A Strategic Reputation-Based Mechanism for Mobile Ad Hoc Networks

  • Zeinab Noorian
  • Mahdi Noorian
  • Michael Fleming
  • Stephen Marsh
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7310)

Abstract

Mobile ad hoc networks (MANETs) are formed by a set of mobile nodes without relying on a preexisting infrastructure. In MANETs, ad hoc nodes should count on intermediate nodes to relay messages between two distant nodes. However, due to the inherent dynamicity of such networks, secure and reliable packet forwarding is difficult to achieve. Besides, considering the scarcity of nodes’ power and computational resources, different nodes might find it economically rational to act selfishly in order to maximize their own welfare during their lifecycle. Therefore, in order to keep the network functional we need a mechanism to enforce nodes’ contribution to network operations despite their internal characteristics and willingness.

In this paper we propose a reputation-based schema to foster cooperation amongst ad hoc nodes in the packet forwarding game and isolate selfish behaviours within the MANETs. In the proposed approach, each node is equipped with a security mechanism to estimate the credibility of its neighbouring nodes as well as adaptive measures to compute the cooperation and defection payoffs in order to strategically choose the most profitable behaviour toward its partners. Experimental results indicate the efficacy of our approach in identifying selfish nodes and promote the adoption of a strategic behaviour determination mechanism in a dynamic network in which different nodes with conflicting tendencies participate.

Keywords

Mobile Node Multiagent System Malicious Node Packet Forwarding Selfish Node 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Buchegger, S., Le Boudec, J.-Y.: Performance analysis of the CONFIDANT protocol. In: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing, MobiHoc 2002, pp. 226–236. ACM, New York (2002)CrossRefGoogle Scholar
  2. 2.
    Buttyán, L., Hubaux, J.-P.: Enforcing service availability in mobile ad-hoc WANs. In: Proceedings of the 1st ACM International Symposium on Mobile Ad Hoc Networking & Computing, MobiHoc 2000, pp. 87–96. IEEE Press, Piscataway (2000)Google Scholar
  3. 3.
    Carter, J., Bitting, E., Ghorbani, A.A.: Reputation formalization for an information-sharing multi-agent system. Computational Intelligence 18(4), 515–534 (2002)MathSciNetCrossRefGoogle Scholar
  4. 4.
    Hang, C.-W., Wang, Y., Singh, M.P.: An adaptive probabilistic trust model and its evaluation. In: AAMAS (3), pp. 1485–1488 (2008)Google Scholar
  5. 5.
    He, Q., Wu, D., Khosla, P.: SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks. In: IEEE Wireless Communications and Neworking Conference (WCNC 2004), pp. 825–830 (2004)Google Scholar
  6. 6.
    Jakobsson, M., Hubaux, J.-P., Buttyán, L.: A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 15–33. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  7. 7.
    Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, MobiCom 2000, pp. 255–265. ACM (2000)Google Scholar
  8. 8.
    Michiardi, P., Molva, R.: CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security, pp. 107–121. Kluwer, B.V. (2002)Google Scholar
  9. 9.
    Noorian, Z., Marsh, S., Fleming, M.: Multi-layer cognitive filtering by behavioral modeling. In: Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011). ACM (2011)Google Scholar
  10. 10.
    Noorian, Z., Marsh, S., Fleming, M.: Prob-Cog: An Adaptive Filtering Model for Trust Evaluation. In: Wakeman, I., Gudes, E., Jensen, C.D., Crampton, J. (eds.) Trust Management V. IFIP AICT, vol. 358, pp. 206–222. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  11. 11.
    Smith, M.J., Desjardins, M.: Learning to trust in the competence and commitment of agents. Autonomous Agents and Multi-Agent Systems 18, 36–82 (2009)CrossRefGoogle Scholar
  12. 12.
    Vidal, J.M.: Fundamentals of multiagent systems with NetLogo examples. MIT Press (2001)Google Scholar
  13. 13.
    Wang, Y., Singh, M.P.: Formal trust model for multiagent systems. In: IJCAI (2007)Google Scholar
  14. 14.
    Yu, H., Shen, Z., Miao, C., Leung, C., Niyato, D.: A survey of trust and reputation management systems in wireless communications. Proceedings of the IEEE 98(10), 1755–1772 (2010)CrossRefGoogle Scholar
  15. 15.
    Zhong, S., Chen, J., Yang, Y.R.: Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: INFOCOM (2003)Google Scholar
  16. 16.
    Zouridaki, C., Mark, B.L., Hejmo, M., Thomas, R.K.: A quantitative trust establishment framework for reliable data packet delivery in MANETs. In: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN 2005, pp. 1–10. ACM, New York (2005)CrossRefGoogle Scholar
  17. 17.
    Zouridaki, C., Mark, B.L., Hejmo, M., Thomas, R.K.: Robust cooperative trust establishment for MANETs. In: Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN 2006, pp. 23–34. ACM (2006)Google Scholar
  18. 18.
    Zviling, M., Leonov, H., Arkin, I.T.: Genetic algorithm-based optimization of hydrophobicity tables. Bioinformatics 21(11), 2651–2656Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Zeinab Noorian
    • 1
  • Mahdi Noorian
    • 1
  • Michael Fleming
    • 1
  • Stephen Marsh
    • 2
  1. 1.University of New BrunswickCanada
  2. 2.Communications Research CentreCanada

Personalised recommendations