A Strategic Reputation-Based Mechanism for Mobile Ad Hoc Networks
Mobile ad hoc networks (MANETs) are formed by a set of mobile nodes without relying on a preexisting infrastructure. In MANETs, ad hoc nodes should count on intermediate nodes to relay messages between two distant nodes. However, due to the inherent dynamicity of such networks, secure and reliable packet forwarding is difficult to achieve. Besides, considering the scarcity of nodes’ power and computational resources, different nodes might find it economically rational to act selfishly in order to maximize their own welfare during their lifecycle. Therefore, in order to keep the network functional we need a mechanism to enforce nodes’ contribution to network operations despite their internal characteristics and willingness.
In this paper we propose a reputation-based schema to foster cooperation amongst ad hoc nodes in the packet forwarding game and isolate selfish behaviours within the MANETs. In the proposed approach, each node is equipped with a security mechanism to estimate the credibility of its neighbouring nodes as well as adaptive measures to compute the cooperation and defection payoffs in order to strategically choose the most profitable behaviour toward its partners. Experimental results indicate the efficacy of our approach in identifying selfish nodes and promote the adoption of a strategic behaviour determination mechanism in a dynamic network in which different nodes with conflicting tendencies participate.
KeywordsMobile Node Multiagent System Malicious Node Packet Forwarding Selfish Node
Unable to display preview. Download preview PDF.
- 2.Buttyán, L., Hubaux, J.-P.: Enforcing service availability in mobile ad-hoc WANs. In: Proceedings of the 1st ACM International Symposium on Mobile Ad Hoc Networking & Computing, MobiHoc 2000, pp. 87–96. IEEE Press, Piscataway (2000)Google Scholar
- 4.Hang, C.-W., Wang, Y., Singh, M.P.: An adaptive probabilistic trust model and its evaluation. In: AAMAS (3), pp. 1485–1488 (2008)Google Scholar
- 5.He, Q., Wu, D., Khosla, P.: SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks. In: IEEE Wireless Communications and Neworking Conference (WCNC 2004), pp. 825–830 (2004)Google Scholar
- 7.Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, MobiCom 2000, pp. 255–265. ACM (2000)Google Scholar
- 8.Michiardi, P., Molva, R.: CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security, pp. 107–121. Kluwer, B.V. (2002)Google Scholar
- 9.Noorian, Z., Marsh, S., Fleming, M.: Multi-layer cognitive filtering by behavioral modeling. In: Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011). ACM (2011)Google Scholar
- 12.Vidal, J.M.: Fundamentals of multiagent systems with NetLogo examples. MIT Press (2001)Google Scholar
- 13.Wang, Y., Singh, M.P.: Formal trust model for multiagent systems. In: IJCAI (2007)Google Scholar
- 15.Zhong, S., Chen, J., Yang, Y.R.: Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: INFOCOM (2003)Google Scholar
- 17.Zouridaki, C., Mark, B.L., Hejmo, M., Thomas, R.K.: Robust cooperative trust establishment for MANETs. In: Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN 2006, pp. 23–34. ACM (2006)Google Scholar
- 18.Zviling, M., Leonov, H., Arkin, I.T.: Genetic algorithm-based optimization of hydrophobicity tables. Bioinformatics 21(11), 2651–2656Google Scholar