Abstract
The goal of this chapter is to demonstrate how the problem of selfish behaviour in mobile ad hoc networks can be solved by means of a soft security approach based on evolutionary game theory. In general, the problem is solved by means of a trust system that allows a node to distinguish between cooperative and selfish network participants, prior to providing them with a forwarding service. Our approach combines a classical trust system with an evolutionary game-theoretic model. The model aims at tuning the parameters of the trust system. We focus on the properties of the trust system that would allow nodes to develop cooperation on the grounds of direct and indirect reciprocity. In particular, we demonstrate, that the numbers of selfish and altruistic nodes have a significant influence on the desired settings of the system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Jurdak, R.: Wireless Ad Hoc and Sensor Networks: A Cross-Layer Design Perspective. Springer, Heidelberg (2010)
Corson, S., Macker, J.: Mobile ad hoc networking (manet): Routing protocol performance issues and evaluation considerations. IETF RFC 2501 (1999), http://www.ietf.org/rfc/rfc2501.txt
Buttyan, L., Hubaux, J.P.: Nuglets: a virtual currency to stimulate cooperation in self-organized mobile ad hoc networks, Swiss Federal Institute of Technology, Tech. Rep. DSC/2001/001 (2001)
Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proc. ACM/IEEE 6th International Conference on Mobile Computing and Networking (MobiCom 2000), pp. 255–265 (2000)
Michiardi, P., Molva, R.: Simulation-based analysis of security exposures in mobile ad hoc networks. In: Proc. European Wireless Conference (2002)
Stallings, W.: Cryptography and Network Security: Principles and Practice, vol. 5. Prentice Hall (2010)
Rasumsson, L., Jansson, S.: Simulated social control for secure internet commerce. In: Proc. 1996 Workshop on New Security Paradigms (NSPW 1996). ACM (1996)
Kwok, Y.-K.: Incentive issues in peer-to-peer systems. In: Bidgoli, H. (ed.) The Handbook of Computer Networks. vol. 3, ch. 46, pp. 168–188. John Wiley and Sons (2007)
Seredynski, M., Bouvry, P.: Direct vs. indirect reciprocity trust system in ad hoc networks. In: Proc. 4th IFIP WG 11.11 International Conference on Trust Management IFIPTM 2010, pp. 111–118 (2010)
Fehr, E., Gachter, S.: Altruistic punishment in humans. Nature 415, 137–140 (2001)
Smith, J.M., Price, G.R.: The logic of animal conflict. Nature 246(5427), 15–18 (1973)
Vincent, T.L., Brown, J.S.: Evolutionary Game Theory, Natural Selection, and Darwinian Dynamics. Cambridge University Press (2005)
Samuelson, L.: Evolution and game theory. The Journal of Economic Perspectives 16(2), 47–66 (2002)
Nowak, M.A.: Evolutionary Dynamics: Exploring the Equations of Life. Belknap Press of Harvard University Press (2006)
Axelrod, R.: The Evolution of Cooperation. Basic Books (1984)
Srivastava, V., Neel, J., Mackenzie, A., Menon, R., Dasilva, L., Hicks, J., Reed, J., Gilles, R.: Using game theory to analyze wireless ad hoc networks. IEEE Communications Surveys and Tutorials 7(4), 46–56 (2005)
Hubaux, J.P., et al.: Cooperation in wireless networks (2011), http://lca.epfl.ch/projects/winet-coop (last checked March 2011)
Buchegger, S., Boudec, J.-Y.L.: Performance analysis of the confidant protocol. In: Proc. 3rd International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2002), pp. 226–236 (2002)
Michiardi, P., Molva, R.: Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proc. 6th Conference on Security Communications, and Multimedia (CMS 2002), pp. 107–121 (2002)
Buchegger, S., Boudec, J.-Y.L.: The effect of rumor spreading in reputation systems for mobile ad-hoc networks. In: Proc. Workshop on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt 2003), pp. 131–140 (2003)
He, Q., Dapeng, W., Khosla, P.: Sori: a secure and objective reputation-based incentive scheme for ad-hoc networks. In: Proc. Wireless Communications and Networking Conference (WCNC 2004), vol. 2, pp. 825–830 (2004)
Buchegger, S., Boudec, J.-Y.L.: Self-policing mobile ad hoc networks by reputation systems. IEEE Communications Magazine, Special Topic on Advances in Self-Organizing Networks 43(7), 101–107 (2005)
Yan, L., Hailes, S.: Cooperative packet relaying model for wireless ad hoc networks. In: Proc. 1st ACM International Workshop on Foundations of Wireless Ad Hoc and Sensor Networking and Computing, pp. 93–100. ACM (2008)
Milan, F., Jaramillo, J., Srikant, R.: Achieving cooperation in multihop wireless networks of selfish nodes. In: Proc. Workshop on Game Theory for Communications and Networks. ACM (2006)
Yan, L., Hailes, S.: Designing incentive packet relaying strategies for wireless ad hoc networks with game theory. In: Wireless Sensor and Actor Networks II, pp. 137–148. Springer, Boston (2008)
Seredynski, M., Ignac, T., Bouvry, P.: Probabilistic Packet Relaying in Wireless Mobile ad Hoc Networks. In: Wyrzykowski, R., Dongarra, J., Karczewski, K., Wasniewski, J. (eds.) PPAM 2009. LNCS, vol. 6067, pp. 31–40. Springer, Heidelberg (2010)
Buttyan, L., Hubaux, J.P.: Stimulating cooperation in self-organizing mobile ad hoc networks. Mobile Networks and Applications 8(5), 579–592 (2003)
Zhong, S., Chen, J., Yang, Y.: Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: Proc. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003), vol. 3, pp. 1987–1997. IEEE (2003)
Hu, J., Burmester, M.: Cooperation in mobile ad hoc networks. In: Guide to Wireless Ad Hoc Networks. ch. 3, pp. 43–57. Springer, Heidelberg (2009)
Yu, B.H., Shen, Z., Miao, C., Leung, C., Niyato, D.: A survey of trust and reputation management systems in wireless communications. Proceedings of the IEEE 98(10), 1755–1772 (2010)
Cho, J.H., Swami, A., Chen, I.R.: A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys and Tutorials (to appear 2012)
Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems 43(2), 618–644 (2007)
Mundinger, J., Boudec, J.-Y.L.: Analysis of a reputation system for mobile ad-hoc networks with liars. Performance Evaluation 65(3-4), 212–226 (2008)
Buchegger, S., Boudec, J.-Y.L.: A robust reputation system for p2p and mobile ad-hoc networks. In: Proc. Second Workshop on the Economics of Peer-to-Peer Systems (2004)
Seredynski, M., Bouvry, P.: The cost of altruistic punishment in indirect reciprocity-based cooperation in mobile ad hoc networks. In: Proc. Sixth IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom 2010), Hong Kong, China, pp. 749–755 (2010)
Jubin, J., Turnow, J.D.: The darpa packet radio network protocols. Proceedings of the IEEE 75(1), 21–32 (1987)
Feldman, M., Papadimitriou, C., Chuang, J., Stoica, I.: Free-riding and whitewashing in peer-to-peer systems. IEEE Journal on Selected Areas in Communications 24(5), 1010–1019 (2006)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Seredynski, M., Bouvry, P. (2012). The Application of Evolutionary Heuristics for Solving Soft Security Issues in MANETs. In: Elizondo, D., Solanas, A., Martinez-Balleste, A. (eds) Computational Intelligence for Privacy and Security. Studies in Computational Intelligence, vol 394. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25237-2_7
Download citation
DOI: https://doi.org/10.1007/978-3-642-25237-2_7
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25236-5
Online ISBN: 978-3-642-25237-2
eBook Packages: EngineeringEngineering (R0)