27
1 Objective and Secure Reputation- Based Incentive Scheme for Ad- Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida (Joint work with Qi He and Pradeep Khosla at Carnegie Mellon University)

1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida

Embed Size (px)

Citation preview

Page 1: 1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida

1

Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks

Dapeng Oliver WuElectrical and Computer Engineering

University of Florida(Joint work with Qi He and Pradeep Khosla

at Carnegie Mellon University)

Page 2: 1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida

2

What’s the Problem?

• Mobile ad hoc network (MANET) has no fixed infrastructure

• Communications rely on intermediate nodes

But why should intermediate nodes relay?• Need incentive mechanism for packet

forwarding in non-cooperative MANET

Page 3: 1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida

3

Outline

Problem and motivationPrevious work

Reputation-based schemes Pricing-based schemes

Our scheme Design objective Basic scheme Security enhancement

Conclusion

Page 4: 1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida

4

Watchdog: identifies selfish nodes

Mitigating Routing Misbehavior(S. Marti et al, Stanford University, 2000)

S A B C DX

S A B C D

X Y

Pathrater: gets around identified selfish nodes

Page 5: 1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida

5

Pros and Cons

Pros: Improve throughput

Cons: Unfairly makes well behaving nodes

busier Indirectly encourages misbehavior

(S. Marti et al, Stanford University, 2000)

Page 6: 1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida

6

Detect misbehavior of neighbors

Share reputation information with friends

Punish selfish nodes based on the shared information

CONFIDANT Protocol System(S. Buchegger and J-Y Le Boudec, IBM and EPFL, 2002)

Page 7: 1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida

7

Pros and Cons

Pros Use keys to authenticate nodes Identify and punish misbehavior

Cons How to build a network of friends is not clear Key distribution is not addressed Globally shared reputation makes it not scalable

(S. Buchegger and J-Y Le Boudec, IBM and EPFL, 2002)

Page 8: 1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida

8

Where are we?

Problem and motivationPrevious work

Reputation-based schemes Pricing-based schemes

Our scheme Design objective Basic scheme Security enhancement

Conclusion

Page 9: 1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida

9

Enforcing Service Availability

Scheme Virtual currency (nuglet) Centralized authority issuing nuglets Same amount of packets to forward Tamper-resistant hardware

Problem: Require balanced traffic

(L. Buttyan and Hubaux, Swiss Federal Institute of Technology -- EPFL, 2000)

Page 10: 1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida

10

Micro-payment Scheme Encouraging Collaboration

Multi-hop Cellular Networks (hybrid network)

Mobile nodes form ad-hoc networks

Base stations are connected to a backbone network

M. Jakobsson, J-P Hubaux, and L. Buttyan RSA Lab, Swiss Federal Institute of Technology, 2003

backbone

backbone

Page 11: 1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida

11

$

Micro-payment Protocol

1. Select a reward

Forward the packetKeep the MAC for reward

1. Check MAC2. Send service record

to clearing house

Accounting Center(Clearing house)

backbonebackbone

M. Jakobsson, J-P Hubaux, and L. Buttyan RSA Lab, Swiss Federal Institute of Technology, 2003

Registers to home network which shares a secret key

move

MAC

2. Generate an MAC3. Send out the packet

Page 12: 1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida

12

Pros and Cons

Pros Symmetric key crypto: reduce computational cost Payment aggregation: lower communication cost

Cons Substantial communication overhead Requirement of infrastructure Centralized trust authority

M. Jakobsson, J-P Hubaux, and L. Buttyan, RSA Lab, Swiss Federal Institute of Technology 2003

Page 13: 1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida

13

Where are we?Problem and MotivationPrevious work

Reputation-based schemes Pricing-based schemes

Our scheme Design objective Basic scheme Security enhancement

Conclusion

Page 14: 1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida

14

Our Design Objectives

Practicality

Available technologies

Realistic context of ad-hoc networks

Efficiency

Affordable computational cost

Moderate communication overhead

Page 15: 1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida

15

Assumptions Nodes are non-cooperative

No collusion among nodes

Broadcast transmission

All participating nodes desire to communicate

Invariant identity

Selfish but not malicious

Promiscuous mode (listening mode)

Page 16: 1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida

16

Where are we?Problem and motivationPrevious work

Reputation-based schemes Pricing-based schemes

Our scheme Design objectives Basic scheme Security enhancement

Conclusion

Page 17: 1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida

17

Neighbor Monitoring

Each node N maintains a Neighbor Node List (NNLN)

RFPN(X): (Requested to Forward Packets)The number of packets N requests X to forward

HFPN(X): (Has Forwarded Packets)

The number of packets that have been forwarded by X and noticed by N

LERN(X): Local Evaluation Record {GN(X), CN(X)}

)(

)()(

XRFP

XHFPXG

N

NN )()( XRFPXC NN GenerosityGenerosity ConfidenceConfidence

Page 18: 1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida

18

Reputation Propagation Every neighbor has its local evaluation record about X.

node i earned from N.

Everyone periodically broadcasts its LER(X).

GB(X), CB(X)GB(X), CB(X)

Compute Overall Evaluation Record OERN(X)

XN

A

B

CA(X), GA(X) CA(X), GA(X)

CB(X), GB(X)CB(X), GB(X)

CN(X), GN(X)CN(X), GN(X)

CA(X), GA(X)CA(X), GA(X)

*

*

*

)(NN)(AN)(BN

*

*

*

)(0)( iG

NNi if RFPN(X) 0

otherwiseCredibilityCredibility

Everyone periodically broadcasts its LER(X).

Compute Overall Evaluation Record OERN(X)

)(0)( iG

NNi if RFPN(X) 0

otherwiseCredibilityCredibility

XiNNNNLiN

XGXCiXCk

XOER iiN

XkNNNLk kNN

},{

)()()()()(

1)(

},{

Page 19: 1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida

19

Remarks

Quantified by objective observations

Weighted by confidence for accuracy

Weighted by credibility to limit impact of selfish nodes

e.g., fake a non-existing node to broadcast information

XiNNNLi

iiN

XkNNNLk kNN

NN

XGXCiXCk

XOER},{},{

)()()()()(

1)(

Page 20: 1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida

20

Punishment Action

if

otherwise

q

p0

q

Drop packets from X with a probability p :

SelfishnessSelfishness q = 1 - OERN(X)

Page 21: 1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida

21

Simulation Setup Network Simulator (NS-2)

Total number of nodes: 50 (5 selfish nodes)

Area: 670X670m2

IEEE 802.11 for medium access control

DSR for routing

CBR traffic: 1 packet/s

No. of connections: 10

Connection duration: 10s

Random waypoint mobility model

Max speed of movement: 20m/s

Page 22: 1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida

22

Simulation Results

10 20 30 40 50 60 70 80 90 1000

0.05

0.1

0.15

0.2

0.25

Ave

rage

thr

ough

put

(pac

kets

/sec

)

Dropping probability of selfish nodes (%)

Well-behaving nodeSelfish node

Page 23: 1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida

23

Where are we?Problem and motivationPrevious work

Reputation-based schemes Pricing-based schemes

Our scheme Design objectives Basic scheme Security enhancement

Conclusion

Page 24: 1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida

24

Potential Vulnerability

Impersonate a

node with a

good reputation

to propagate

fake observation

information

XN

A

B

CA(X), GA(X) CA(X), GA(X)

CA(X), GA(X) CA(X), GA(X)

CB(X), GB(X) CB(X), GB(X)

CB(X), GB(X)CB(X), GB(X)

CA(X), GA(X)CA(X), GA(X)

CA(X), GA(X) CA(X), GA(X)

Page 25: 1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida

25

Identification and Authentication

r … )(rhn)(rh )(rh din … …)(rh in

ID

)(1 rhn

… ……

1nK iKdiK nK 1K

f f f f f

)}(|),(|{ rhMKMACM inydiy

)}(|),(|{ rhMKMACM din

xix

iin Krhf ))((

Computationally infeasible to impersonate other nodes without knowing their keys

Page 26: 1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida

26

Conclusion Incentive scheme with punishment mechanism

• Reputation objectively quantified by observations

• Punishment action quantitatively suggested by reputation

• Effectively identify and punish selfish nodes

Security enhancement

• Identification and authentication constructed collectively

• Protection from impersonation

Page 27: 1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida

27

Thank you!