Skip to main content

The Application of Evolutionary Heuristics for Solving Soft Security Issues in MANETs

  • Chapter
  • First Online:
Computational Intelligence for Privacy and Security

Part of the book series: Studies in Computational Intelligence ((SCI,volume 394))

  • 823 Accesses

Abstract

The goal of this chapter is to demonstrate how the problem of selfish behaviour in mobile ad hoc networks can be solved by means of a soft security approach based on evolutionary game theory. In general, the problem is solved by means of a trust system that allows a node to distinguish between cooperative and selfish network participants, prior to providing them with a forwarding service. Our approach combines a classical trust system with an evolutionary game-theoretic model. The model aims at tuning the parameters of the trust system. We focus on the properties of the trust system that would allow nodes to develop cooperation on the grounds of direct and indirect reciprocity. In particular, we demonstrate, that the numbers of selfish and altruistic nodes have a significant influence on the desired settings of the system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jurdak, R.: Wireless Ad Hoc and Sensor Networks: A Cross-Layer Design Perspective. Springer, Heidelberg (2010)

    Google Scholar 

  2. Corson, S., Macker, J.: Mobile ad hoc networking (manet): Routing protocol performance issues and evaluation considerations. IETF RFC 2501 (1999), http://www.ietf.org/rfc/rfc2501.txt

  3. Buttyan, L., Hubaux, J.P.: Nuglets: a virtual currency to stimulate cooperation in self-organized mobile ad hoc networks, Swiss Federal Institute of Technology, Tech. Rep. DSC/2001/001 (2001)

    Google Scholar 

  4. Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proc. ACM/IEEE 6th International Conference on Mobile Computing and Networking (MobiCom 2000), pp. 255–265 (2000)

    Google Scholar 

  5. Michiardi, P., Molva, R.: Simulation-based analysis of security exposures in mobile ad hoc networks. In: Proc. European Wireless Conference (2002)

    Google Scholar 

  6. Stallings, W.: Cryptography and Network Security: Principles and Practice, vol. 5. Prentice Hall (2010)

    Google Scholar 

  7. Rasumsson, L., Jansson, S.: Simulated social control for secure internet commerce. In: Proc. 1996 Workshop on New Security Paradigms (NSPW 1996). ACM (1996)

    Google Scholar 

  8. Kwok, Y.-K.: Incentive issues in peer-to-peer systems. In: Bidgoli, H. (ed.) The Handbook of Computer Networks. vol. 3, ch. 46, pp. 168–188. John Wiley and Sons (2007)

    Google Scholar 

  9. Seredynski, M., Bouvry, P.: Direct vs. indirect reciprocity trust system in ad hoc networks. In: Proc. 4th IFIP WG 11.11 International Conference on Trust Management IFIPTM 2010, pp. 111–118 (2010)

    Google Scholar 

  10. Fehr, E., Gachter, S.: Altruistic punishment in humans. Nature 415, 137–140 (2001)

    Article  Google Scholar 

  11. Smith, J.M., Price, G.R.: The logic of animal conflict. Nature 246(5427), 15–18 (1973)

    Article  Google Scholar 

  12. Vincent, T.L., Brown, J.S.: Evolutionary Game Theory, Natural Selection, and Darwinian Dynamics. Cambridge University Press (2005)

    Google Scholar 

  13. Samuelson, L.: Evolution and game theory. The Journal of Economic Perspectives 16(2), 47–66 (2002)

    Article  Google Scholar 

  14. Nowak, M.A.: Evolutionary Dynamics: Exploring the Equations of Life. Belknap Press of Harvard University Press (2006)

    Google Scholar 

  15. Axelrod, R.: The Evolution of Cooperation. Basic Books (1984)

    Google Scholar 

  16. Srivastava, V., Neel, J., Mackenzie, A., Menon, R., Dasilva, L., Hicks, J., Reed, J., Gilles, R.: Using game theory to analyze wireless ad hoc networks. IEEE Communications Surveys and Tutorials 7(4), 46–56 (2005)

    Article  Google Scholar 

  17. Hubaux, J.P., et al.: Cooperation in wireless networks (2011), http://lca.epfl.ch/projects/winet-coop (last checked March 2011)

  18. Buchegger, S., Boudec, J.-Y.L.: Performance analysis of the confidant protocol. In: Proc. 3rd International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2002), pp. 226–236 (2002)

    Google Scholar 

  19. Michiardi, P., Molva, R.: Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proc. 6th Conference on Security Communications, and Multimedia (CMS 2002), pp. 107–121 (2002)

    Google Scholar 

  20. Buchegger, S., Boudec, J.-Y.L.: The effect of rumor spreading in reputation systems for mobile ad-hoc networks. In: Proc. Workshop on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt 2003), pp. 131–140 (2003)

    Google Scholar 

  21. He, Q., Dapeng, W., Khosla, P.: Sori: a secure and objective reputation-based incentive scheme for ad-hoc networks. In: Proc. Wireless Communications and Networking Conference (WCNC 2004), vol. 2, pp. 825–830 (2004)

    Google Scholar 

  22. Buchegger, S., Boudec, J.-Y.L.: Self-policing mobile ad hoc networks by reputation systems. IEEE Communications Magazine, Special Topic on Advances in Self-Organizing Networks 43(7), 101–107 (2005)

    Google Scholar 

  23. Yan, L., Hailes, S.: Cooperative packet relaying model for wireless ad hoc networks. In: Proc. 1st ACM International Workshop on Foundations of Wireless Ad Hoc and Sensor Networking and Computing, pp. 93–100. ACM (2008)

    Google Scholar 

  24. Milan, F., Jaramillo, J., Srikant, R.: Achieving cooperation in multihop wireless networks of selfish nodes. In: Proc. Workshop on Game Theory for Communications and Networks. ACM (2006)

    Google Scholar 

  25. Yan, L., Hailes, S.: Designing incentive packet relaying strategies for wireless ad hoc networks with game theory. In: Wireless Sensor and Actor Networks II, pp. 137–148. Springer, Boston (2008)

    Chapter  Google Scholar 

  26. Seredynski, M., Ignac, T., Bouvry, P.: Probabilistic Packet Relaying in Wireless Mobile ad Hoc Networks. In: Wyrzykowski, R., Dongarra, J., Karczewski, K., Wasniewski, J. (eds.) PPAM 2009. LNCS, vol. 6067, pp. 31–40. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  27. Buttyan, L., Hubaux, J.P.: Stimulating cooperation in self-organizing mobile ad hoc networks. Mobile Networks and Applications 8(5), 579–592 (2003)

    Article  Google Scholar 

  28. Zhong, S., Chen, J., Yang, Y.: Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: Proc. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003), vol. 3, pp. 1987–1997. IEEE (2003)

    Google Scholar 

  29. Hu, J., Burmester, M.: Cooperation in mobile ad hoc networks. In: Guide to Wireless Ad Hoc Networks. ch. 3, pp. 43–57. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  30. Yu, B.H., Shen, Z., Miao, C., Leung, C., Niyato, D.: A survey of trust and reputation management systems in wireless communications. Proceedings of the IEEE 98(10), 1755–1772 (2010)

    Article  Google Scholar 

  31. Cho, J.H., Swami, A., Chen, I.R.: A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys and Tutorials (to appear 2012)

    Google Scholar 

  32. Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems 43(2), 618–644 (2007)

    Article  Google Scholar 

  33. Mundinger, J., Boudec, J.-Y.L.: Analysis of a reputation system for mobile ad-hoc networks with liars. Performance Evaluation 65(3-4), 212–226 (2008)

    Article  Google Scholar 

  34. Buchegger, S., Boudec, J.-Y.L.: A robust reputation system for p2p and mobile ad-hoc networks. In: Proc. Second Workshop on the Economics of Peer-to-Peer Systems (2004)

    Google Scholar 

  35. Seredynski, M., Bouvry, P.: The cost of altruistic punishment in indirect reciprocity-based cooperation in mobile ad hoc networks. In: Proc. Sixth IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom 2010), Hong Kong, China, pp. 749–755 (2010)

    Google Scholar 

  36. Jubin, J., Turnow, J.D.: The darpa packet radio network protocols. Proceedings of the IEEE 75(1), 21–32 (1987)

    Article  Google Scholar 

  37. Feldman, M., Papadimitriou, C., Chuang, J., Stoica, I.: Free-riding and whitewashing in peer-to-peer systems. IEEE Journal on Selected Areas in Communications 24(5), 1010–1019 (2006)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marcin Seredynski .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Seredynski, M., Bouvry, P. (2012). The Application of Evolutionary Heuristics for Solving Soft Security Issues in MANETs. In: Elizondo, D., Solanas, A., Martinez-Balleste, A. (eds) Computational Intelligence for Privacy and Security. Studies in Computational Intelligence, vol 394. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25237-2_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25237-2_7

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25236-5

  • Online ISBN: 978-3-642-25237-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics