Browse > Article

A Scalable and Robust Approach to Collaboration Enforcement in Mobile Ad-Hoc Networks  

Jiang Ning (Microsoft Corporation, One Microsoft Way)
Hua Kien A. (School of EECS, University of Central Florida)
Liu, Danzhou (School of EECS, University of Central Florida)
Publication Information
Abstract
Mobile ad-hoc networks (MANETs) have attracted great research interest in recent years. Among many issues, lack of motivation for participating nodes to collaborate forms a major obstacle to the adoption of MANETs. Many contemporary collaboration enforcement techniques employ reputation mechanisms for nodes to avoid and penalize malicious participants. Reputation information is propagated among participants and updated based on complicated trust relationships to thwart false accusation of benign nodes. The aforementioned strategy suffers from low scalability and is likely to be exploited by adversaries. In this paper, we propose a novel approach to address these problems. With the proposed technique, no reputation information is propagated in the network and malicious nodes cannot cause false penalty to benign hosts. Nodes classify their one-hop neighbors through direct observation and misbehaving nodes are penalized within their localities. Data packets are dynamically rerouted to circumvent selfish nodes. As a result, overall network performance is greatly enhanced. This approach significantly simplifies the collaboration enforcement process, incurs low overhead, and is robust against various malicious behaviors. Simulation results based on different system configurations indicate that the proposed technique can significantly improve network performance with very low communication cost.
Keywords
Cooperation enforcement; selfish node; wireless adhoc network;
Citations & Related Records

Times Cited By Web Of Science : 3  (Related Records In Web of Science)
Times Cited By SCOPUS : 3
연도 인용수 순위
1 V. Srinivasan, P. Nuggehalli, C. F. Chiasserini, and R. R. Rao, 'Cooperation in wireless ad-hoc networks,' in Proc. IEEE INFOCOM, 2003
2 B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, 'An on-demand secure routing protocol resilient to byzantine failures,' in Proc. ACM WiSe, 2002
3 Y. Hu, D. B. Johnson, and A. Perrig, 'SEAD: Secure efficient distance vector routing for mobile wireless ad-hoc networks,' in Proc. WMCSA, June 2002
4 G. Theodorakopoulos and J. S. Baras, 'Trust evaluation in ad-hoc networks:' in Proc. ACM WiSe, 2004
5 X. Zeng, R. Bagrodia, and M. Gerla, 'GloMoSim: A library for parallel simulation of large-scale wireless networks,' in Proc. PADS, May 26-29, 1998
6 Y. Hu, A. Perrig, and D. B. Johnson, 'Ariadne: A secure on-demand routing protocol for ad-hoc networks,' Dept. Computer Sci., Rice Univ., Tech. Rep. TR01-383, Dec. 2001
7 P. Michiardi and R. Molva, 'A game theoretical approach to evaluate cooperation enforcement mechanisms in mobile ad-hoc networks,' in Proc. WiOpt: Modeling and Optimization in Mobile, Ad-Hoc and Wireless Networks, 2003
8 P. Papadimitratos and Z. J. Haas, 'Secure data transmission in mobile ad-hoc networks,' in Proc. ACM WiSe, 2003
9 P. Michiardi and R. Molva, 'CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad-hoc networks,' in Proc. CMS, 2002
10 N. Jiang, S. Sheu, K. A. Hua, and O. Ozyer, 'A finite-state-model scheme for efficient cooperation enforcement in mobile ad-hoc networks,' in Proc. ICPADS, 2005
11 ANSI/IEEE Standard 802.11 (1999). [Online]. Available: http://standards. ieee.org/catalog/olis/lanman.html
12 P. Michiardi and R. Molva, 'Simulation-based analysis of security exposures in mobile ad-hoc networks,' in Proc. European Wireless Conf, 2002
13 D. Johnson and D. A. Maltz, 'Dynamic source routing in ad-hoc wireless networks,' in Mobile Computing, T. Imielinski and H. F. Korth, Ed., Dordrecht, The Netherlands: Kluwer Academic Publishers, 1996, pp. 153-181
14 W. Zhao, X. Li, and Y. Wang, 'Design multicast protocols for noncooperative networks,' in Proc. IEEE INFOCOM, 2005
15 P. Michiardi and R. Molva, 'Prevention of denial of service attacks and selfishness in mobile ad-hoc networks,' Res. Rep. RR-02-63, Jan. 2002
16 J. Kong, X. Hong, Y. Yi, J. S. Park, and M. Gerla, 'A secure ad-hoc routing approach using localized self-healing communities,' in Proc. IEEE/ACM MobiHoc, 2005
17 R. Axelrod, The Evolution of Cooperation. New York: Basic Books, 1984
18 L. Zhou and Z. Haas, 'Securing ad-hoc networks,' IEEE Network Mag., Special Issue on Networking Security, vol. 13, no. 6, Nov./Dec., pp. 24-30, 1999
19 S. Marti, T. J. Giuli, K. Lai, and M. Baker, 'Mitigating routing misbehavior in mobile ad-hoc networks,' in Proc. MobiCom, 2000, pp. 255-265
20 J. Wright, GCIH, and CCNA, 'Detecting wireless LAN MAC address spoofing. [Online]. Available: http://home.jwu.edu/jwright/papers/wlanmac-spoof.pdf
21 K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, 'A secure routing protocol for ad-hoc networks,' in Proc. ICNP, Nov. 2002
22 S. Buchegger and J. L. Boudec, 'IBM research report: The selfish node: Increasing routing security in mobile ad-hoc networks,' Res. Rep. RR-3354, 2001
23 S. Buchegger and J. L. Boudec, 'Performance analysis of the CONFIDANT protocol: Cooperation of nodes-fairness in dynamic ad-hoc networks,' in Proc. IEEE/ACM MobiHoc, June 2002
24 I. S. Committee, 'Wireless LAN medium access control (MAC) and physical layer (PHY) specification.' IEEE 802.11 Standard, ISBN 1-55937-935-9, 1997
25 P. Papadimitratos and Z. J. Haas, 'Secure routing for mobile ad-hoc networks,' in Proc. CNDS, Jan. 2002
26 S. Buchegger and J. L. Boudec, 'Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad-hoc networks,' in Proc. the Tenth Euromicro Workshop on Parallel, Distributed, and Nework-based Processing, Jan. 2002, pp. 403-410
27 H. Yang, X. Meng, and S. Lu, 'Self-organized network-layer security in mobile ad-hoc networks,' in Proc. ACM WiSe, 2002
28 Information Technology Laboratory, National Institute of Standards and Technology, 'The keyed-hash message authentication code (HMAC)'
29 R. B. Myerson, Game Theory: Analysis of Conflict. Cambridge, Mass.: Harvard University Press, 1991
30 Q. He, D. Wu, P. Khosla, 'SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks,' in Proc. WCNC, 2004
31 L. Buttyan and J. Hubaux, 'Stimulating cooperation in self-organizing mobile ad-hoc networks,' EPFL-DI-ICA, Tech. Rep. DSC/2001/046, Aug. 2001
32 Y. Zhang and W. Lee, 'Intrusion detection in wireless ad-hoc networks,' in Proc. MobiCom, 2000, pp. 275-283
33 J. Hubaux, L. Buttyan, and S. Capkun, 'The quest for security in mobile ad-hoc networks,' in Proc. IEEE/ACM MobiHoc, 2001
34 N. B. Salem, L. Buttyan, J. P. Hubaux, and M. Jakobsson, 'A charging and rewarding scheme for packet forwarding,' in Proc. IEEE/ACM MobiHoc, 2003
35 S. Buchegger and J. L. Boudec, 'Coping with false accusations in misbehavior reputation systems for mobile ad-hoc networks,' EPFL, Tech. Rep. IC/2003/31
36 S. Zhong, J. Chen, and Y. R. Yang, 'Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks,' in Proc. IEEE INFOCOM, 2003
37 W. Zhao, X. Li, and Y. Wang, 'Truthful multicast routing in selfish wireless networks,' in Proc. MobiCom, 2004, pp. 245-259
38 V. Karpijoki, 'Security in ad-hoc networks:' in Proc. the Helsinki University of Technology, Seminar on Network Security, 2000
39 S. Eidenbenz and L. Anderegg, 'Ad-hoc-VCG: A truthful and cost-efficient routing protocol for mobile ad-hoc networks with selfish agents,' in Proc. MobiCom, Sept. 2003
40 E. M. Royer and C. Toh, 'A review of current routing protocols for ad-hoc mobile wireless networks,' IEEE Pers. Commun., Apr. 1999
41 L. Buttyan and J. Hubaux, 'Enforcing service availability in mobile ad-hoc WANs,' in Proc. IEEE/ACM MobiHoc, Aug. 2000