc VCG Routing Protocol (3) –Send ROUTE REPLY with route sequence and the corresponding minimal required transmission power as well as the VCG- payment for each intermediate node. vσ(j) → vσ(j−1) : (REPLY, s k, 0, σ(1),…, σ(k),...,,…,, Mσ(1),..., Mσ(k) )

Ad-hoc VCG Routing Protocol(4) An example network with edge-weight

Ad-hoc VCG Routing Protocol(5) Ad-hoc VCG is claimed to be cost- efficient and truthful against one node cheating. What if more than one nodes cheat?

Notations and definitions a i : action of node i a -i : action of all nodes except node i a = (a i, a -i ) action profile for all nodes A node i’s utility: u i = -c i + p i (c i is the cost, pi is the payment) In a non-cooperative strategic game, a dominant action of a player is one that maximizes its utility no matter what actions other players choose. Specifically, a i is node i’s dominant action if, for any a i ’!= a i and any a −i, u i (a i, a −i ) ≥ u i (a i ’, a −i ).

Example of ad-hoc VCG fails P emit = 5 R = 5 B doesn’t cheat, B gets utility 0; If B cheats by claim R = 15, B gets payment 12-6 = 6, its utility of 2 Ad-hoc VCG Fail! Fail with more nodes cheating because of mutually- dependent types.

A cooperation-optimal Protocol Def: A routing protocol is a routing- dominant protocol to the routing stage if following the protocol is a dominant subaction of each potential forwarding node in the routing stage.

A cooperation-optimal Protocol Extensive game model Each vertex – node Edge – possible decision Each subtree – subgame Each path from root to a leaf – a possible set of decision by the wireless nodes. In classic game theory, such a path is said to be a subgame perfect equilibrium if it is a Nash equilibrium for every subgame An example game tree

A cooperation-optimal Protocol Def: A forwarding protocol is a forwarding- optimal protocol to the forwarding stage under routing decision R if all packets are forwarded to their destinations in this protocol and following the protocol is a subgame perfect equilibrium under routing decision R in the forwarding stage.

A cooperation-optimal Protocol This routing protocol addresses two components: –routing stage: determines a packet forwarding path from a source to a destination; –Forwarding stage is to verify that forwarding does happen.

Routing Stage Source node’s test signals –Source S starts a session of M packets. –divides the packets into blocks, where b is the number of packets in a block. –S picks a random number r 0. –Let H be a cryptographic hash function. S computes r =

Routing Stage –For each power level l ∈ P (in increasing order), S sends out (TESTSIGNAL, [S, D, r], [S, hl]) at power level l, where r is a random number used to distinguish different session with source S and destination D. hl contains an encryption of [S,D, r, l, α S ] using key k S,D and a MAC of the encryption using the same key. k S,D is a shared key between S and D using Diffie-Hellman key exchange in cryptography. α S is a cost-of-energy parameter representing the cost of unit energy at node i. (In ad-hoc VCG, it is c i )

Routing Stage Upon receiving (TESTSIGNAL, [S, D, r], [P, h]) from an upstream neighbor P, an intermediate node i does the following : –Node i sends out (ROUTEINFO, [S, D, r], [P, i, h]) at power level P ctr (where P ctr is a power level for control messages such that the communication graph is connected when all links use power level P ctr for transmission). h is computed by encrypting h using key k i,D. For integrity, this message is protected by a MAC using key ki,D. –If the TESTSIGNAL is the first one i receives for session (S, D, r), then for each l ∈ P (in increasing order), node i sends out (TESTSIGNAL, [S, D, r], [i, hl]) at power level l, where hl contains an encryption of [S,D, r, l, αi] using the key k i,D and a MAC of the encryption using the same key.

Routing Stage Upon receiving (ROUTEINFO, [S, D, r], [P, i, h]), an intermediate node j does the following: – If this ROUTEINFO is new to node j, then node j sends out (ROUTEINFO, [S, D, r], [P, i, h]) at power level P ctr

Routing Stage Destination D maintains cost matrix for each session (S, D, r). –Upon receiving (TESTSIGNAL, [S, D, r], h) from neighbor P, D decrypts h, verifies the MAC using the key k P,D, and “translates” h to the corresponding power level l and cost-of-energy parameter α P. D records (l, α P ) in the cost matrix’s entry for link (P,D). –Upon receiving (ROUTEINFO, [S, D, r], [P, i, h]), D decrypts h, verifies the packet’s MAC using key k i,D, and “translates” h to the corresponding power level l and cost-of-energy parameter α P. D records (l, α P ) in the cost matrix’s entry for link (P, i).

Routing Stage After collection all link cost information, D check, for each link, that the cost-of-energy parameter does not change. Computes LCP(S, D) and the unit payment for each intermediate node i.

Packet forwarding stage After the routing discovery phase, the destination D sends the routing decision ([S,D, r], LCP(S,D), P S,{(Pi, pi) | i is an intermediate node on LCP(S,D)}) with digital signature along the reverse path of LCP. P i is the power level for node i p i is the payment for node i

Packet forwarding stage The source node sends out packets in block. Together with the last data packet in the m- th block, the source sends out = For each block, the intermediate node waits for a confirmation after it forwards the block and before it start sending the next block. The destination decrypts all packets in a block, it decrypts, and sends it back along LCP(S, D) as a confirmation. Each intermediate node verifies that r =

Evaluations Simulation using GloMoSim Simulation package. The scenario consists of 30 nodes that are randomly distributed in an area of 2000 by 2000 meters. Each node has transmission power level at 7 and 14dBm. is set to 1 for every node

Topology of simulation setup A network with 30 nodes. The ID’s of the nodes are labeled. A link between two nodes indicates that they are neighbors. The credit balance and forwarding energy cost at the end of 15 minutes are represented by the sizes of the circles.

Evaluation Results the credit balance of the nodes (the total credit received by forwarding others’ traffic minus the total credit paid in order to send one’s own traffic)

Evaluation Results (2) forwarding energy cost

Effects of Cheating Credit balance for node 3 with four different settings After 30 minutes’ simulation

Effects of Cheating(2)

Conclusion and Future work Conclusion –Design the first incentive-compatible, integrated routing and forwarding protocol in wireless ad-hoc networks. –Combine incentive mechanisms and security techniques to address link cost issue. Future work –This method can be extended to congestion price in network with limited capacity. –A general model to integrate incentive issue in different layers: MAC layer and application layer.

Question?