ppt - Dapeng Oliver Wu - University of Florida

advertisement

Objective and Secure Reputation-Based

Incentive Scheme for Ad-Hoc Networks

Dapeng Oliver Wu

Electrical and Computer Engineering

University of Florida

(Joint work with Qi He and Pradeep Khosla at Carnegie Mellon University)

1

What’s the Problem?

• Mobile ad hoc network (MANET) has no fixed infrastructure

• Communications rely on intermediate nodes

But why should intermediate nodes relay?

• Need incentive mechanism for packet forwarding in non-cooperative MANET

2

Outline

Problem and motivation

Previous work

 Reputation-based schemes

 Pricing-based schemes

Our scheme

 Design objective

 Basic scheme

 Security enhancement

Conclusion

3

Mitigating Routing Misbehavior

(S. Marti et al , Stanford University, 2000)

 Watchdog: identifies selfish nodes

S A B

X C D

 Pathrater: gets around identified selfish nodes

X Y

S A B C D

4

Pros and Cons

(S. Marti et al , Stanford University, 2000)

Pros:

 Improve throughput

Cons:

 Unfairly makes well behaving nodes busier

 Indirectly encourages misbehavior

5

CONFIDANT Protocol System

(S. Buchegger and J-Y Le Boudec, IBM and EPFL, 2002)

 Detect misbehavior of neighbors

 Share reputation information with friends

 Punish selfish nodes based on the shared information

6

Pros and Cons

(S. Buchegger and J-Y Le Boudec, IBM and EPFL, 2002)

Pros

 Use keys to authenticate nodes

 Identify and punish misbehavior

Cons

 How to build a network of friends is not clear

 Key distribution is not addressed

 Globally shared reputation makes it not scalable

7

Where are we?

Problem and motivation

Previous work

 Reputation-based schemes

 Pricing-based schemes

Our scheme

 Design objective

 Basic scheme

 Security enhancement

Conclusion

8

Enforcing Service Availability

(L. Buttyan and Hubaux, Swiss Federal Institute of Technology -- EPFL, 2000)

Scheme

 Virtual currency (nuglet)

 Centralized authority issuing nuglets

 Same amount of packets to forward

 Tamper-resistant hardware

Problem:

 Require balanced traffic

9

Micro-payment Scheme Encouraging Collaboration

M. Jakobsson, J-P Hubaux, and L. Buttyan

RSA Lab, Swiss Federal Institute of Technology, 2003

Multi-hop Cellular Networks (hybrid network)

 Mobile nodes form ad-hoc networks

 Base stations are connected to a backbone network backbone

10

Micro-payment Protocol

M. Jakobsson, J-P Hubaux, and L. Buttyan

RSA Lab, Swiss Federal Institute of Technology, 2003 backbone

Registers to home network which shares a secret key move

Accounting Center

(Clearing house)

MAC

$

1.

Select a reward

2.

Generate an MAC

3.

Send out the packet

Forward the packet

Keep the MAC for reward

1.

Check MAC

2.

Send service record to clearing house

11

Pros and Cons

M. Jakobsson, J-P Hubaux, and L. Buttyan,

RSA Lab, Swiss Federal Institute of Technology 2003

Pros

 Symmetric key crypto: reduce computational cost

 Payment aggregation: lower communication cost

Cons

 Substantial communication overhead

 Requirement of infrastructure

 Centralized trust authority

12

Where are we?

Problem and Motivation

Previous work

 Reputation-based schemes

 Pricing-based schemes

Our scheme

 Design objective

 Basic scheme

 Security enhancement

Conclusion

13

Our Design Objectives

 Practicality

 Available technologies

 Realistic context of ad-hoc networks

 Efficiency

 Affordable computational cost

 Moderate communication overhead

14

Assumptions

 Nodes are non-cooperative

 No collusion among nodes

 Broadcast transmission

 All participating nodes desire to communicate

 Invariant identity

 Selfish but not malicious

 Promiscuous mode (listening mode)

15

Where are we?

Problem and motivation

Previous work

 Reputation-based schemes

 Pricing-based schemes

Our scheme

 Design objectives

 Basic scheme

 Security enhancement

Conclusion

16

Neighbor Monitoring

 Each node N maintains a Neighbor Node List (NNL

N

)

 RFP

N

(X): (Requested to Forward Packets)

The number of packets N requests X to forward

 HFP

N

(X): (Has Forwarded Packets)

The number of packets that have been forwarded by X and noticed by N

 LER

N

(X): Local Evaluation Record {G

N

(X), C

N

(X)}

Generosity

G

N

( X )

HFP

N

( X )

RFP

N

( X )

Confidence

C

N

( X )

RFP

N

( X )

17

Reputation Propagation

 Every neighbor has its local evaluation record about X.

 Everyone periodically broadcasts its LER(X).

OER 

N

( X )

 k

NNL

Credibility N

{ N },  k

1

X

( i

)

N 

( k )

C

( ( i i k

( X ) i

NNL

N

{ N },

 i

N

X

( i

(X)

0

)

C i

( X )

G i

( X ) node i earned from N.

  

N

N

( N

( A )

N

)

( B )

*

*

*

C

N

(X), G

N

(X)

C

A

(X), G

A

(X)

C

B

(X), G

B

(X)

N

A

C

A

(X), G

A

(X)

X

B

G

B

(X), C

B

(X)

18

Remarks

OER

N

( X )

 k

NNL

N

{ N }, k

X

1

N

( k )

C k

( X ) i

NNL

N

{ N

N

}, i

( i

X

)

C i

( X )

G i

( X )

 Quantified by objective observations

 Weighted by confidence for accuracy

 Weighted by credibility to limit impact of selfish nodes e.g., fake a non-existing node to broadcast information

19

Punishment Action

Drop packets from X with a probability p : p

 q

  if q

 

0 otherwise

Selfishness q = 1 - OER

N

(X)

20

Simulation Setup

 Network Simulator (NS-2)

 Total number of nodes: 50 (5 selfish nodes)

 Area: 670X670m 2

 IEEE 802.11 for medium access control

 DSR for routing

 CBR traffic: 1 packet/s

 No. of connections: 10

 Connection duration: 10s

 Random waypoint mobility model

 Max speed of movement: 20m/s

21

0.25

Simulation Results

Well-behaving node

Selfish node

0.2

0.15

0.1

0.05

0

10 20 30 40 50 60 70

Dropping probability of selfish nodes (%)

80 90 100

22

Where are we?

Problem and motivation

Previous work

 Reputation-based schemes

 Pricing-based schemes

Our scheme

 Design objectives

 Basic scheme

 Security enhancement

Conclusion

23

Potential Vulnerability

Impersonate a node with a good reputation to propagate fake observation information

C

A

(X), G

A

(X)

C

A

(X), G

A

(X)

N

C

B

(X), G

B

(X)

C

A

(X), G

A

(X)

A

C

A

(X), G

A

(X)

X

B

C

B

(X), G

B

(X)

24

Identification and Authentication r h ( r ) … h n

 i

 d

( r ) … h n

 i

( r )

… h n

1

( r ) h n

( r ) f f f

K n

K n

1

K i

 d

K i

K

1

… … …

{ M y

| MAC ( K i

 d

, M y

) | h n

 i

( r )} { M x

| MAC ( K i

, M x

) | h n

 i

 d

( r )} f ( h n

 i ( r ))

K i

25

Conclusion

 Incentive scheme with punishment mechanism

• Reputation objectively quantified by observations

• Punishment action quantitatively suggested by reputation

• Effectively identify and punish selfish nodes

 Security enhancement

• Identification and authentication constructed collectively

• Protection from impersonation

26

Thank you!

27

Download