A Scalable and Robust Approach to Collaboration Enforcement in Mobile Ad-Hoc Networks

  • Jiang Ning (Microsoft Corporation, One Microsoft Way) ;
  • Hua Kien A. (School of EECS, University of Central Florida) ;
  • Liu, Danzhou (School of EECS, University of Central Florida)
  • 발행 : 2007.03.31

초록

Mobile ad-hoc networks (MANETs) have attracted great research interest in recent years. Among many issues, lack of motivation for participating nodes to collaborate forms a major obstacle to the adoption of MANETs. Many contemporary collaboration enforcement techniques employ reputation mechanisms for nodes to avoid and penalize malicious participants. Reputation information is propagated among participants and updated based on complicated trust relationships to thwart false accusation of benign nodes. The aforementioned strategy suffers from low scalability and is likely to be exploited by adversaries. In this paper, we propose a novel approach to address these problems. With the proposed technique, no reputation information is propagated in the network and malicious nodes cannot cause false penalty to benign hosts. Nodes classify their one-hop neighbors through direct observation and misbehaving nodes are penalized within their localities. Data packets are dynamically rerouted to circumvent selfish nodes. As a result, overall network performance is greatly enhanced. This approach significantly simplifies the collaboration enforcement process, incurs low overhead, and is robust against various malicious behaviors. Simulation results based on different system configurations indicate that the proposed technique can significantly improve network performance with very low communication cost.

키워드

참고문헌

  1. V. Srinivasan, P. Nuggehalli, C. F. Chiasserini, and R. R. Rao, 'Cooperation in wireless ad-hoc networks,' in Proc. IEEE INFOCOM, 2003
  2. P. Michiardi and R. Molva, 'Prevention of denial of service attacks and selfishness in mobile ad-hoc networks,' Res. Rep. RR-02-63, Jan. 2002
  3. R. B. Myerson, Game Theory: Analysis of Conflict. Cambridge, Mass.: Harvard University Press, 1991
  4. B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, 'An on-demand secure routing protocol resilient to byzantine failures,' in Proc. ACM WiSe, 2002
  5. R. Axelrod, The Evolution of Cooperation. New York: Basic Books, 1984
  6. P. Papadimitratos and Z. J. Haas, 'Secure routing for mobile ad-hoc networks,' in Proc. CNDS, Jan. 2002
  7. Y. Hu, D. B. Johnson, and A. Perrig, 'SEAD: Secure efficient distance vector routing for mobile wireless ad-hoc networks,' in Proc. WMCSA, June 2002
  8. J. Hubaux, L. Buttyan, and S. Capkun, 'The quest for security in mobile ad-hoc networks,' in Proc. IEEE/ACM MobiHoc, 2001
  9. V. Karpijoki, 'Security in ad-hoc networks:' in Proc. the Helsinki University of Technology, Seminar on Network Security, 2000
  10. G. Theodorakopoulos and J. S. Baras, 'Trust evaluation in ad-hoc networks:' in Proc. ACM WiSe, 2004
  11. S. Buchegger and J. L. Boudec, 'Performance analysis of the CONFIDANT protocol: Cooperation of nodes-fairness in dynamic ad-hoc networks,' in Proc. IEEE/ACM MobiHoc, June 2002
  12. S. Buchegger and J. L. Boudec, 'Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad-hoc networks,' in Proc. the Tenth Euromicro Workshop on Parallel, Distributed, and Nework-based Processing, Jan. 2002, pp. 403-410
  13. S. Buchegger and J. L. Boudec, 'IBM research report: The selfish node: Increasing routing security in mobile ad-hoc networks,' Res. Rep. RR-3354, 2001
  14. X. Zeng, R. Bagrodia, and M. Gerla, 'GloMoSim: A library for parallel simulation of large-scale wireless networks,' in Proc. PADS, May 26-29, 1998
  15. Y. Hu, A. Perrig, and D. B. Johnson, 'Ariadne: A secure on-demand routing protocol for ad-hoc networks,' Dept. Computer Sci., Rice Univ., Tech. Rep. TR01-383, Dec. 2001
  16. S. Buchegger and J. L. Boudec, 'Coping with false accusations in misbehavior reputation systems for mobile ad-hoc networks,' EPFL, Tech. Rep. IC/2003/31
  17. H. Yang, X. Meng, and S. Lu, 'Self-organized network-layer security in mobile ad-hoc networks,' in Proc. ACM WiSe, 2002
  18. Information Technology Laboratory, National Institute of Standards and Technology, 'The keyed-hash message authentication code (HMAC)'
  19. P. Michiardi and R. Molva, 'A game theoretical approach to evaluate cooperation enforcement mechanisms in mobile ad-hoc networks,' in Proc. WiOpt: Modeling and Optimization in Mobile, Ad-Hoc and Wireless Networks, 2003
  20. P. Papadimitratos and Z. J. Haas, 'Secure data transmission in mobile ad-hoc networks,' in Proc. ACM WiSe, 2003
  21. S. Zhong, J. Chen, and Y. R. Yang, 'Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks,' in Proc. IEEE INFOCOM, 2003
  22. L. Zhou and Z. Haas, 'Securing ad-hoc networks,' IEEE Network Mag., Special Issue on Networking Security, vol. 13, no. 6, Nov./Dec., pp. 24-30, 1999
  23. N. B. Salem, L. Buttyan, J. P. Hubaux, and M. Jakobsson, 'A charging and rewarding scheme for packet forwarding,' in Proc. IEEE/ACM MobiHoc, 2003
  24. P. Michiardi and R. Molva, 'CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad-hoc networks,' in Proc. CMS, 2002
  25. L. Buttyan and J. Hubaux, 'Enforcing service availability in mobile ad-hoc WANs,' in Proc. IEEE/ACM MobiHoc, Aug. 2000
  26. L. Buttyan and J. Hubaux, 'Stimulating cooperation in self-organizing mobile ad-hoc networks,' EPFL-DI-ICA, Tech. Rep. DSC/2001/046, Aug. 2001
  27. N. Jiang, S. Sheu, K. A. Hua, and O. Ozyer, 'A finite-state-model scheme for efficient cooperation enforcement in mobile ad-hoc networks,' in Proc. ICPADS, 2005
  28. S. Eidenbenz and L. Anderegg, 'Ad-hoc-VCG: A truthful and cost-efficient routing protocol for mobile ad-hoc networks with selfish agents,' in Proc. MobiCom, Sept. 2003
  29. J. Kong, X. Hong, Y. Yi, J. S. Park, and M. Gerla, 'A secure ad-hoc routing approach using localized self-healing communities,' in Proc. IEEE/ACM MobiHoc, 2005
  30. K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, 'A secure routing protocol for ad-hoc networks,' in Proc. ICNP, Nov. 2002
  31. ANSI/IEEE Standard 802.11 (1999). [Online]. Available: http://standards. ieee.org/catalog/olis/lanman.html
  32. J. Wright, GCIH, and CCNA, 'Detecting wireless LAN MAC address spoofing. [Online]. Available: http://home.jwu.edu/jwright/papers/wlanmac-spoof.pdf
  33. I. S. Committee, 'Wireless LAN medium access control (MAC) and physical layer (PHY) specification.' IEEE 802.11 Standard, ISBN 1-55937-935-9, 1997
  34. P. Michiardi and R. Molva, 'Simulation-based analysis of security exposures in mobile ad-hoc networks,' in Proc. European Wireless Conf, 2002
  35. E. M. Royer and C. Toh, 'A review of current routing protocols for ad-hoc mobile wireless networks,' IEEE Pers. Commun., Apr. 1999
  36. S. Marti, T. J. Giuli, K. Lai, and M. Baker, 'Mitigating routing misbehavior in mobile ad-hoc networks,' in Proc. MobiCom, 2000, pp. 255-265
  37. Q. He, D. Wu, P. Khosla, 'SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks,' in Proc. WCNC, 2004
  38. D. Johnson and D. A. Maltz, 'Dynamic source routing in ad-hoc wireless networks,' in Mobile Computing, T. Imielinski and H. F. Korth, Ed., Dordrecht, The Netherlands: Kluwer Academic Publishers, 1996, pp. 153-181
  39. W. Zhao, X. Li, and Y. Wang, 'Truthful multicast routing in selfish wireless networks,' in Proc. MobiCom, 2004, pp. 245-259
  40. Y. Zhang and W. Lee, 'Intrusion detection in wireless ad-hoc networks,' in Proc. MobiCom, 2000, pp. 275-283
  41. W. Zhao, X. Li, and Y. Wang, 'Design multicast protocols for noncooperative networks,' in Proc. IEEE INFOCOM, 2005