The Application of Evolutionary Heuristics for Solving Soft Security Issues in MANETs

  • Marcin Seredynski
  • Pascal Bouvry
Part of the Studies in Computational Intelligence book series (SCI, volume 394)


The goal of this chapter is to demonstrate how the problem of selfish behaviour in mobile ad hoc networks can be solved by means of a soft security approach based on evolutionary game theory. In general, the problem is solved by means of a trust system that allows a node to distinguish between cooperative and selfish network participants, prior to providing them with a forwarding service. Our approach combines a classical trust system with an evolutionary game-theoretic model. The model aims at tuning the parameters of the trust system. We focus on the properties of the trust system that would allow nodes to develop cooperation on the grounds of direct and indirect reciprocity. In particular, we demonstrate, that the numbers of selfish and altruistic nodes have a significant influence on the desired settings of the system.


Trust Data Trust System Evolutionary Game Small Network Reputation System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Jurdak, R.: Wireless Ad Hoc and Sensor Networks: A Cross-Layer Design Perspective. Springer, Heidelberg (2010)Google Scholar
  2. 2.
    Corson, S., Macker, J.: Mobile ad hoc networking (manet): Routing protocol performance issues and evaluation considerations. IETF RFC 2501 (1999),
  3. 3.
    Buttyan, L., Hubaux, J.P.: Nuglets: a virtual currency to stimulate cooperation in self-organized mobile ad hoc networks, Swiss Federal Institute of Technology, Tech. Rep. DSC/2001/001 (2001)Google Scholar
  4. 4.
    Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proc. ACM/IEEE 6th International Conference on Mobile Computing and Networking (MobiCom 2000), pp. 255–265 (2000)Google Scholar
  5. 5.
    Michiardi, P., Molva, R.: Simulation-based analysis of security exposures in mobile ad hoc networks. In: Proc. European Wireless Conference (2002)Google Scholar
  6. 6.
    Stallings, W.: Cryptography and Network Security: Principles and Practice, vol. 5. Prentice Hall (2010)Google Scholar
  7. 7.
    Rasumsson, L., Jansson, S.: Simulated social control for secure internet commerce. In: Proc. 1996 Workshop on New Security Paradigms (NSPW 1996). ACM (1996)Google Scholar
  8. 8.
    Kwok, Y.-K.: Incentive issues in peer-to-peer systems. In: Bidgoli, H. (ed.) The Handbook of Computer Networks. vol. 3, ch. 46, pp. 168–188. John Wiley and Sons (2007)Google Scholar
  9. 9.
    Seredynski, M., Bouvry, P.: Direct vs. indirect reciprocity trust system in ad hoc networks. In: Proc. 4th IFIP WG 11.11 International Conference on Trust Management IFIPTM 2010, pp. 111–118 (2010)Google Scholar
  10. 10.
    Fehr, E., Gachter, S.: Altruistic punishment in humans. Nature 415, 137–140 (2001)CrossRefGoogle Scholar
  11. 11.
    Smith, J.M., Price, G.R.: The logic of animal conflict. Nature 246(5427), 15–18 (1973)CrossRefGoogle Scholar
  12. 12.
    Vincent, T.L., Brown, J.S.: Evolutionary Game Theory, Natural Selection, and Darwinian Dynamics. Cambridge University Press (2005)Google Scholar
  13. 13.
    Samuelson, L.: Evolution and game theory. The Journal of Economic Perspectives 16(2), 47–66 (2002)CrossRefGoogle Scholar
  14. 14.
    Nowak, M.A.: Evolutionary Dynamics: Exploring the Equations of Life. Belknap Press of Harvard University Press (2006)Google Scholar
  15. 15.
    Axelrod, R.: The Evolution of Cooperation. Basic Books (1984)Google Scholar
  16. 16.
    Srivastava, V., Neel, J., Mackenzie, A., Menon, R., Dasilva, L., Hicks, J., Reed, J., Gilles, R.: Using game theory to analyze wireless ad hoc networks. IEEE Communications Surveys and Tutorials 7(4), 46–56 (2005)CrossRefGoogle Scholar
  17. 17.
    Hubaux, J.P., et al.: Cooperation in wireless networks (2011), (last checked March 2011)
  18. 18.
    Buchegger, S., Boudec, J.-Y.L.: Performance analysis of the confidant protocol. In: Proc. 3rd International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2002), pp. 226–236 (2002)Google Scholar
  19. 19.
    Michiardi, P., Molva, R.: Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proc. 6th Conference on Security Communications, and Multimedia (CMS 2002), pp. 107–121 (2002)Google Scholar
  20. 20.
    Buchegger, S., Boudec, J.-Y.L.: The effect of rumor spreading in reputation systems for mobile ad-hoc networks. In: Proc. Workshop on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt 2003), pp. 131–140 (2003)Google Scholar
  21. 21.
    He, Q., Dapeng, W., Khosla, P.: Sori: a secure and objective reputation-based incentive scheme for ad-hoc networks. In: Proc. Wireless Communications and Networking Conference (WCNC 2004), vol. 2, pp. 825–830 (2004)Google Scholar
  22. 22.
    Buchegger, S., Boudec, J.-Y.L.: Self-policing mobile ad hoc networks by reputation systems. IEEE Communications Magazine, Special Topic on Advances in Self-Organizing Networks 43(7), 101–107 (2005)Google Scholar
  23. 23.
    Yan, L., Hailes, S.: Cooperative packet relaying model for wireless ad hoc networks. In: Proc. 1st ACM International Workshop on Foundations of Wireless Ad Hoc and Sensor Networking and Computing, pp. 93–100. ACM (2008)Google Scholar
  24. 24.
    Milan, F., Jaramillo, J., Srikant, R.: Achieving cooperation in multihop wireless networks of selfish nodes. In: Proc. Workshop on Game Theory for Communications and Networks. ACM (2006)Google Scholar
  25. 25.
    Yan, L., Hailes, S.: Designing incentive packet relaying strategies for wireless ad hoc networks with game theory. In: Wireless Sensor and Actor Networks II, pp. 137–148. Springer, Boston (2008)CrossRefGoogle Scholar
  26. 26.
    Seredynski, M., Ignac, T., Bouvry, P.: Probabilistic Packet Relaying in Wireless Mobile ad Hoc Networks. In: Wyrzykowski, R., Dongarra, J., Karczewski, K., Wasniewski, J. (eds.) PPAM 2009. LNCS, vol. 6067, pp. 31–40. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  27. 27.
    Buttyan, L., Hubaux, J.P.: Stimulating cooperation in self-organizing mobile ad hoc networks. Mobile Networks and Applications 8(5), 579–592 (2003)CrossRefGoogle Scholar
  28. 28.
    Zhong, S., Chen, J., Yang, Y.: Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: Proc. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003), vol. 3, pp. 1987–1997. IEEE (2003)Google Scholar
  29. 29.
    Hu, J., Burmester, M.: Cooperation in mobile ad hoc networks. In: Guide to Wireless Ad Hoc Networks. ch. 3, pp. 43–57. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  30. 30.
    Yu, B.H., Shen, Z., Miao, C., Leung, C., Niyato, D.: A survey of trust and reputation management systems in wireless communications. Proceedings of the IEEE 98(10), 1755–1772 (2010)CrossRefGoogle Scholar
  31. 31.
    Cho, J.H., Swami, A., Chen, I.R.: A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys and Tutorials (to appear 2012)Google Scholar
  32. 32.
    Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems 43(2), 618–644 (2007)CrossRefGoogle Scholar
  33. 33.
    Mundinger, J., Boudec, J.-Y.L.: Analysis of a reputation system for mobile ad-hoc networks with liars. Performance Evaluation 65(3-4), 212–226 (2008)CrossRefGoogle Scholar
  34. 34.
    Buchegger, S., Boudec, J.-Y.L.: A robust reputation system for p2p and mobile ad-hoc networks. In: Proc. Second Workshop on the Economics of Peer-to-Peer Systems (2004)Google Scholar
  35. 35.
    Seredynski, M., Bouvry, P.: The cost of altruistic punishment in indirect reciprocity-based cooperation in mobile ad hoc networks. In: Proc. Sixth IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom 2010), Hong Kong, China, pp. 749–755 (2010)Google Scholar
  36. 36.
    Jubin, J., Turnow, J.D.: The darpa packet radio network protocols. Proceedings of the IEEE 75(1), 21–32 (1987)CrossRefGoogle Scholar
  37. 37.
    Feldman, M., Papadimitriou, C., Chuang, J., Stoica, I.: Free-riding and whitewashing in peer-to-peer systems. IEEE Journal on Selected Areas in Communications 24(5), 1010–1019 (2006)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  1. 1.Interdisciplinary Centre for Security, Reliability and TrustUniversity of LuxembourgLuxembourgLuxembourg
  2. 2.Faculty of Sciences, Technology and CommunicationUniversity of LuxembourgLuxembourgLuxembourg

Personalised recommendations